• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • About
    • Editorial Staff
      • Bryan Strawser, Editor in Chief, Strife
      • Dr Anna B. Plunkett, Founder, Women in Writing
      • Strife Journal Editors
      • Strife Blog Editors
      • Strife Communications Team
      • Senior Editors
      • Series Editors
      • Copy Editors
      • Strife Writing Fellows
      • Commissioning Editors
      • War Studies @ 60 Project Team
      • Web Team
    • Publication Ethics
    • Open Access Statement
  • Archive
  • Series
  • Strife Journal
  • Contact us
  • Submit to Strife!

Strife

The Academic Blog of the Department of War Studies, King's College London

  • Announcements
  • Articles
  • Book Reviews
  • Call for Papers
  • Features
  • Interviews
You are here: Home / Archives for UK

UK

Extremism, environment, and new security dynamics: Strife in conversation with RUSI Director, Dr. Karin von Hippel

June 2, 2016 by Harris Kuemmerle

Interviewed by: Harris Kuemmerle

Yazidi_refugees
Yazidi refugees in Northern Syria. Source: Wikimedia

Harris Kuemmerle – Where do you see climate change fitting within the wider European security dynamic moving forward? Do you feel that European policy makers adequately appreciate the security risks of climate change? Or is it still seen as somewhat of a secondary security issue?

Karin von Hippel – I think we all need to focus much more on the longer term security impacts of climate change. For example, many scientists have argued that the drought in Syria, which began in 2006, contributed to the civil war as it forced many people (notably farmers) to move to urban areas. We need to prepare for similar challenges in the future, especially in parts of the Middle East and Africa, where scarce resources will cause more people to compete, which in turn, will lead to more conflict.

I cannot say for certain if the Europeans appreciate this more or less than others. While it is common to discuss the threat posed by climate change, I’m not sure we are all doing as much as we can today to prepare for different scenarios tomorrow. That really is the crux of the issue. At RUSI, we are establishing a Futures Programme, looking at issues such as migration, robotics, space, climate change, conflict, etc and where and how they may intersect over the next 15 to 20 years, and what this will mean for our common security. Governments, multilateral institutions, academia and the private sector need new tools to anticipate and plan for such uncertainty.

HK – Is it fair to say then that environmental issues haven’t quite internalised themselves within the primary security paradigms and agendas?

KvH – That’s an interesting question. In the United States the military and intelligence communities are very forward leaning in this space. By contrast, the rest of the U.S. government may be lagging, primarily because so many officials end up being consumed by the crises of the moment and have very little spare time to focus on future threats

HK – The integration of coal markets was one of the founding elements of the European project. With that being said, do you feel that increased energy interdependence among member states has the potential to again be a key driver of European integration moving forward? Or could energy instead serve as a driver of disintegration?

KvH – I think that energy issues in Europe have indeed led to some challenges. For example, some countries have a closer relationship with Moscow, and need to rely on Russian oil; and that has made it very difficult within Europe to have unity over issues such as the Ukraine crisis. Honestly, I don’t see energy interdependence operating as an integrating factor within Europe in the near future. Indeed, energy may be more likely to lead to fracturing because of the reliance of some countries on Russian oil supplies.

HK – How would you define the term radicalisation with regards to people joining terrorist or other extremist groups?

KvH – That’s a good question, and it’s similar with the term “fundamentalist”. The way we [at RUSI], and researchers like myself look at it is by asking whether or not such extreme views lead to violence. You could be radical and fundamental in your beliefs, but if you are not going to channel your radical beliefs into violence (especially violence against civilians) then it’s not a security issue. If you are going to use violence as a tool to try to impose your belief system, then radicalism or fundamentalism is a problem.

Ultimately (provided such groups are not violent) people have a right to their beliefs. We may not agree but freedom of expression is a fundamental tenet of any democracy. This doesn’t mean we should be ignoring extremist, non-violent groups – and in fact – we should be thinking of ways of keeping communication channels open with such groups as they may have individuals who decide to leave precisely because such groups are not violent. Hence communication could help security and other officials identify potential terrorists-in-the-making. The challenge is that these relationships are hard to establish because many extremist groups (on the left or right) often do not trust the authorities or outsiders.

HK – What would you suggest have been the greatest strengths and weakness of current US policy with regards to counter terrorism and counter extremism? Why?

KvH – I think everyone is struggling with understanding what radicalises people, especially with ISIL, which is very different from previous terrorist groups. The numbers of people joining ISIL are much higher than those joining groups like al-Qaeda or al-Shabaab. In the past few years, between 1,500 and 2,000 people a month have travelled to join ISIL. In recent months, these numbers have been reduced significantly, to around 200 a month; though that is still way higher than those joining al-Qaeda or al-Shabaab. There is definitely something else going on with ISIL, be it the so-called Caliphate or the extreme violence they employ - we don’t really understand the appeal of ISIL as well as we should. As a result we are making too many untested assumptions, and throwing a whole lot of money on those assumptions. I’m afraid we still need to do more research to understand this issue better.

Ultimately radicalisation is very location-specific, each recruit will have a very specific set of reasons to join, based on local grievances. Recruits from Iraq, Minneapolis, or Birmingham will all have distinct motivations. So you really need to understand what is happening in these particular areas, in addition to understanding the global appeal of these organisations.

HK – Are there other cases of past or present radicalisation that we can draw upon to help tackle groups like ISIS? For example, the case of gang membership in urban areas?

KvH – Yes, these issues are definitely comparable. I was recently at a conference speaking with Gary Slutkin, the founder of Cure Violence, an organisation that has done some great work in reducing gang violence all over the world (it was launched in Chicago, but has since spread globally because their methodology works). They employ interruptors and former gang members to play a role in preventing violence. They borrow a methodology used by health workers to stop the spread of pandemics. So there are definitely successes out there, and techniques which one can borrow from adjacent fields, provided you are able to tweak it to make it work for your purposes.

HK – Given the importance of an enabling environment in facilitating radicalisation, in your opinion, what would be the best way to prevent such an enabling environment in Syria or other such parts of the world?

KvH –ISIL emerged from the civil war in Syria, I think a more robust U.S. approach to Syria would have helped prevent the country deteriorating as much as it has. I understand why President Obama did not want to do more than he was doing, as he was worried about the unintended consequences, as we saw in Libya. On the other hand, I think the U.S. government by 2014 knew many more Syrians than it did Libyans, and it had lots of relationships with people on the ground, through training programmes and other non-lethal support to opposition activists. Had the US bombed around the time the red lines were crossed, I think it would have made a big difference and ISIL would not have been able to capitalise on the space as they did. Though this is of course all conjecture and impossible to prove, it’s just my personal belief.

ISIL has been able to thrive in Syria primarily because they are experts at filling power vacuums and taking advantage of chaotic situations. ISIL’s territorial holdings have changed frequently since 2014 and they have been in sporadic conflict with a range of militias, including opposition fighters, the Kurds, aL-Qaeda, Hezbollah, the Syrian regime, and recently the Russians. Unfortunately, the longer Western powers essentially watch from the sidelines, with minimal assistance, the worse it’s going to get.

HK – In your experience, do you think gender is a concept that is understood and engaged enough in counterterrorism policy and practice? Can you offer an example to highlight this?

KvH – Women play a role in preventing family members from being radicalised. They also can play a negative role and contribute to radicalisation of friends and family members. The interesting thing about ISIL is that more women are joining ISIL than have joined other groups in the past, and we are doing research to try to understand this issue and ultimately understand the way women perceive the phenomenon.

HK – Finally, in your calculations, would a British exit from the EU have a net positive or negative impact on British and European Security?

KvH – We have been looking at the security implications of Brexit at RUSI, and from this perspective, it makes more sense for Britain to remain (e.g., to enhance/build on the common arrest warrant, sharing of intelligence, etc), but at RUSI we do not take a corporate position on Brexit.

 

 

Dr Karin von Hippel became Director-General of the Royal United Services Institute (RUSI) on 30 November 2015. Karin von Hippel joined RUSI after recently serving as Chief of Staff to General John Allen, Special Presidential Envoy for the Global Coalition to Counter-ISIL. Karin has also worked as a Deputy Assistant Secretary in the Bureau of Conflict and Stabilization Operations and as a Senior Adviser in the Bureau of Counterterrorism at the US Department of State. Prior to that, she worked at the Center for Strategic and International Studies in Washington, DC and at the Centre for Defence Studies at King’s College London. She has also worked for the United Nations and the European Union in Somalia and Kosovo.

Harris Kuemmerle is a doctoral researcher in the Department of War Studies and the Department of Geography at King’s College London. His research focuses on the intra and inter-state hydropolitics of the Indus River. Twitter: @HarrisKuemmerle

Filed Under: Interview Tagged With: #COIN, Al Shabab, al-Qaeda, Brexit, Counter-Extremism, counterterrorism, Energy, Environment, Europe, extremism, feature, foreign policy, ISIL, ISIS, RUSI, Russia, security, UK, USA

Libya’s civil war & the importance of strategic sequencing

May 6, 2016 by Robert Andrea

By: Robert Andrea

Secretary_Kerry_Sits_With_Italian_Foreign_Minister_Gentiloni_and_UN_Special_Representative_for_Libya_Kobler_at_the_Italian_Foreign_Ministry_in_Rome_(23090680244)
US Secretary of State John Kerry at a 2015 meeting for the future of Libya in Rome. Source: Wikimedia

One of the most overlooked aspects in strategic deliberations is that of sequencing. It is much more common for the ‘what’ and the ‘how’ of a policy to receive the lion’s share of analysis. Despite this, the order in which the segments of a strategy are implemented can often be just as important. And while this may not always be the case, the cost of not giving due consideration to sequence can be painfully high. The ongoing Libyan Civil War provides a contemporary case study into how important sequencing can end up being in the pursuit of strategic interests.

Concerning Libya

In the immediate term, Western states appear to see (based on the different types of policy approaches on the table) two broadly defined interests in Libya. One is resolving the civil war that has been ongoing since 2014. The second is counterterrorism, primarily with regard to the increasing presence in Libya of the so-called Islamic State, but also of groups like the AQ-linked Ansar al-Sharia.

In terms of the civil war, the international community (particularly the United States and European Union) is committed to a diplomatic resolution of the conflict via the UN-led peace process. Dealing with the counterterrorism issue, on the other hand, will almost definitely involve a more kinetic approach.

Without the proper sequencing of these respective policies, however, neither issue will be solved effectively. Worse still, the situation on the ground would likely deteriorate significantly if the major actors fail to appreciate this.

Civil war

Following the overthrow of Colonel Muammar al-Qaddafi by NATO-backed rebels in 2011, Libya has struggled to rebuild effective state institutions, culminating in another civil war in 2014. This current conflict has essentially been fought between two rival entities - both claiming to be the legitimate government of Libya – each with their respective loyalists.

On one hand, there is the General National Congress. Often referred to as the Tripoli government or the Libya Dawn Coalition, the General National Congress (GNC) is comprised largely of Islamist militias and political blocs including the Justice and Construction party – considered by some to be the Libyan branch of the Muslim Brotherhood. The GNC and its allied militias are backed by Qatar, Turkey, and Sudan.

The rival of the GNC is the Tobruk-based House of Representatives, alternatively known as the Council of Deputies or the Tobruk government. Comprised of supposedly secular-leaning opponents of the Islamist-dominated GNC, the House of Representatives (HoR) is internationally recognized as the legitimate elected government of Libya. The HoR also maintains the loyalty of General Khalifa Haftar and his loyalists in the Libyan National Army.

In an effort to end hostilities, a U.N.-led diplomatic effort has produced a roadmap towards reconciliation.

In January of this year, a Government of National Accord (GNA) was announced, which, it is hoped, will unite the warring factions. For security reasons, the GNA (led by chairman and prime minister Fayez al-Sarraj) was not able to enter Libya until 30 March of this year, when he landed in Tripoli. In a somewhat surprising move, the Tripoli-based GNC announced shortly thereafter that it would remove itself from power in favor of the U.N.-backed unity government.

As of yet, the HoR has not ratified the agreement, as certain clauses would call for Haftar to step down as their army chief.

New place. Same threat. Same policy.

Taking advantage of the chaos during the civil war, the Islamic State has managed to establish a major foothold in Libya. This presence includes, but is not limited to, control of the coastal city Sirte. Increasingly concerned about these developments, Western states have been mulling more direct military options to combat the growing jihadist threat in Libya.

Earlier this year, a U.S. airstrike against an Islamic State camp in Sabratha, western Libya, killed around 50 people, including Noureddine Chouchane. Chouchane is thought to have been a key player in the two attacks last year targeting a museum and a beach resort in Tunisia. The attacks have been claimed by the Islamic State. However, this was a fairly isolated operation and there has yet to be a sustained Western airstrike programme conducted in Libya.

In terms of ground forces, part of the agreement that led to the GNA includes plans for an Italian-led multinational force of 6,000 troops to be deployed to Libya. It is still unclear what part of that force will be specifically devoted to counterterrorist operations and, for now, it is still a theoretical force. There doesn’t appear to be any reports of conventional Western troops actually in Libya currently, though multiple reports do place U.S., U.K., and French special operations forces in the country.

The foregoing reveals nothing to suggest that the counterterrorism programme in Libya will consist of anything tactically different than the ones implemented (mostly by the United States) in places like Yemen, Syria, or Somalia: Drone/airstrikes as well as occasional direct action raids by special operations forces (SOF). As we have learned time and time again though, airstrikes and SOF operations alone are usually insufficient in countering jihadist insurgencies. In the absence of a sizeable deployment of conventional Western troops, partnership with local ground forces would additionally be required to make these airstrike/SOF programmes effective.

If examined purely at a tactical level, the disparate nature of the two policies (conflict resolution and counterterrorism) would theoretically allow them to be pursued concurrently. That would be a very serious mistake - doing so would essentially ignore sequencing considerations and would likely end in catastrophe.

Enter the role of sequencing

It is critical to the long term effectiveness of both the political solution to the civil war and the West’s counterterrorism programme in Libya that the diplomatic portion of the strategy be conducted first. Only after the civil war has ended and the Libyan factions reach a modicum of unity, should counterterrorist operations against the Islamic State and other groups begin.

Without reaching a settlement to the civil war first, there will not be a single unified Libyan state to serve as a local military partner to foreign-led counterterrorism efforts. Rather, the prevailing status of a martially factionalized Libya would be the environment in which these counterterrorism operations would have to take place. In such a situation, the West would probably be forced to pick a side in the domestic conflict to act as its partner. This would undoubtedly result in an even more protracted civil war. Only now, it would be a civil war in which Western forces might find themselves as a target.

In the event of such a scenario, it’s more than likely that the Western powers would choose to side with the HoR and, specifically, Haftar over the GNC. For one, the HoR and Haftar are favoured by close partners of the West in the Middle East, Egypt and the United Arab Emirates. Furthermore, the Libyan National Army, under the command of Haftar, has proven to be the most capable fighting force in the country and has already shown a willingness to fight the Islamic State.

However, Haftar is also predisposed to fighting Islamists in general. This includes the Islamist-dominated GNC, which he labels (in its entirety) as terrorists. A foreign intervention siding with their chief rival would almost assuredly incense and seriously threaten the GNC.

Not only would this be a death blow to the diplomatic efforts towards national reconciliation, it would also seriously hamper counterterrorism operations. If they were to feel threatened by an HoR backed with Western military support, it is more than conceivable that some of the more hardline elements in the GNC might make common cause with the very jihadist organisations being targeted. This should not be viewed as a hypothetical. Certain GNC-aligned elements already cooperate from time to time with these jihadist groups.

Take the Benghazi Revolutionary Shura Council as an example. The Benghazi Revolutionary Shura Council (BRSC) is one of the primary elements fighting Haftar’s forces in the east and has often allied with the GNC. Comprised of multiple Islamist militias, the BRSC is led by Ansar al-Sharia in Libya (ASL). Both ASL, the group behind the 2012 attack on the US consulate in Benghazi, and the BRSC at large have periodically cooperated with the Islamic State against Haftar’s forces.

This places the GNC only one degree of separation away from the Islamic State. This is not to say that in the event of a foreign counterterrorism intervention that the GNC would swear the bay’ah to the caliphate en masse. It is entirely plausible however, that at least some of these forces decide to enhance their level of cooperation with the Islamic State if they were to perceive the West’s backing of their arch rival, Haftar, as a threat.

Such a strategic blunder would leave foreign counterterrorism forces facing an already capable enemy, but now potentially reinforced with thousands of new fighters.

If the aforementioned scenario were to occur, the chances for a political settlement to the Libyan Civil War would evaporate almost instantly and the jihadist threat that Libya already poses to the West (particularly to Europe) would increase drastically. Or, to put it succinctly: It would be an unmitigated strategic failure for the West.

To their credit, both the Western states and the U.N.-supported unity government are trying their best to properly sequence their strategies in Libya. Italy, who will be leading the eventual international troop deployment, has said it will refuse to lead the operation until the GNA is ratified by all parties and the Libyan military command structure is clarified. Even more recently, the GNA itself called on all military factions to hold off on any military operation against Sirte until a unified military structure is established.

So it would seem that, for now, the policymakers handling the Libya file in the West are aware of the importance of taking sequence into account.

Conclusion

All of this is not to say that utilising proper sequencing will guarantee success in Libya. The road ahead contains a veritable minefield of challenges to reaching some semblance of stability. In such a complicated political and security landscape, there is nothing to say that the peace process and/or counterterrorism operations in Libya might not face serious challenges in the future. That said, while sequencing might not be the most stimulating aspect of policy analysis, as we see in the case of the Libyan Civil War, failure to fully appreciate its necessity could lead to disastrous consequences.

 

 

Robert Andrea is an incoming MA student in War Studies at King’s College London. His research interests include U.S. and Iranian foreign policy, diplomatic strategy, and proxy warfare. He can be found on Twitter at @Bob__Andrea

Filed Under: Blog Article Tagged With: counterterrorism, Daesh, Diplomacy, France, ISIL, ISIS, Libya, strategy, UK, us

PROXY Capabilities - Costs and burden sharing in Draft Investigatory Powers Bill: The battle between the Home Office and communication service providers

April 8, 2016 by Mustafa Batuhan Albas

This is the fifth piece in a series of articles we will be featuring on Strife in the coming week looking at the role of Proxy Warfare in the 21st century by Series Editor Cheng Lai Ki. Previous articles in the series can be found here.

By: Mustafa Batuhan Albas

bnxncn
Data storage towers. Source: Wikimedia

On 4 November 2015, the UK government published a draft bill that aimed to (re)regulate the investigatory powers used by its law enforcement, intelligence, and security agencies. The new Draft Investigatory Powers Bill was quick to create controversy and scrutiny on encryption, the use of equipment interference, and the acquisition of bulk data along with other issues. Most importantly, the bill seeks to create ‘a new statutory basis for the retention and acquisition of communications data’[1] through which the government will require communication service providers (CSPs) to store details of websites accessed by all UK web users for twelve months. These details are called ‘Internet Connection Records’ (ICRs).[2]

Early parliamentary scrutiny revealed that the government estimates the capital cost of collecting and retaining ICRs will amount to £174 million over ten years, it is however not as clear to this day whether the government is willing to cover 100% of the possible costs although it said it would ‘make reasonable cost provision’.[3] The bill since passed its Second Reading on 15 March 2016, but the issue regarding the costs remains in a rather puzzling state. A battle is thus raging silently between service providers and the government.[4] But why has the Home Office gone ahead with publishing the draft bill in the first place?

The UK signals intelligence, a resource constrained domain

The United Kingdom has a robust security apparatus, best exhibited through their efficient intelligence services and their integral role within the Five Eyes Alliance. However, the country has consistently been troubled by one question since the end of Second World War: ‘the growing importance and the rising costs of SIGINT’.[5] Even during its early days, the problem for GCHQ was ‘trying to keep pace with…the NSA, which seemed to have limitless supplies of money’.[6] This problem remains chronic. In 2014, Charles Farr of the Home Office attested that ‘US intelligence agencies are far larger and much better resourced than the [UK] Intelligence Services’ and hence could ‘provide the UK with the intelligence that the UK –with its far more limited resources– could not realistically obtain by itself’.[7] Particularly regarding data retention, the cost of NSA’s Utah Data Centre alone is approximately three times as expensive as the entire complex in which GCHQ currently resides.[8] [9] This reality is one of the driving incentives behind why the government is trying to use CSPs as proxies and share the burden of responsibilities in a domain in which the costs are a legitimate concern.

Cost of ICRs and the Draft Investigatory Powers Bill

According to the Office for National Statistics, 86% of the households (22.5 million) in the UK had internet access in 2015, with 78% of the adults (39.3 million) using it every day.[10] With the use of multiple gadgets (computers, tablets, smartphones, etc.) and multi-tab browsing habits (maintaining more than one connection at a time), collecting and retaining ICRs could prove to be very costly, even in its most basic form. The bill thus contains certain opportunities for the government in its current state, especially regarding cost management. It is also considerably different than the previous legislation, where CSPs were mostly obligated to retain the data they generated to provide their services.[11] A resource constrained UK government could now effectively force service providers to share the burden of collection and retention duties on a much broader scope. Some of these responsibilities are indeed trying to be outsourced to the providers mandatorily. The government ultimately has this ability to coerce, and the MPs have already acknowledged the possibility of such scenario –that is, if someone does not ‘pick up the bill’.[12]

But would it be that easy? Communication service providers are definitely more vulnerable to government coercion than multinational technology firms. Big UK providers have their broadband networks that cross the entire country, and sometimes even provide access to these networks so that the smaller providers can carry their own services.[13] If the business conditions in the UK ultimately become less favourable, they do not seem to have the immediate luxury nor the ability to move the majority of their operations elsewhere.

The retention of ICRs will require the introduction of certain types of equipment such as deep packet inspection tools (DPI) to the CSP networks –a method that is already associated with high technical processing requirements (and consequently, with high financial costs).[14] Furthermore, there is the ongoing cost of maintenance and storage. One might think that the cost of storage has declined over the years, but the actual cost of bulk and enterprise storage is a lot more complicated than a ‘pennies per gigabyte’ approach, especially when the flow of data that needs to be stored is on a multi-terabyte (if not petabyte) scale. Moreover, the upwards trend in the use of data security technologies such as encryption[15] could further complicate defining what qualifies as an ICR. Less network visibility means that the packet inspection used to deliver ICRs needs more computing power and generates far more data. Service provider representatives acknowledge that this technology challenge is ‘not impossible, but it is very expensive’ as it already is.[16] The president of BT Security Mark Hughes said his company worked out £174 million just for themselves, whereas four mobile carriers stated that they alone could spend £247 million on ICRs. [17] The Home Office has been avoiding to make a clear commitment to cost recovery. This attitude was best exhibited when the Home Secretary Theresa May made contradicting references to reimburse both ‘reasonable operational costs’ and ‘100% of the compliance costs’ during the Second Reading. Service providers recently criticised May by saying that her statements ‘do not provide for the same coverage of costs’.[18]

Moving forward

It appears that the government’s attempt to impose these ambiguous terms and costs on the communication service providers is not going to be a linear process. Different committee reports, including that of the Joint Committee that was tasked specifically to scrutinise the bill, came out criticising the initial draft.[19] The issues regarding costs were strongly pronounced in at least two of these reports.[20] While agreeing with CSPs on vague cost projections of the Home Office, the Joint Committee also noted that they ‘do not agree that 100% cost recovery should be on the face of the Bill’.[21]

The scope of new obligations mandated under the bill are much bigger than any previous legislation, so are the possible costs. The Home Office will more likely need to explain better what it expects from the service providers amidst the criticism it is currently receiving. The Joint Committee report also suggested that ‘the Government should provide statutory guidance on the cost recovery models’.[22] This is a sensible recommendation, and the Home Office seems to be slowly taking notice of CSPs’ concerns.[23] It is understandable that the current opportunities the bill poses for the government are tempting, but the long-term viability of the bill lies in clarity and cooperation, not coercion nor alienation.

 

 

Mustafa Batuhan Albas is an MA Candidate in Intelligence and International Security at King’s College London. His research focus is on information security and its applications on intelligence gathering. He can be reach at @8thcolumn on Twitter.

 

 

 

Notes:

[1] Theresa May, “Draft Investigatory Powers Bill,” 2015, 12, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/473770/Draft_Investigatory_Powers_Bill.pdf.

[2] Home Office, “Investigatory Powers Bill Factsheet - Internet Connection Records,” 2015, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/473745/Factsheet-Internet_Connection_Records.pdf.

[3] House of Commons - Science and Technology Committee, “Oral Evidence: Investigatory Powers Bill: Technology Issues, HC 573 (Tuesday 8 December 2015)” (UK Parliament, 2015), http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/science-and-technology-committee/investigatory-powers-bill-technology-issues/oral/25740.html.

[4] Alan Travis, “Minister Has Not Fully Made Case for Snooper’s Charter, Says Committee,” The Guardian, February 11, 2016, http://www.theguardian.com/world/2016/feb/11/ministers-not-conclusive-case-web-snoopers-charter.

[5] Richard J. Aldrich, “Counting the Cost of Intelligence: The Treasury, National Service and GCHQ,” English Historical Review 128, no. 532 (2013): 607, doi:10.1093/ehr/cet067.

[6] Ibid., 610.

[7] Privacy International, “Investigatory Powers Tribunal Case No. IPT/13/77/H,” 2014, 7–8, https://www.privacyinternational.org/sites/default/files/Witness st of Charles Blandford Farr_0.pdf.

[8] US Domestic Surveillance Directorate, “Utah Data Center,” accessed February 16, 2016, https://nsa.gov1.info/utah-data-center/.

[9] Richard Norton-Taylor, “The Doughnut, the Less Secretive Weapon in the Fight against International Terrorism,” The Guardian, June 10, 2003, http://www.theguardian.com/uk/2003/jun/10/terrorism.Whitehall.

[10] Office for National Statistics, “Internet Access – Households and Individuals, 2015 - Statistical Bulletin,” 2015, http://www.ons.gov.uk/ons/dcp171778_412758.pdf.

[11] Calum Jeffray, “Understanding the Investigatory Powers Bill,” RUSI, 2015, https://rusi.org/sites/default/files/201511_bp_investigatory_powers_bill.pdf.

[12] House of Commons - Science and Technology Committee, “Oral Evidence: Investigatory Powers Bill: Technology Issues, HC 573 (Tuesday 8 December 2015).”

[13] Broadband Genie, “Rated Broadband Providers,” 2016, https://www.broadbandgenie.co.uk/broadband/providers.

[14] Niccolò Cascarano, Luigi Ciminiera, and Fulvio Risso, “Optimizing Deep Packet Inspection for High-Speed Traffic Analysis,” Journal of Network and Systems Management 19, no. 1 (2011): 8, doi:10.1007/s10922-010-9181-x.

[15] Klint Finley, “Encrypted Web Traffic More Than Doubles After NSA Revelations,” Wired, May 2014, http://www.wired.com/2014/05/sandvine-report/.

[16] Joint Committee on the Draft Investigatory Powers Bill, “Oral Evidence: Draft Investigatory Powers Bill, HC 651 (Wednesday 9 December 2015),” UK Parliament, 2015, http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/draft-investigatory-powers-bill-committee/draft-investigatory-powers-bill/oral/25977.html.

[17] Joint Committee on the Draft Investigatory Powers Bill, “Oral Evidence: Draft Investigatory Powers Bill, HC 651 (Wednesday 13 January 2016),” UK Parliament, 2016, http://data.parliament.uk/writtenevidence/committeeevidence.svc/evidencedocument/draft-investigatory-powers-bill-committee/draft-investigatory-powers-bill/oral/26875.html.

[18] “Written Evidence: Internet Service Providers Association (ISPA) (IPB31),” 2016, http://www.publications.parliament.uk/pa/cm201516/cmpublic/investigatorypowers/Memo/IPB31.pdf.

[19] Travis, “Minister Has Not Fully Made Case for Snooper’s Charter, Says Committee.”

[20] House of Commons - Science and Technology Committee, “Cost of Investigatory Powers Bill Could Undermine UK Tech Sector,” UK Parliament, 2016, http://www.parliament.uk/business/committees/committees-a-z/commons-select/science-and-technology-committee/news-parliament-2015/investigatory-powers-bill-report-published-15-16/./

[21] Joint Committee on the Draft Investigatory Powers Bill, “Draft Investigatory Powers Bill Report,” n.d., 68, http://www.publications.parliament.uk/pa/jt201516/jtselect/jtinvpowers/93/93.pdf.

[22] Ibid., 10.

[23] Home Office, “Communications Data: Draft Code of Practice,” 2016, 96, https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/505411/Communications_Data_draft_Code_of_Practice.pdf.

Filed Under: Blog Article Tagged With: Cost, Home Office, internet, Legislation, SIGINT, UK

Is democratic peace theory undermined on the cyber battlefield?

October 30, 2015 by Strife Staff

By: Archie Jobson

https://c1.staticflickr.com/1/427/18729140824_4ae0fb0574_b.jpg
https://c1.staticflickr.com/1/427/18729140824_4ae0fb0574_b.jpg

Remote Control is a project hosted by the London-based think tank Oxford Research Group, set up to examine changes in military engagement, in particular the use of drones, special forces, private military companies and cyber warfare. They recently hosted an essay competition for participants in response to the question ‘Is remote control effective in solving security problems?’ Both Chad Tumelty and Archie Jobson of King’s College London achieved runner up. Strife is proud to feature them as your long read of the week over the coming two weeks.

Democratic peace is a historically proven and appealing solution to the violent and anarchic nature of international relations. However, much of the statistical proof for claims of a democratic peace rest on constrained and narrow definitions of war. Cyberwar introduces a new method of war that negates many of the principles and parameters of democratic peace theory, subsequently putting the validity of a democratic peace in doubt. In order to conclusively assess whether democratic peace is applicable to cyberspace, I shall, firstly, define cyberwar in reference to current debate and the Clausewitzian understanding of war. Secondly I will contrast the characteristics of cyber war to the framework of democratic peace theory. Ultimately democratic peace theory has little applicability to the realm of cyberspace, but, importantly, to date the democratic peace has held, as two democratic states are yet to engage in cyberwar.

“Cyber war will not happen” and “cyber war will happen!” are, two conflicting arguments posed by Thomas Rid and John Stone respectively. Although, as the titles suggest, both are seeking to establish the likelihood of cyber war, the essential disagreement can be seen as does cyberwar constitute war. Thomas Rid claims that, due to the lack violence in a cyber attack it cannot equate to conventional understandings of war, and thus is not. Rid refers to Clausewitz’s definition, “war is an act of force to compel an enemy to do our will.” The crucial word for Rid is force, which he defines as violence and thus an action of war must pertain an element of lethality. However this seems to be a flawed understanding of war and, as John Stone points out, is historically unfounded. Stone highlights the 1943 bombings of the Bavarian town of Schweinfurt. The intended aim was to destroy German ball-bearing production capacity. Although over 400 civilians died in these raids, providing Rid’s lethality, it was seen as “incidental to the desired goal”. The proposition is that, these air raids had no aim of lethality but were clearly acts of war, and thus Rid’s requirement of lethal violence is restrictive, even by conventional understandings of war. It is possible to reinforce John Stone’s argument with the logic that, if an action of cyberwar results in the “compel(ling)” of an enemy to do the attackers “will” then it arguably constitutes war, at least by a Clausewitzian definition. Essentially, this means that if cyberwar achieves the same result as traditional warfare, it should be considered as war. This is reinforced by the idea that if “breaking and entering” in cyber space, the theft of personal or corporate information, is registered as an equal if not greater crime as physically breaking and entering, then cyberwar that achieves the submission of the opponents will, must equate to a conventional conflict that amounts to the same.

The cyber attacks on Estonia in April 2007 demonstrate this. As the result of the proposed removal of a Soviet war memorial from the centre of Tallinn, Estonia and its online infrastructure came under attack from computers of Russian origin. In context, Estonia was regularly called the “wired state of Europe”, with 90% of its domestic financial transactions taking place online. By May 19th Hansabank, Estonia’s largest bank, was forced offline. Ultimately to stop these attacks the Estonian government was forced to close down all external Internet traffic, essentially shutting itself off to the rest of the world. Although, clearly, this is not a cyberwar between two democracies, it demonstrates that a state can force another to act against its own will, by the use of a cyber attack. In this case Estonia closing itself off to the world, causing significant disruption and economic damage. Estonia’s cyber space was recognized by Russia as integral to the “wired state”, and was targeted for this reason. It is hard to deny, therefore, that cyberwar does not constitute war; if, as this example shows, it has the potential to achieve the same ends desired in a conventional conflict. The retort could be made that the memorial was still removed, demonstrating Estonia did not bow to Russian desires; but this seems naive to the nature of Russian intentions during this period. The attack on Estonia can be seen as a move by Russia to demonstrate its support of ethnic Russian communities in former soviet bloc states, this is highlighted by the 2008 Russo-Georgian war which also involved substantial cyber attacks. However, it should be noted that a cyber war such as this would not fall under the traditional definition of war utilized by democratic peace theory, the “correlates of war.” Thus the distinction should be established that either the correlates of war are outdated and cannot help in understanding the ever modernizing developments of war, or that cyber war does not constitute as a sufficient example of conflict; it seems on assessment of the above example the later is incorrect.

The logic of democratic peace theory prescribes that democracies do not engage one another in military conflict, due to the nature of democratic systems and the shared cultural norms that reject violence. Cyber warfare introduces several new elements that null these factors, and in so doing raise questions of the validity of democratic peace theory. Democratic peace theory posits that the absence of war between democratic states is a result of “institutional constraints; the restraining effect of public opinion or of the checks and balances embedded in the democratic structures.” In cyber warfare, however, the dynamics of conflict have fundamentally changed, negating these explanations. For example the battlefield of cyber war is not inhabited by soldiers but by servers. This subsequently removes the danger to life, and thus it must remove a strong element of public aversion to conflict. Secondly if the conventional elements of war are either removed entirely, or substantially reduced, it will be accompanied by a significant cost reduction. Thus if a nation will not loose “its treasure” (comparatively to conventional war), and there still remains the possibility of gain from a cyber conflict, in the form of prestige or a stronger global position; the assumption that democracies would be unwilling to commit to a conflict, lacks evidence. Ultimately, if “blood and treasure” were not applicable there would be little, if no, restraining effect. This is because these are two, fundamental, war retardants held by democratic peace theorists.

Christopher Layne points out that democratic peace theorist often argue “that the absence of war between democracies is more important than the absence of threats”. The validity of this argument, as a result of the weaknesses highlighted above, is now under much greater pressure. Democratic states can now threaten another international actor with cyberwar, without the restraints they were contained by before. The comparatively smaller cost of a cyber attack, in terms of “Blood” and “Treasure”, to a conventional one is demonstrated by “struxnet”. This was a virus, planted by the US, which infected the Iranian nuclear facilities’ computer network. This caused an internal explosion by disrupting the separation process of uranium-235. The conventional alternative, that could have caused the same level of damage, would have been an airstrike using special munitions, with estimate costs running into millions of dollars. Struxnet was cheap as it “capitalized on code expertise” that already existed. Furthermore no US personnel were put at risk to carry out the operation. Cyberwar thus challenges the assertion that substantial physical and economic loss prevents elected leaders from taking their countries to war with other democratic states. This is because the weight of public antipathy to these loses, is essentially non-applicable in cyberwar; rebuffing the claims that war will not happen between democratic states.

The transparency and legality of democratic states is also claimed by democratic peace theorist to demonstrate why democratic states are less likely to engage in conflict. As a result of this transparency and conformity to international legal norms it is argued that, democratic states have an innate level of trust amongst each other. However, in the cyber world such faith in another states intentions, especially those towards you, is challenged. This is due to the element of deniability that is possible with cyber attacks, that is not possible via conventional methods. For example, operation “Titan Rain”, as dubbed by the US, was a wide spread cyber attack on multiple US and UK government departments from 2003-07, that came from Chinese origin. The blame was put solely on PLA by British and American government officials; yet the Chinese government was able to plainly deny these claims due to the attacks untraceable nature. Although again this example is not a conflict between two democracies, it clearly shows that transparency and legality do not apply in cyber space. This is because a state could perpetrate an attack to disable a government’s infrastructure, an act that fulfils the parameters of war, but then deny any involvement. As Chinese government did by arguing they had no part in the attack. Crucially America and the UK were restricted in their response on these grounds, and could not pursue a legal course. Therefore, because the burden of proof in the cyber world is so much greater it could fog up the transparency of democratic states and thus trust in one another would dissipate. Cyberspace is therefore a domain in which, a state could attack another and not be held accountable to international legal norms. The situation has arisen where transparency and conformity to legal norms are no longer relevant, because states can act essentially anonymously. Ultimately, this will challenge democracies’ commitment to international law.

Maoz and Russet in “A Statistical Artifact?” state that democratic spirit of “peaceful competition, persuasion and compromise” explains why democracies behave in a “qualatively” different manner towards each other than they do towards non-democracies. As the cyber world continues to develop this idea of peaceful competition, on which democratic peace’s foundations lie, is increasingly challenged. As a result it is possible to conclude that the apparent stability of democratic peace is not foreseeable. This can be demonstrated by the comparison of the 1923 Ruhr crisis with the 2013 United States National Security Agency’s espionage on the state owned Brazilian oil giant Petrobras. Historically the idea that democracies behave towards one another with a mutual respect has been regularly challenged. Christopher Layne in “Kant or Can’t: The Myth of the Democratic Peace” challenged such arguments with the example of the 1923 Franco-German Ruhr Crisis. Essentially Layne claims that, the occupation of the Ruhr valley by France is an example where the inherent respect that democracies have for one another, was not present. The occupation of the Ruhr showed that France’s war objective of crippling Wilhelm Germany remained the same, despite the fact that Germany was now a democratic republic. Up to 1923 France had rejected the idea of a new democratic Germany, as they did not believe their security situation had fundamentally changed. “What mattered to France was Germany’s latent power”, France’s attitude toward Germany “displayed none of the mutual respect based on democratic norms and culture” on which democratic peace theory rests. As a consequence the French PM Poincare had no option, if he was to maintain his prime ministerial position, but to occupy the Ruhr as anti-German sentiment was so high in France. The Ruhr crisis provides two problematic situations for democratic peace theorists. Firstly it demonstrates that, should it be politically expedient for one democracy to force itself upon another, as it was for Poincare, it will. Secondly, and more importantly for cyber war, when the situation arises that one democracy is inherently weaker than another (Germany 1923) then it becomes a viable target for other democracies. This is arguably the current situation in cyber space and consequently the cyber battlefield.

In September 2013 it emerged that the U.S had been spying on the Brazilian oil company Petrobras. This provides many parallels to 1923 and is essentially an act of corporate cyber espionage by the U.S, against a state owned oil producer. From this it is possible to conclude that the United States, in a similar fashion to France in 1923, does not conform to ideas of mutual respect; instead they sought to understand the “Latent” economic power of Petrobras, and thus the Brazilian government’s oil wealth. At this point it is important to acknowledge Moaz and Russet’s claim that democratic peace is generated by “peaceful competition, persuasion and compromise”, thus the stability of the so called democratic peace, if Moaz and Russet are correct, is on unstable ground, as a result of an increasing turn to the realm of cyber space. The Petrobras incident demonstrates that in cyber space two essential pillars of democratic peace have been removed. This is because the United States has shown that democratic states do not have the inherent respect required of democratic peace theory, when they are operating in the cyber world. Furthermore on the evidence presented it is possible to conclude, if not predict, that democracies such as the U.S would be willing to perform a cyber attack if it enabled some kind of economic benefit. Therefore the growth of the cyber world has simultaneously eliminated the idea of trust between democracies. As a result the likelihood of (cyber)war is much greater.

The counter argument could be made here that Petrobras, despite its majority state ownership, does not amount to a democratic state, hence this example does not undermine democratic peace theory’s requisite that democracies hold mutual respect and compete peacefully. However this is one example of many. If, for example, you examine 2013-14 revelations that the CIA and NSA were exercising a “Special Collections Service”(SCS) unit in Berlin monitoring not only Angela Merkel’s phone conversations, but also the committee rooms of the Reichstag, the future for democratic peace in the cyber realm is bleak. This example demonstrates that not only do democracies not inherently trust democratically elected leaders, but also the legislative bodies within democratic states. Moreover the SCS program has been in operation across Europe operating in other capitals such as Madrid. What this demonstrates, is that if a democratic state has the ability to do something, as the U.S cyber dominance has allowed in this case, it will do it. Furthermore it demonstrates that it will not be restrained by the articulated parameters of democratic peace theory.

Cyberwar presents a decisive challenge to democratic peace theory. The developing nature of warfare allows the logic of the democratic peace to be disputed. This is because cyberwar is not restricted by the confinements of public opinion, this in turn defeats ideas of transparency and trust between democracies. However, as stated, an example of cyberwar, that in itself, disproves the democratic peace cannot be provided; only examples that indicate the likelihood of future cyberwars between democracies. When two democratic states come into collision on an issue divisive enough for them to question the trust on which democratic peace is orientated, the inherent harmony of democracies will collapse. This is beginning to emerge as the U.S utilizes its cyber hegemony to infiltrate other democratic states, in order to understand their intentions, and true capabilities. What cyberwar reinforces, therefore, is that democracy is still in its founding moments and to conclude that it will create a perpetual peace, is to ignore the possibility of development in what we define as peace and war.

Archie is currently a third year undergraduate in the War Studies Department at King’s College London. His dissertation focused on human rights and the war on terror. He is interested in the changing nature of warfare and how it is revealing our rigid definitions of conflict as inadequate and outdated. Archie is hoping to continue his studies within the War Studies Department with an MA in Terrorism, Security and Society.

Filed Under: Blog Article Tagged With: Cyberwar, democracy, Democratic Peace, drones, Petrobras, UK, USA

NATO, State (Re)emergence, and Military Capabilities and Commitments: the Terms of the Debate

October 19, 2015 by Strife Staff

By: Alex Calvo

USS John Fitzerald Kennedy entering Tarragona Harbour in 2002. The city could be an alternative to Rota as a home port for the US Navy missile defence destroyers in the Mediterranean. https://www.flickr.com/photos/imcomkorea/3047221282/in/photolist-5DgNHY
USS John Fitzerald Kennedy entering Tarragona Harbour in 2002. The city could be an alternative to Rota as a home port for the US Navy missile defence destroyers in the Mediterranean. https://www.flickr.com/photos/imcomkorea/3047221282/in/photolist-5DgNHY

 

The possible (re)emergence of states within NATO, at a time of renewed international tensions and widespread concern over the capabilities and commitments of existing member states, means that any such country seeking recognition will have to answer a fundamental question: will the combined capabilities and commitments of the two resulting successor states be greater or smaller than those of the existing parent state? In the run up to the Scottish referendum last year for instance, this was discussed, with some voices in the United States expressing their concern at the possible impact on the military capabilities of Washington’s first and foremost partner. The Atlantic Council, a US-based think-tank published a comparative study of Scotland and Catalonia, which praised the latter, emphasizing plans for naval specialization which fit with perceived US and NATO needs. At the political level, US President Barack Obama expressed his hope that voters would support Scotland staying in the UK, while remaining silent on Catalan independence and deploying USS Philippine Sea (CG 58) to Barcelona a few days before the 9 November semi-official referendum.

The report by the Atlantic Council, and President Obama’s different attitude towards Scotland and Catalonia, are a reminder that each case is different. The (re)emergence of a state within NATO is neither good nor bad in and of itself. It would be as irresponsible to oppose any such internal expansion without a detailed look at the particular case as it would be to blindly welcome it without applying the same careful examinatio. The purpose of this paper is to contribute to the debate, both in general and abstract terms, drawing on the case of Catalonia and Spain as a reference.

GDP. A state’s investment in defence is a measure of its total GDP multiplied by the coefficient determined by its political institutions. The division of an existing state can affect the size of the two resulting economies in different ways. On the one hand, it can lead to smaller and thus less efficient domestic markets. On the other, it can prompt more agile, dynamic, outward-oriented economies. Separation can put an end to the so called “rational underdevelopment” of some regions and to hard-to-justify discriminatory policies in areas like infrastructure, and regional and industrial policy.

A split can have a negative impact, at least in the short run, on both resulting economies if political risk assessments rise, or uncertainty remains over aspects such as the allocation of the national debt. If one of the successor states used to be a net payer to the common treasury (that is, it paid more in taxes than it received in public spending) and the other was a net recipient (it used to pay less than it received), then some questions arise. The short-term question is whether the additional post-independence growth in the net payer will compensate for the drop in the net recipien. In the longer run, the issue is whether the latter will benefit from more rational economic policies and an improved work ethic once it no longer enjoys funds from the former. Both Spain proper and Scotland are net recipients, while Catalonia’s yearly net fiscal transfers to the former are estimated at around 8 percent of the GDP in the last 15 years.

In the case of Catalonia, in 2000, 57 percent of Catalan exports were bound for the Spanish market, with the remaining 43 percent sent abroad; while in 2014, the percentages had reversed. In previous years, boycotts against Catalan products have been organized in Spain proper. The idea behind the boycotts was to prompt Catalan businesses and trade unions to oppose moves for further devolution (in particular the 2006 reform of Catalonia’s “Statute of Autonomy”, a law defining the powers of the regional authorities), for fear of losing market share in Spain proper, with the resulting negative impact on employment. However, rather than diminishing support for independence, such moves have largely backfired, while providing added momentum to the drive for internationalization.Regulated industries (such as banking) still under Madrid’s yoke remain shy when it comes to expanding abroad, but the myriad small and medium-sized enterprises accounting for much of Catalonia’s economic tissue less so, with quite a few having become “pocket multinationals”, that is not very large corporations which are nevertheless present in a wide range of countries. A post-independence boycott by consumers in Spain proper remains a possibility, and would have a negative short-term impact on Catalan GDP, however this would not translate into lower longer-term economic growth, rather the contrary. The reason is that, just like with the boycotts against the 2006 reform of the “Statute of Autonomy”, they would prompt businesses to expand in other countries, thus gaining size and competitiveness. Furthermore, in an independent Catalonia this trend would also involve those industries currently regulated by Madrid, such as infrastructure management and banking, which to date have internationalized to a very small degree. We should also remember that, while Spain’s Castilian core may remain hostile to the new state, Valencia and the Balearic Islands are likely to take a much more nuanced approach. In addition to sharing a language with Catalonia, their economic structure is similar. They also suffer a large fiscal deficit (difference between taxes paid and public spending received) and a lack of infrastructure investment, while their economy is based on small and medium-sized enterprises, which have been excluded by successive Spanish governments from the defence industry and related sectors such as airspace. A third consideration is that the value of Catalan exports to Spain proper include the value added by exporters plus the value of the intermediate goods used to produce them (that is, commodities, energy, and components, bought in Catalonia or abroad by Catalan companies to produce goods bound for Spain proper). Thus, taking the latter out, the effective percentage of Catalan GDP included in exports to Spain proper is lower, 22.5% of the GDP.

Concerning Spain proper, there are no Catalan plans for a boycott, and the independence movement has rather been careful and stress its desire to see good bilateral relations after separation. In that event, as Catalonia opens up further to world trade, and Spanish enterprises lose their current advantage in terms of common legislation and considerable overlap in the mass media sphere, they will face stronger competition from third-country producers in the Catalan market. This could be beneficial for Spanish companies, by forcing them to become more competitive. It would also promote their internationalization in two ways: thanks to this greater competitiveness forced by greater competition in the Catalan market, and due to a loss of market share in Catalonia pushing them to seek alternative markets.

In the short term, however, it is the loss of Catalan subsidies that may have the strongest impact on the economy of Spain proper, which has become structurally dependent on easy money from Catalonia and could suffer a significant GDP loss as these funds dried out. Although the EU and the IMF may push for a gradual easing out of financial flows, with some transitional agreements, Catalan independence would sooner or later mean that the more than 16 billion euros transferred to Spain proper every year would not longer be there. This would not necessarily be bad in the longer term. It could release Spanish entrepreneurial spirits and force a more rational set of economic policies, with for example greater infrastructure spending in industrial areas, more business-friendly tax regulations, and greater competition. Having said this, it is however likely to prompt further defence cuts in the short run. Ideally, this should prompt a fundamental transformation of Spain’s Armed Forces into a smaller, but non-political, agile, and better prepared military. Section 8.1 of Spain’s 1978 constitution reads “The mission of the Armed Forces … is … to defend its territorial integrity and the constitutional order”. This passage, believed to have actually been drafted by the military themselves, is widely understood to mean that Spain’s Armed Forces can be used to prevent Catalan independence, and seemed to be on Defence Minister Pedro Morenes’ mind when he said, in the run up to the 27 September election to the Catalan Parliament, that there would be no military intervention “as long as everybody does their duty”. If to the possibility of a military intervention in Catalonia we add the regular harassment of Gibraltar at sea, we can observe two very serious distractions for the Spanish Armed Forces.

Pyrenees Regiment No. 1 on training exercises. https://www.facebook.com/606201522730252/photos/pb.606201522730252.-2207520000.1445134712./606640706019667/?type=3&permPage=1
Ski Company, First Pyrenees Regiment, training during the Spanish Civil War (1936-1939). This elite unit was set up by mountain sports enthusiasts and served under the Catalan Government.†

Defence investment and procurement. Due to economies of scale, it could be argued that successor states will need to invest more simply to achieve the same capabilities as the parent state. In some cases, it could even be argued that some or all successor states will not be able to afford expensive hardware. On the other hand, this may facilitate greater integration and coordination with allies, with less duplication and fewer prestige projects. It may also lead to a renewed emphasis on maintenance and training, stressing not nominal capabilities, but real, deployable capabilities (which a country can effectively transport, deploy, and maintain).

In the case of Spain, procurement is deeply imbalanced, with the country embarking on expensive projects mainly motivated by a mixture of prestige and industrial policy, rather than operational considerations. The result: a large gap between nominal and real capabilities, problems in deploying and sustaining forces far from her shores, and a lack of funds for training, maintenance, and operations, with the bulk of defence spending going into personnel and procurement. To be fair, these problems are not unique to Spain. For example, the German deployment in Afghanistan was plagued by equipment failures, with a 2014 official report explaining that “only 42 of Germany’s 109 Eurofighters are available for immediate use because of fuselage defects. The navy faces similar problems with only 4 of its 22 Sea Lynx helicopters and 3 of its 21 Sea Kings currently operational.” However, the case of Spain is perhaps even more extreme, going beyond a lack of proper maintenance. A study on “Southern Europe Defence in Times of Austerity” noted that “[t]he Spanish military industrial base ranks tenth in the world and sixth in Europe thanks in part to its stake in EAD, one of the leading global aircraft companies. This means that any major cut in military investment projects in Italy and Spain directly affects their national economies and aggravates the domestic economic crisis environment. This disparity could explain why the Spanish and Italian governments chose to primarily reduce personnel and operations/maintenance programmes rather than investment programmes, whereas the Portuguese and Greek governments reduced defence expenditures across the board.”

Catalonia’s national security community is keenly aware of such problems, as reflected in successive unofficial white papers by the Military Studies Society (SEM). Its latest on defence budgets, published in June, lays down a set of serious, realistic budgetary guidelines for an independent Catalonia, based on the experience of NATO allies. The text stresses that operations (expenditures covering costs for deployed operations outside member state’s territory) and equipment maintenance have “been a problem common to many Western armed forces” due to a lack of “available resources in this area” of maintenance, prompted by the “excessive costs of acquisition programs.” The white paper strongly emphasizes that “The Catalan Defence Forces (CDF) cannot make these mistakes,” and recommends that “the percentage of the defence budget devoted to operations and maintenance should be between 35 and 40 percen.” For Catalonia, starting from scratch after 300 years without her own armed forces, this is a golden opportunity to avoid past mistakes, by both the Spanish military and those of many allies. The result should be a more agile, balanced military, where equipment is purchased according to perceived needs, rather than by industry lobbying, and then properly maintained.

Turning to the legitimate question of whether Catalan defence budgets will be large enough to sustain acquisition programs in areas like strategic airlift, a quick look at the numbers shows this should not be a problem. Catalonia currently accounts for roughly 20 percent of Spanish GDP, Madrid in turn spending 0.6 percent on defence. An independent Catalonia following NATO guidelines, as suggested by the SEM, would thus be spending the equivalent of 0.4 percent of current Spanish GDP. Adding in the expected long-term greater economic growth from the end of fiscal transfers, irrational economic policies, and sabotage to key infrastructures, it is not easy to imagine total Catalan defence spending surpassing the figure for today’s Spain. Spain may well find herself unable to sustain current levels of defence spending, however, since much of these capabilities are either not being properly maintained and used in training, or are directed towards fellow NATO member states (UK) or American allies (Morocco), it is not something that should concern alliance planners much.

Intra-alliance conflict (between successor states, or between the existing parent state and other partners). Concerning post-independence relations between successor states, at one end of the spectrum we could imagine two good neighbours leaving behind tensions and now able and eager to work together, both bilaterally and within wider permanent alliances and ad-hoc coalitions. At the other end of the spectrum, two hostile states with unresolved disputes and at least one failing to rule out a resort to force, prompting most of their capabilities to be addressed at each other rather than available to allies.

When the parent state has persistently been employing non-lethal force against a fellow NATO member state, the question arises whether once reduced in size it will persist in this policy, now with fewer resources, or whether it will abandon such an approach. In the latter case, the impact on the alliance’s capabilities will be doubly positive, since capabilities devoted to intra-alliance conflict will now be available to NATO, as will be those employed by the other member state to defend itself.

In Spain’s case, the country seems able to work with some of her former colonies, as shown by the successful incorporation of some 30 Portuguese commandos in the Spanish Legion’s detachment deployed in Iraq in a training and mentoring capacity. Unfortunately, this seems to be the exception rather than the rule, with Madrid unable or unwilling to recognize Gibraltar’s right to decide her own future, and the ensuing policy of constant harassment. In 2015, from 1 January to 23 June, the Spanish Navy had engaged in 23 violations of British territorial waters, while absent from BALTOPS201 , in a reminder that in a world with limited resources, failing to rule out the use of force against a fellow ally puts a dent on any potential contribution to NATO. It also has an impact on that ally’s contribution. Thus, when measuring Spain’s net contribution to the Atlantic alliance, we should subtract all the assets and capabilities devoted to the harassment of Gibraltar, plus the corresponding British assets and capabilities employed to defend the people of the Rock. Catalonia, having excellent relations with Gibraltar and the United Kingdom, which the national security community sees as a key partner, does not suffer such handicap. The new state will not have to spend a cent on disturbing the life and property of her Majesty’s subject

Ceuta and Melill, two cities located in North Africa, the former right in front of Gibraltar, administered by Spain but claimed by Morocco, also merit a mention. While this conflict is more low key, a significant portion of Spanish forces are deployed with their defence in mind. Since Morocco is a US Ally, again we would have to subtract them when measuring Madrid’s potential contribution to NATO. Not a problem for Catalonia, which is not party to any territorial conflict with the North African country. To add insult to injury, Ceuta has become the main logistic support base for the Russian Navy in the Mediterranean and North-East Atlantic, with Madrid blatantly disregarding Western sanctions in the wake of the Crimean crisis. In 2014 for instance, Russian warships docked at Ceuta on 13 occasions, while nine such visits have taken place in the first six months of 2015. By opening up Ceuta to Moscow, Madrid has forfeited the claim that it is in NATO’s interest to see Catalonia, including key ports like Tarragona and Barcelona, remain in Spanish hands.

Pyrenees Regiment No. 1 on training exercises. http://webs.racocatala.cat/cat1714/milicies2.htm

Defence industrial policy and international defence industry cooperation. Smaller domestic weapons markets can be cited as having a potentially negative impact. On the other hand, in those states where the dominant nationality has excluded another from the defence industry, the resulting end to the defence industry “apartheid” may enable weapons development and production to take root. In particular, where the excluded territory used to have an arms industry earlier in its history, and retains a significant civilian industrial base, as is the case in Catalonia.

The issue for third countries — in particular those involved in international consortia featuring the existing parent state — is the net impact. This may depend on possible synergies with existing civilian industries in the territory previously excluded from arms production.

Successive Spanish governments have excluded Catalan enterprises from the defence industry and many dual sectors, while subsidizing production in areas like Seville (Airbus Group), with little or no industrial tradition. A 2015 official report on Spain’s security and defence industry provides details of 47 companies, none of which is based in Catalonia, with only three in Valencia Region. Madrid has also strived to keep Catalonia isolated from southern France, home to most of the country’s aircraft industries. An end to this defence policy “apartheid” would allow Catalan enterprises to expand into the defence—and dual—industries, in a move which would benefit maritime democracies, including partners in the F-35 consortium. Spanish industry would contract, but this would liberate the country’s partners from the extra costs involved in manufacturing in regions with no industrial traditio. A look at FDI (foreign direct investment) reveals a completely different geography from that of the defence industry programs jointly sponsored by Spain’s Defence and Industry Ministries. In the second quarter of 2015, 35.1 percent of Spain-bound industrial FDI went to Catalonia, while none of Spain’s at least 300 8×8 wheeled infantry fighting vehicle (IFV) based on General Dynamics’ Piranha 5 will be manufactured in Catalonia. The initial order is expected to be worth EUR1.5 billion.

The location of Airbus Group’s plant in Seville, in the southern region of Andalusia, where there is little private industry, does not make sense. From a French perspective, a Catalan town would seem more logical, since French aeronautical industry is concentrated around Toulouse, close to Catalonia. This would also benefit UK taxpayers, given the significant connection between the Spanish and British defence industries, to a large extent due to the two countries’ cooperation in aircraft projects. According to the official Spanish report on 2014 weapons exports, the United Kingdom ranked first among the country’s customers, with purchases worth 862.7 million euros, 26.9 percent of the total. The report explains that three aerial refuelling tankers accounted for 573,9 million euros and a transport airplane for 121.8 million euros, with a portion of the balance coming from parts for the EF-2000 fighter and the A400M military transport plane. As we can see, this is not trade in finished weapons systems, but rather intra-industry trade among countries cooperating in joint projects, where the distribution of the work involved is often related to the volume of orders from each defence ministry. Therefore, by excluding Catalan industry and imposing manufacture in areas like Seville, with little tradition of private industry, Madrid is raising the total cost of production of these aircraft.

Cohesion, internal security. When an existing state resorts to force, or the threat of force, to retain its present territory and population, a portion of its security and defence capabilities will have to be devoted to this task, and thus unavailable to NATO. Distracted by the need to coerce part of their population into remaining, collective defence may not be a priority.

This is the case in Spain, where the military granted itself the duty and right to employ force to keep the country together in the 1978 Constitution. The 2006 Statute of Autonomy, Catalonia’s last attempt to find a reasonable accommodation within Spain, also prompted sabre rattling, and on 17 May 2015 Catalan police caught three Spanish soldiers stealing an independence flag in Figueres. Stealing flags is obviously not the best way to train for NATO operations, while wasting Catalan police’s time does not contribute to the fight against Jihadist terrori. Every minute spent by Catalan police officers investigating such deeds is a minute not spent fighting against international terrorism and organized crime. The extent to which the resort to force to prevent Catalan self-determination distracts and perverts Spanish defence policy is clear from available statistic. While the defence budget has shrunk by 32 percent since 2008 (68 percent according to some sources, but this may not fully take into account defence spending from other departments’ budgets, for example the Industry Ministry to fund weapons programs involving domestic manufacturing, as well as extra-budgetary liabilities), that of the National Intelligence Centre (CNI) grew by 9.7 percent in 2015. Details may not be available on open sources, but it is suspected that the bulk of this increase is devoted to the “dirty war” against the Catalan independence movement.

Catalonia, on the other hand, has made clear from the outset that Val d’Aran, with her own language and culture, was free to join the new state or go her own way. No Catalan military capabilities will be needed to keep inside those who want out. Whether Spain without Catalonia will stop seeing the military as a political actor is not clear at this stage. Ideally this change should take place, releasing military capabilities currently not available to the Atlantic alliance.

Citizens’ loyalty: Draft and reserves. If some citizens within the parent state feel little loyalty, or even a measure of hostility towards it, for whatever reasons (justified or otherwise), there may be a gap between its theoretical manpower pool and the actual number of deployable citizens, be they regular or reserve. While the parent state may resort to a purely professional military to avoid this problem, it may then translate into a lower degree of political support for defence policies.

This is clearly the case in Spain, where there is little love between the state’s Castilian core and many of her non-Castilian citizens, leading to a downward spiral where the more the centre uses—or threatens to use—force against those wishing to leave, the less the latter feel bound to support the former’s resort to force as a legitimate instrument of foreign policy. Many Catalan citizens who feel alienated by the Spanish military may well wish to support their Catalan counterpart, for example by joining the reserves, making the combined manpower pool available to the two successor states larger.

Transitional issues: Inheriting defence assets and personnel. Downsizing and building one’s military. In addition to wider economic issues, the transition from parent state to successor states also features some aspects specific to the military. Among them, the distribution of existing defence assets and personnel and the accompanying downsizing of the parent state’s and (re)creation of the successor states’ armed forces.

Concerning the distribution of Spanish military assets, preliminary defence planning in Catalonia has featured two views, with some analysts favouring the taking over of some naval and air assets, while others prefer to avoid systems not necessarily best suited to Catalan and allied needs. With regard to Spanish military personnel wishing to join Catalonia’s Armed Forces, the issue is highly sensitive and has not been publicly discussed by the Catalan Government. However, both the Catalan Government and parties have stressed that Spanish Government employees in Catalonia will keep their jobs after independence, and in so doing they have not excluded any category. The Advisory Council on the National Transition, a government agency tasked with preparing a number of white papers to prepare for independence, also refers to Spanish Government workers without excluding the military, although again without referring to them explicitly. Some members of the Spanish military may have discreetly enquired about the possibility of joining Catalonia’s Armed Forces, but they are unlikely to do anything which may put their jobs at risk until this possibility is a real one. We could also mention that when Catalan Police, the Mossos d’Esquadra, began to expand in the 1980s to become responsible for most public security duties, Spanish Police and Civil Guard (a constabulary-type force) officers in Catalonia were given the chance to join. Catalonia may also need to provide for those members of the Spanish military who do not wish to follow this route but who refuse to follow orders contrary to international law and fear subsequent reprisals.

Conclusions. The factors discussed are only a sample of those that may have an impact on state succession within NATO, resulting in greater or lesser capabilities and commitments towards the alliance. This work should ideally be followed by more extensive research and case studies, but should at least serve the purpose of underlining that, no matter how distressing the (re)emergence of states can sometimes be, the consequences to defence policy should be approached rigorously. It is also a reminder that any new state wishing to be recognized by existing states will have to explain to the international community how it will not only defend itself but also its allies and partners. Even more so at a time of increasing tensions, a country’s contribution to collective security is bound to be one of the main factors determining its recognition, or lack thereof, by the international community.

In the case of Catalonia, preliminary defence planning is geared towards the creation of a modern, capable, and agile military, ready to protect the country’s territory and population and make a powerful, positive contribution to NATO. This scenario could also give Spain the chance to reform her own military, in which case the Atlantic alliance would gain two net security contributors. However, it is still too early to say whether Catalan independence will prompt a rationalization of Spanish defence policy and thus a positive contribution to NATO from Madrid.

Alex Calvo, a guest professor at Nagoya University (Japan), focuses on security and defence policy, international law, and military history, in the Indian-Pacific Ocean Region. He tweets at Alex__Calvo and his work, which includes “China’s Air Defense Identification Zone: Concept, Issues at Stake and Regional Impact”, Naval War College Press Working Papers, No 1, US Naval War College, 23 December 2013, is available at http://www.usnwc.edu/Publications/Working-Papers/Documents/WP1-Calvo.aspx, can be found at https://nagoya-u.academia.edu/AlexCalvo

† http://www.facebook.com/606201522730252/photos/pb.606201522730252.-2207520000.1445134712./606640706019667/?type=3&permPage=1

Filed Under: Long read Tagged With: Africa, Catalonia, Cueta, Gibraltar, independence, Melill, NATO, Russia, Scotland, Spain, UK, United States

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to page 5
  • Interim pages omitted …
  • Go to page 7
  • Go to Next Page »

Footer

Contact

The Strife Blog & Journal

King’s College London
Department of War Studies
Strand Campus
London
WC2R 2LS
United Kingdom

[email protected]

 

Recent Posts

  • Beyond Beijing: Russia in the Indo-Pacific
  • Book Review: The Father of Modern Vaccine Misinformation - “The Doctor Who Fooled the World: Science, Deception, and the War on Vaccines” by Brian Deer
  • Strife Call for Papers: 2022 Series
  • Space Age Threat: How Hypersonic Missiles Are Changing Strategic Stability
  • A View to the Threat Environment: Perspective from General David H. Petraeus

Tags

Afghanistan Africa Brexit China Climate Change conflict counterterrorism COVID-19 Cybersecurity Cyber Security Diplomacy Donald Trump drones Elections EU feature France India intelligence Iran Iraq ISIL ISIS Israel ma Myanmar NATO North Korea nuclear Pakistan Politics Russia security strategy Strife series Syria terrorism Turkey UK Ukraine United States us USA women Yemen

Licensed under Creative Commons (Attribution, Non-Commercial, No Derivatives) | Proudly powered by Wordpress & the Genesis Framework