{"title":"Dealing with Divergence: Intra-party Dynamics and Spoiler Management in Civil Wars","authors":"Desirée Nilsson, M. S. Kovacs","doi":"10.1093/jogss/ogad003","DOIUrl":"https://doi.org/10.1093/jogss/ogad003","url":null,"abstract":"\u0000 Civil war peace processes are frequently accompanied by spoiler behavior relating to intra-party divergence, such as leadership struggles or breakaway groups, which risk undermining the implementation of a peace accord. However, previous literature has not sufficiently explored how third-party actors can address spoiler behavior linked to such intra-party aspects. This study addresses this gap by providing an empirical analysis of a few illustrative cases of spoiler behavior by armed actors in two peace processes in West Africa—Sierra Leone after the 1999 Lomé peace accords and Liberia after the 2003 Accra peace agreement. We find that in contexts where there is a vertical divergence between the leader and the rest of the group, divisive strategies—aimed to divide and rule or marginalize—are effective. In contrast, in situations of horizontal divergence between different factions that are more equal in power, integrative strategies—aimed at unifying the ranks or reconciling a divided leadership—are more appropriate. This study enhances our understanding of how third-party strategies can be devised to manage intra-party divisions that otherwise may threaten a transition from war to peace.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"87 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74490195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shaming and Treaty Ratification","authors":"Ryan M. Welch","doi":"10.1093/jogss/ogad007","DOIUrl":"https://doi.org/10.1093/jogss/ogad007","url":null,"abstract":"\u0000 Does shaming affect human rights treaty ratification? Whereas most scholars study shaming’s effects on eventual human rights respect, models of international shame predict states institutionalize rights before behavioral changes become reality. I take a step back and study shaming’s effects on treaty ratification. Viewing shaming as a process that seeks to change behavior by isolating and embarrassing the target leads to a somewhat counter-intuitive prediction—although increasing pressure on states raises a state’s willingness to ratify treaties, too much shame can cause a state to eschew treaty ratification. The argument follows from the social psychology literature on social exclusion that shows isolated individuals retreat from efforts to act normatively rather than increasing their efforts at inclusion. Using data on ratifications of the core UN human rights treaties and an original latent variable measuring shame, I find support for the argument that shaming increases treaty ratification to a point, but then begins to decrease ratification rates.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"14 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80120688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Can We Know What We Think We Know about Cyber Operations?","authors":"Eugenio Lilli","doi":"10.1093/jogss/ogad011","DOIUrl":"https://doi.org/10.1093/jogss/ogad011","url":null,"abstract":"\u0000 Academic research on cyber operations is characterized by an exceptional paucity of work on sources and methods of information gathering and analysis. This lack of attention can arguably hinder the future development of this increasingly important area of research and weaken its potential impact on policymaking and the wider society. This article sets to redress this undesirable situation by addressing a number of critical questions: What obstacles make collecting information on cyber operations especially hard? What are the main sources of information available to the scholar of cyber international relations? Why should we rely critically on these sources? This article's second main contribution is to advance the adoption of a research technique for the study of cyber operations based on a combination of Triangulation and Problematization called TP technique. The article also provides three detailed examples of how this research technique can be used in practice to investigate specific scenarios concerning real-world cyber operations. The article ends with a discussion of the limitations of the proposed technique while also reaffirming the benefits deriving from its application to the study of cyber operations.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"22 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86166216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solar Geoengineering: The View from Just War/Securitization Theories","authors":"Rita Floyd","doi":"10.1093/jogss/ogad012","DOIUrl":"https://doi.org/10.1093/jogss/ogad012","url":null,"abstract":"As the world continues to fail to reduce and control global surface temperatures, the use of solar radiation management (SRM) technology by one actor or by a small coalition of actors is becoming increasingly likely. Yet, most of the social scientific literature on solar geoengineering does not tend to systematically engage with this possibility; scholars focus either on global governance or on banning SRM usage and research altogether. On the margins of this debate, a handful of researchers have sought to bring insights from the just war tradition to the issue of unilateral and minilateral SRM usage. This article is concerned with the contribution just war/securitization theories can make to our understanding of the debate surrounding climate engineering. It scrutinizes and deepens existing attempts by just war scholars to examine the moral permissibility of unilateral and minilateral SRM usage, including from the perspective of Just Securitization Theory.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"2 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80036475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The US Intelligence Community, Global Security, and AI: From Secret Intelligence to Smart Spying","authors":"Christopher R. Moran, J. Burton, G. Christou","doi":"10.1093/jogss/ogad005","DOIUrl":"https://doi.org/10.1093/jogss/ogad005","url":null,"abstract":"\u0000 This article examines the ways in which the US intelligence community is leveraging the power of artificial intelligence (AI) for national security purposes. Drawing on declassified intelligence records, it contends that this community has been fascinated by AI for decades. This is important to acknowledge because this historical context has shaped contemporary projects and thinking within the community. It has given the United States a first-mover advantage, establishing precedents that other global actors need to comply with, negotiate or resist. The article advances three arguments. One, the community has long recognized that it needs to collaborate with the tech sector on AI. However, these relationships bring certain challenges since the sector is a curious compound of ideologies and interests. Two, while the community was initially attracted to the data processing advantages of AI to help human analysts to overcome “data smog,” today it has broadened its focus to consider how AI can improve all stages of the intelligence cycle. Three, while many voices feverishly herald the transformative potential of AI in the global security environment, we argue instead that US agencies will not be able to exploit the full potential of AI, and thus talk of an intelligence revolution is premature. This is because of national and international rules on data collection and retention but also because of cultural tensions within the global AI ecosystem. The discussion will appeal to scholars and practitioners interested in the impact of emerging technologies on national security processes and decision-making and, more broadly, global security.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"7 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91319599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Promoting Peace and Impunity? Amnesty Laws after War in El Salvador and beyond","authors":"Nadine Ansorg, Sabine Kurtenbach","doi":"10.1093/jogss/ogad010","DOIUrl":"https://doi.org/10.1093/jogss/ogad010","url":null,"abstract":"\u0000 Amnesty laws are a widespread practice in the transition from war to peace. They often aim at the transformation of violent conflict by making promises about exemptions from liability for war crimes. Critics argue that amnesties are in violation of international law and reproduce impunity in post-war societies, whereas supporters of amnesty laws focus on their peace-promoting features. Previous research has extensively looked into the second aspect, and found that amnesty laws can open the door to negotiations and a short-term termination of civil war. The question of impunity, however, has not been answered extensively. Applying a Historical Institutionalist framework, we assess the impact of the adoption of amnesty laws on societal impunity, defined as any person or group being exempt from punishment or free from the injurious consequences of an action. Case-study evidence from El Salvador shows that amnesty laws are reproducing existing power relations and thus inhibit profound reforms. With the help of amnesty laws, an institutional environment will be created that acts in the favor of involved parties for years, if not decades. We subsequently test these qualitative findings with a newly created dataset on post-war justice sector governance and reform across forty different post-war countries worldwide from 1990 to 2016, and with societal, police, and military impunity as dependent variables. Statistical evidence shows that amnesty laws significantly correlate with higher levels of impunity in a country. A peace agreement, or democracy at the end of war, reduces the risk of impunity even with amnesty laws present.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"191 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75817525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coups and the End of Mass-Killing Episodes","authors":"Gary Uzonyi, Matthew S Wells","doi":"10.1093/jogss/ogad008","DOIUrl":"https://doi.org/10.1093/jogss/ogad008","url":null,"abstract":"\u0000 Why do mass-killing episodes end? Most attention is paid to international tools for ending atrocities. Instead, we consider how domestic politics alter the duration of killing by focusing on how divisions within the regime may lead to coups during the violence. Coups help shift regime preferences and undermine capacity to continue killings. We find support for this argument by statistically analyzing the relationship between coups and the end of each mass-killing episode from 1946 to 2013. We explore each mechanism quantitatively, and buttress these results with a series of examples illustrating the mechanisms at work.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"115 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79580422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thorsten Bonacker, H. Carl, A. Langenohl, A. Marciniak
{"title":"Republican Freedom and Committees of Safety: Notes on Historicization in Critical Security Studies","authors":"Thorsten Bonacker, H. Carl, A. Langenohl, A. Marciniak","doi":"10.1093/jogss/ogad009","DOIUrl":"https://doi.org/10.1093/jogss/ogad009","url":null,"abstract":"\u0000 This paper discusses the historical case of committees of safety and their role in three republican revolutions in early modern western political history in order to conceptually contribute to the historicization of critical security studies. These committees were significant in amalgamating republican understandings of public freedom with demands for security from tyrannical oppression, thus highlighting the constitutive role of security considerations in the formation of republican polities and republican political constituencies. Yet, they also pointed to the seemingly self-defeating effects of those committees’ practices in situations perceived as revolutionary, which regularly involved clandestine, self-legitimating, and oppressive force against “enemies of the revolution” and potential internal opposition alike, and hence undermined normative notions of republican freedom. The paper introduces an analytical triad, consisting of definition of security situation, interpretative frame, and security repertoire, which allows analyzing historical situations of securitization in full complexity while at the same time allowing inter-comparability and the modeling of dynamic invocations of security by interdependent actors. Applied to the historical narrative, two interrelated conceptual consequences for a historicization of critical security studies are derived. First, prominent strands in critical security studies will profit from studying securitization as a politically constitutive, as opposed to a merely transformative, act, precisely as securitization crystallizes in historically specific, politically constitutive organizational forms, such as committees of safety. Second, the paper complicates accounts concerning the security/freedom nexus inherited from conceptual history, analyzing the entanglement of republicanism with security reasoning from the perspective of historically situated practices.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"62 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77051450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Do States Repatriate Refugees? Evidence from the Middle East","authors":"Zeynep Şahin-Mencütek, G. Tsourapas","doi":"10.1093/jogss/ogac031","DOIUrl":"https://doi.org/10.1093/jogss/ogac031","url":null,"abstract":"\u0000 Which conditions affect whether a state will choose to repatriate forcibly displaced populations residing within its borders? One of the most pressing issues related to the protracted Syrian refugee situation concerns the future of over 5 million Syrians who sought shelter in neighboring states. With host countries pursuing disparate strategies on Syrians’ return, the existing literature has yet to provide a framework that is able to account for variation on host states’ policies toward refugee repatriation. In this paper, we expand upon the concept of the refugee rentier state to theorize inductively upon the conditions shaping states’ policymaking on repatriation. We draw upon multi-sited fieldwork across the three major refugee host states in the Eastern Mediterranean (Jordan, Lebanon, and Turkey) to establish that a refugee rentier state's strategy is driven by domestic political economy costs related to the hosting of refugee populations as well as its geostrategic interests vis-à-vis these refugees’ country of origin. Using a comparative case study approach, we note how a state is more likely to pursue a blackmailing strategy based on threats if it faces high domestic political economy costs and adopts an interventionist policy vis-à-vis the sending state, as in the case of Turkey. Otherwise, it is more likely to pursue a backscratching strategy based on bargains, as in the case of Lebanon and Jordan. We conclude with a discussion on how this framework sheds light on refugee host states’ repatriation policies on a global scale.","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78575863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correction to: System Structure, Unjust War, and State Excusability","authors":"","doi":"10.1093/jogss/ogad004","DOIUrl":"https://doi.org/10.1093/jogss/ogad004","url":null,"abstract":"","PeriodicalId":44399,"journal":{"name":"Journal of Global Security Studies","volume":"106 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87887852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}