160 likes | 285 Views
Enhancing National Security through Communication. By E. Remi Aiyede Department of Political Science University of Ibadan eaiyede@yahoo.com. Introduction . The Modern state is a security state
E N D
Enhancing National Security through Communication By E. Remi Aiyede Department of Political Science University of Ibadan eaiyede@yahoo.com
Introduction • The Modern state is a security state • The changing security Environment, globalisation, revolution in communication and information technology (ICT) terrorism, the place of civilians in threats • Volatility of the security sector in Africa in the post-cold war era, coming from non-state actors aided by ICT • Communication has always been an important element of peace and conflict management. • In the post-cold war era things have changed affecting the notion of security. • Thus, this paper explores the concept of national security as it has evolved over time, with its implactions for security policy and practice. • The mutations in the natutre of security challenges, both man made and natural disasters • The increasing centrality of communication and communication infrastructure to security threats, state legitimacy and policy action in the security sector.
Tracing the Evolution of the Concept of security • Traditonal concept of security • In national terms and in relation to the state • Lipman (1943:25) asserts that “a nation is secure to the extent that it is not in danger of having to sacrifice her core values, if it wishes to avoid war, and is able if challenged to maintain them by victory in such war”. • In this context threat to national security, comes from the military power of other states. Security then refers to the ability of the state to protect itself by military power. But from the 1960s it became clear that this narrow view is not good enough because of the linkages of the military with other sectors. • McNamara (1968:149) argued, that “Any society that seeks to achieve adequate military security against the background of food shortages, population explosion, low level of productivity, per capita income and technological development, inadequate and inefficient public utilities and a chronic problem of unemployment has a false sense of security.”
Tracing the Evolution of the Concept of security • The revolution in information and communication technology. The speed with which developments spread across national borders, threaten regional and global stability in diverse ways • The use to which new technology could be put, especially by terrorist groups. The changing nature of crime and threats • The collapse of the Berlin wall, the dissolution of the former Soviet Union and the emergence of the United States as the world’s greatest power • The event of September 11 2001. • complex social, political and economic developments, threaten the welfare and health of societies and individuals in unanticipated ways.
Tracing the Evolution of the Concept of security • In Peoples, States and Fear, Buzan (1991) questioned the traditional conception of security. For him, security is of various dimensions and it relates to human collectivities, including the state. There are five major aspects of security. These are military, political, economic, societal and environmental aspects. • ‘Copenhagen School’ of security studies, later challenged the universal focus on the state as the ‘referent object’ of security • In the case of Africa Cilliers (2004:9) observed that state security, in most of Africa, is not threatened by conventional armed attack by other countries “but by more insidious measures many of which flow from the very weakness of the state and its absence of control over its territory”.
That is why Booth (1991:319) argues that security is emancipation: • ‘Security’ means the absence of threats. Emancipation is the freeing of people (as individuals and groups) from those physical human constraints which stop them carrying out what they would freely choose to do. War and the threat of war is one of those constraints, together with poverty, poor education, political oppression and so on. Security and emancipation are two sides of the same coin. Emancipation, theoretically, is security. • Then enter: Human security. • United Nations Commission on Human Security (2003) notes in its maiden report that human security is a concept that combines “human protection and development and interconnects peace, security and sustainable development”. It emphasized that human security should not focus on macro—state level but also at community and individual level. • Another significant concept in dealing with the challenges of security is the concept of national power
Issues & Challenges • Soft power refers to ‘the ability to get what you want through attraction rather than coercion or payments. It arises from the attractiveness of a country’s culture, political ideals, and policies. Soft power rests on the ability to shape the preferences of others” (Nye 2004: x, 5). • Hard power on the other hand refers to military might, as supported by the population, and economy. Thus, national power is “not just about visible military assets but also aptitude to innovation, the soundness of social institutions and the quality of the knowledge base”.
The practice of National security • The Practice of National Security during the Cold War: • Containment, Deterrence, and Proxy Wars • National Security in the Post-Cold War: • Counter Terror, Counter Insurgency, Global Institutions and Peace • Example: Bush Doctrine vs Obama • conscious decision to remove terms such as "Islamic radicalism", instead speaking of terrorism generally. • Balance of power is of limited utility; soft power is increasingly important • Cooperation between states, international organizations and NGOs can be effective and sustained.
The Practice of National Security • In this practice, threats to human security has broadened to include, economic threats, food threats, health threats, environmental threats, personal threats, community threats, political threats, demographic threats, crime in all forms, including terrorism, natural disasters, violent conflicts and wars, genocide, anti-personnel mines etc. • new means for addressing security, such as humanitarian intervention or humanitarian help, peacekeeping operations, peace building, arms verification operations, respect for human rights and liberties, sustainable economic development, early warning, diplomatic missions, focused (smart) sanctions, preventive deployment of armed forces, preventive diplomacy, stronger civil society, empowerment strategies, assuring the minimal life standards, et • The emergence of hybrid organisations. • Is the military suitable for policing?
The ICT Revolution and the Security Architecture in Africa • Growing dependence on communication infrastructure for security, crisis management, e-commerce, and payments. Industry and government increasingly rely on satellite infrastructure for data, voice, and video communications and services on national and global basis. • Cheap access to communication technology has enabled several actors to become key players in providing access to and delivery of information. Shirky(2008) in The Power of Organising without Organisation declares: “Loosely coordinate groups can now achieve things that were previously out of reach for any other organisational structure.” • The expansion in social media enables rumours, misinformation, and inflammatory communications to reach a wider audience more quickly than ever before, sometimes precipitating panic and violence. In some instances, such rumours have had significant adverse effects on other indices of human security.
The ICT Revolution and the Security Architecture in Africa • Leaders of such groups have used social media to play up grievances and divisions in order to mobilize support for their armed movements. Narrow interests continue use newspapers and radio programme to spread political disinformation and divisive ideas that have led to great upheavals in many African states. Rumours and misinformation have preceded violence and instability where government management of information and capacity to communicate with citizens are weak. • Communication has become central n contemporary times to national security. In the first instance, insurgents and terrorist rely on communication as they strive to pass their message across to vast population and seek support. Witness the impact that Inspire Magazine has had on potential recruits for al Qaeda (Stewart 2013)1. • effective communication is always central to security, stability and government legitimacy. Under the current revolution in ICT which has shrank space and intensified interactions across national borders, effective communication has become more challenging especially for weak and fragile states as they try to deal with crime, insurgency and terrorism.
The ICT Revolution and the Security Architecture in Africa • Although the cold war ideological warfare is over, ideological wars based on religious extremism and ethnic chauvinism have taken their places. Governments and insurgents or terrorists compete with opposing narratives for the trust and support of local populations. • “ICT asymmetrically enabled the capability of relatively small outfits with otherwise limited conventional military power by facilitating their ability to communicate plan, gather information, transfer funds, organise themselves, and establish command and control networks from disparate and at times highly isolated locations around the world” (Siegle 2013:114). Thus, Siegle argues that growing access to information and communications technology (ICT) is a two-edged sword in fragile and transitioning states.
The ICT Revolution and the Security Architecture in Africa • ICT provides governments with new tools to reach out to these populations, thereby contributing to stability through the enhanced legitimacy of political systems, greater transparency, and improved government responsiveness to societal priorities. National security communities, including the United Nations Peacekeeping interventions use satellites for critical activities such as military support, intelligence gathering, and disaster preparedness. There are also several independent ICT initiatives across Africa that has been used to promote openness and give voice to dissent and minorities, help farmers track the fertility cycles of cows, fight corruption in government, provide early warning systems for natural disasters. Peace keeping radio stations have contributed to media development in post conflict countries like Somalia, Liberia and Cote d’Ivoire where UN-backed radio services provide local news programmes and nonpartisan public affairs forum (Livingston 2011). • More needs to be done.
Conclusion • The new national security concept demands a new way of thinking about security and a different way of managing security. • Information communication has become central to security as different forces compete for the hearts and mind both local and global populations. • Exchanges of goods, information, ideas, and people are also far denser and more variable than they were even a dozen years ago. New forms of threats from networked, global insurgencies fuelled by transnational non-state armed actors ranging from extremist movements (such as al-Qaeda) to transnational criminal organisations such as drug cartels, or gangs have emerged. • Military and police interaction in domestic space are required in concert with new security structures to provide security against such threats. Interagency communication and coordination becomes critical.
Conclusion • The importance of communication and communication infrastructure is obvious: ICT has been deployed by terrorists, criminals and insurgents. They also target communication infrastructure which can hamper critical financial services processes with grave consequences for the national economy. • The big challenge for governments in Africa is to become more proactive in taking advantage of the revolution in ICT to enhance communication with citizens. • Policy: An open society in which there is free flow of information creates a market of ideas and opportunities for citizens engagement and empowerment. Such an environment promotes trust and reduces the potency of rumours. • As government hears from citizens and respond to them through policy priorities, it becomes more responsive and accountable. ICT provide opportunities for governments to deepen their interaction with citizens. • Such agencies face great accountability challenges beyond the hierarchy.