298,952 research outputs found
Strange Bedfellows: The Convergence of Sovereignty-Limiting Doctrines in Counterterrorist and Human Rights Discourse
It is hard to imagine two groups with less in common than national security hawks and human rights activists. They represent different cultures with different views on the use of force, the role of rights, and the constraining power of international law. Yet despite their differences, the two groups seem to be converging on an understanding of state sovereignty as limited and subject to de facto waiverâan understanding that appears to legitimize military interÂventions even in the absence of state consent and Security Council authorization.
This convergence is reached via different routes in each community: for the national security community, counter terrorism provides the sovereignty-limiting logic, while for the human rights and humanitarian law communities, it is the prevention of atrocities that leads to sovereignty-limiting doctrines.
In this essay, the author traces how this convergence has come about in two very different discourse communities, and points out some of the unintended consequences and unresolved problems that result
Thinking about engaging North Korea: A study on the framing of the U.S. human rights public discourse in the Washington Post and New York Times between 2001 and 2017
North Korea said in January 2019 that it was exploring ways to engage the human rights issue. This was a much welcomed announcement because the issue must be addressed in order for the two countries to reach a formal, comprehensive peace agreement and the lifting or easing of unilateral sanctions. This study utilizes framing as an analytical tool to examine how the North Korean human rights discourse is framed in the United States for the purpose of identifying the salient rightsâbased issues covered in two traditional media outlets, namely, the Washington Post and New York Times. Next, it reframes the discourse using a coding schema based on the convergence of the human rights, human security, and nonâtraditional security discourses. A reframing of the discourse highlights how the universalistâparticularist debate in the traditional rightsâbased literature masks the underlying issues of the rights problem. A combination of the traditional rightsâbased discourse and the masking of the issues contributes to a disconnect in the way in which North Korea has been engaged in the past. Therefore, a reframing of the discourse using the convergence of the human rights, human security, and nonâtraditional security discourses could open new pathways for engagement
Not quite the 'Great Britain of the Far East': Japan's security, the US-Japan alliance and the 'war on terror' in East Asia
Japan, in responding to US expectations for support in the 'war on terror', has displayed a degree of strategic convergence on global security objectives, thus prompting policy-makers and observers to dub it the 'Great Britain of the Far East'. This article argues, however, that Japan is far from assuming this role. For Japan, the 'war on terror' serves more as a political pretext for legitimating long-planned changes in military security policy that are often only marginally related to the US's anti-terrorism agenda. Instead, Japan has focused much more on using the terror threat rationale as a means to push forward its response to the regional and traditional security challenges of North Korea and China, even if at times it attempts to depict both as 'new security challenges' or as involving elements of counterterrorism. The final conclusion is that US military hegemony may be weakened by Japan's and the Asia-Pacific's potential divergence from the US global security agenda
Recommended from our members
Smart Computer Security Audit: Reinforcement Learning with a Deep Neural Network Approximator
A significant challenge in modern computer security is the growing skill gap as intruder capabilities increase, making it necessary to begin automating elements of penetration testing so analysts can contend with the growing number of cyber threats. In this paper, we attempt to assist human analysts by automating a single host penetration attack. To do so, a smart agent performs different attack sequences to find vulnerabilities in a target system. As it does so, it accumulates knowledge, learns new attack sequences and improves its own internal penetration testing logic. As a result, this agent (AgentPen for simplicity) is able to successfully penetrate hosts it has never interacted with before. A computer security administrator using this tool would receive a comprehensive, automated sequence of actions leading to a security breach, highlighting potential vulnerabilities, and reducing the amount of menial tasks a typical penetration tester would need to execute. To achieve autonomy, we apply an unsupervised machine learning algorithm, Q-learning, with an approximator that incorporates a deep neural network architecture. The security audit itself is modelled as a Markov Decision Process in order to test a number of decisionmaking strategies and compare their convergence to optimality. A series of experimental results is presented to show how this approach can be effectively used to automate penetration testing using a scalable, i.e. not exhaustive, and adaptive approach
Optimizing Outcomes in Security Organizations
The optimization of security operations in larger organizations has often centered around discussions of the relative degree of convergence of the physical security functions and the cybersecurity functions. In a collaborative effort with an academic group and a security advisory group, it was determined to explore the factors to be considered when larger organizations make decisions about the placement, governance and operational strategies are evaluated and proposed for update or revision. A broad multipart project has been conceived to explore this topic. This initial study will quantify some of the precursors that influence optimization outcomes in security function convergence, present these criteria as a survey, and take a snapshot of these criteria in the practice setting. A subsequent study will use individuals who have responded to the survey to identify those from organizations that exhibit characteristics from many difference degrees of convergence and optimization. Those individuals will be interviewed to develop additional understanding of the complexities of security convergence and optimization. The planned stream of research will seek to document ways to measure security optimization and how to make such measurements
EU-China security cooperation in context. EUI Working Paper RSCAS 2015/31 (European University Institute).
The paper has two main aims. First it seeks to explore whether security cooperation between the EU and China is taking place, and if so, whether it is evenly spread across a number of security dimensions. Second it intends to investigate the underlying motives or drivers that either facilitate or inhibit EU-China security cooperation. Further, it will explain why the EU rather than EU member states is chosen as the unit of analysis, explore the development of EU-China security relations, and illustrate how historical legacies, identity aspects and differences over key issues, such as sovereignty and territorial integrity, affect EU-China security relations. In addition, it will deal with the theoretical and conceptual underpinnings of the study on EU-China security relations, paying particular emphasis to the concepts of diffusion and convergence. Whether or not EU-China security cooperation converges in one of the ten chosen security dimensions will be assessed by the degree of policy conformity the EU and China are able (or unable) to obtain with regard to threat perceptions and policy response thereto. Attention will be devoted to diffusion factors which can affect changes in the perception of threats and response thereof. Among these factors are changes in (geo-political) structure, interests and norms. A further objective of the paper will be to explore whether policy convergence on threat perceptions and response thereto might be a precondition for joint action, or whether practical cooperation can take place without prior policy convergence between the EU and China. The paper will round off with a short section introducing the security dimensions that are being examined in the more detailed study on which this paper is based
- âŠ