{"title":"Transcending the fog of war? US military ‘AI’, vision, and the emergent post-scopic regime","authors":"Hendrik Huelss","doi":"10.1017/eis.2024.21","DOIUrl":"https://doi.org/10.1017/eis.2024.21","url":null,"abstract":"The integration of ‘AI’ technologies into weapon systems introduces a complex dimension to international relations and security, championing technological solutions for enduring warfare challenges, notably enhancing ‘situational awareness’ through advances such as automated ‘vision’. However, the discourse, particularly in Western militaries like that of the United States, often overlooks inherent limitations and issues in AI-based warfare. This paper explores ‘AI’s’ implications for military vision by <jats:italic>inter alia</jats:italic> scrutinising the US military’s Joint All-Domain Command and Control (JADC2) process. It argues that the US military actively transforms the observation, decision, and action apparatus, progressively substituting human vision and decision-making, leading to a multidimensional de-visualisation. This denotes fundamental changes in human perception, reshaping knowledge, control, and agency dynamics. In conclusion, the paper suggests an imminent era of de-visualisation in the military – a deliberate relinquishment of human control for perceived military efficiency and effectiveness. This marks a transformative shift, urging nuanced consideration of the profound impact of ‘AI’ technologies on warfare dynamics.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141187918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anything you can do [I can do better]: Exploring women’s agency and gendered protection in state militaries","authors":"Ayelet Harel","doi":"10.1017/eis.2024.22","DOIUrl":"https://doi.org/10.1017/eis.2024.22","url":null,"abstract":"Women who are currently serving in a variety of combat roles and combat support positions in many state militaries around the globe have had to struggle for their positions by proving their abilities, and such struggles are still ongoing. Based on interview materials with veterans, this article examines the ways in which the veterans interpret their roles as women in combat positions and how they understand agency. The article further traces how their presence in war could alter the gendered meaning of protection. While the military is a key institution of overt gendered power in the state, women combatants’ voices can create a crack in the masculine dominance that is taken for granted in state narratives; they can also create a wedge that allows in a reconsideration of gendered roles and power relations in the context of militaries, thereby offering more nuanced interpretations of protection and agency.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141172787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberbiosecurity in the new normal: Cyberbio risks, pre-emptive security, and the global governance of bioinformation","authors":"Noran Shafik Fouad","doi":"10.1017/eis.2024.19","DOIUrl":"https://doi.org/10.1017/eis.2024.19","url":null,"abstract":"<p>The Covid-19 pandemic saw a surge in cyber attacks targeting pharmaceutical companies and research organisations working on vaccines and treatments for the virus. Such attacks raised concerns around the (in)security of bioinformation (e.g. genomic data, epidemiological data, biomedical data, and health data) and the potential cyberbio risks resulting from stealing, compromising, or exploiting it in hostile cyber operations. This article critically investigates threat discourses around bioinformation as presented in the newly emerging field of ‘cyberbiosecurity’. As introduced by scholarly literature in life sciences, cyberbiosecurity aims to understand and address cyber risks engendered by the digitisation of biology. Such risks include, for example, embedding malware in DNA, corrupting gene-sequencing, manipulating biomedical materials, stealing epidemiological data, or even developing biological weapons and spreading diseases. This article brings the discussion on cyberbiosecurity into the realms of International Relations and Security Studies by problematising the futuristic threat discourses co-producing this burgeoning field and the pre-emptive security measures it advocates, specifically in relation to bioinformation. It analyses how cyberbiosecurity as a concept and field of policy analysis influences the existing securitised governance of bioinformation, the global competition to control it, and the inequalities associated with its ownership and dissemination. As such, the article presents a critical intervention in current debates around the intersection between biological dangers and cyber threats and in the calls for ‘peculiar’ policy measures to defend against cyberbio risks in the ‘new normal’.</p>","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140810127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Timing bombs and the temporal dynamics of Iranian nuclear security","authors":"Ryan K. Beasley, Ameneh Mehvar","doi":"10.1017/eis.2024.20","DOIUrl":"https://doi.org/10.1017/eis.2024.20","url":null,"abstract":"<p>For more than two decades, Iran’s nuclear programme has concerned policymakers and scholars alike. Whether speeding up uranium enrichment, slowing down international negotiations, or disrupting the timing of key initiatives, actions around Iran’s nuclear programme bear a clear time signature. Yet systematic accounts of the importance of time in shaping foreign and security policymaking have been largely neglected. Through foreign policy timing theory’s (FP4D) reconceptualisation of time we show how actors both constructed and then used time to pursue their strategic interests, creating, altering, and sabotaging the timing mechanism linking Iranian nuclear technology and international sanctions. These manipulations of time by both domestic and international actors resulted in prolonged international negotiations and fluctuating periods of crisis and produced a temporally flawed agreement frozen in time. We consider time’s impact on the current challenges and future direction of nuclear diplomacy with Iran as well as its importance for broader nuclear security issues.</p>","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140810124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The military-strategic rationality of hybrid warfare: Everyday total defence under strategic non-peace in the case of Sweden","authors":"Kristin Ljungkvist","doi":"10.1017/eis.2024.18","DOIUrl":"https://doi.org/10.1017/eis.2024.18","url":null,"abstract":"<p>This article explores the emergence of new military-strategic rationalities in relation to conceptions of hybrid warfare in the grey zone through a case study of Sweden’s reinstatement of total defence since 2015. Through a governmentality-inspired approach, I analyse what it means for the organisation of a new total defence when one of the main threats to be dealt with is daily antagonistic but highly ambiguous hybrid attacks. I illustrate how conceptions of an ambiguous strategic non-peace entails a move beyond war preparedness into urgent demands for an everyday active total defence that hinges on a ‘martialisation’ of civilian life. This in turn run the risk of challenging fundamental democratic principles and civil liberties. The analysis contributes to an increased understanding and uncovering of the politics made possible by a military-strategic rationality geared towards hybrid threats in the grey zone – which in the Swedish case has resulted in a historically specific version of total defence that builds on a highly diffused and rather extreme form of decentralised defence.</p>","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"‘We’ instead of ‘me’: How Buen Vivir Indigenous cosmopraxes allow us to conceive security differently and face insecurities together","authors":"Juliano Cortinhas, Yara Martinelli, Ricardo Barbosa","doi":"10.1017/eis.2024.10","DOIUrl":"https://doi.org/10.1017/eis.2024.10","url":null,"abstract":"Although Critical Security Studies (CSS) has done much to advance security debates, some shortcomings remain. Its excessive focus on the individual – which we term ‘me’ – reduces CSS' capacity to propose solutions to current global security problems such as pandemics and climate change. This paper contributes to the emerging scholarship on the potential of relational ontologies in Security Studies by introducing <jats:italic>Buen Vivir</jats:italic> Indigenous cosmopraxes into the debate. Indigenous cosmopraxes such as <jats:italic>Sumak Kawsay, Suma Qamaña</jats:italic>, and <jats:italic>Teko Kavi</jats:italic>, we argue, can inform CSS by providing alternative considerations to the pluriverse of ideas that address security crises. These cosmopraxes, which make up the broad notion of <jats:italic>Buen Vivir</jats:italic>, provide a way to think and enact security from a collective perspective, one that emphasises ‘we’ instead of the liberal self. In that sense, these cosmopraxes allow us to conceive security differently and face insecurities together.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Costantino Pischedda, Andrew Cheon, Sara B. Moller
{"title":"Can you have it both ways? Attribution and plausible deniability in unclaimed coercion","authors":"Costantino Pischedda, Andrew Cheon, Sara B. Moller","doi":"10.1017/eis.2024.14","DOIUrl":"https://doi.org/10.1017/eis.2024.14","url":null,"abstract":"States and non-state actors conduct unclaimed coercive attacks, inflicting costs on adversaries to signal resolve to prevail in a dispute while refraining from claiming or denying responsibility. Analysts argue that targets often know who is responsible, which enables coercive communication, and that the lack of claims of responsibility grants coercers plausible deniability in the eyes of third parties. The puzzle of different audiences holding different beliefs about who is behind an unclaimed attack, even when they may have the same information, has been neglected. We address this puzzle by theorising that targets and third parties tend to reach different conclusions due to distinct emotional reactions: targets are more likely to experience anger, which induces certainty and a desire to blame someone, as well as heuristic and biased information processing, prompting confident attribution despite the limited evidence. A vignette-based experiment depicting a terrorist attack lends empirical plausibility to our argument.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EIS volume 9 issue 2 Cover and Back matter","authors":"","doi":"10.1017/eis.2024.17","DOIUrl":"https://doi.org/10.1017/eis.2024.17","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140732322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EIS volume 9 issue 2 Cover and Front matter","authors":"","doi":"10.1017/eis.2024.16","DOIUrl":"https://doi.org/10.1017/eis.2024.16","url":null,"abstract":"","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140728323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Resilience through total defence: Towards a shared security culture in the Nordic–Baltic region?","authors":"Jana Wrange, Rikard Bengtsson, Douglas Brommesson","doi":"10.1017/eis.2024.15","DOIUrl":"https://doi.org/10.1017/eis.2024.15","url":null,"abstract":"This article investigates the defence policies of the Nordic and Baltic countries from the perspective of shared security culture. To that end, the article analyses conceptualisations of total defence and resilience in a comparative perspective and inquires into existing and prospective regional cooperation in this area, in order to determine to what degree there exists a common security culture based on shared norms and identities and manifested in practices of security cooperation. The study, which draws on 19 interviews with civil servants from the eight states of the region, shows that while there is fertile ground for a shared security culture to emerge, thus far, due to variations in conceptualisations, threat perceptions, and interaction preferences, only three Nordic states show clear signs of a shared security culture. The study contributes to existing research by situating the concept of resilience in (total) defence discourses; by expanding the theoretical work on security culture to an international context; and by offering a unique empirical account of the process of (re)building total defence policies in a region crucial to European security.","PeriodicalId":44394,"journal":{"name":"European Journal of International Security","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140567553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}