{"title":"Letting sleeping bears lie: Ukraine’s cautious approach to uncertainty before the war","authors":"Samuel M. Seitz","doi":"10.1080/13523260.2023.2257966","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257966","url":null,"abstract":"International relations theory has long suggested that uncertainty during militarized crises pushes states to adopt escalatory behavior. However, the leadup to the Russo-Ukrainian War challenges this view, with Kyiv downplaying the risk of conflict and adopting a cautious foreign policy. I argue that Ukrainian behavior in the leadup to the war demonstrates the need to disaggregate between types of uncertainty. While uncertainty over an adversary’s intentions and capabilities can push a state to adopt escalatory behavior, uncertainty regarding a potential adversary’s military strategy and regarding the level of support it can expect from third parties incentivizes a state to assume a more cautious posture. The piece concludes with a reflection on disciplinary blind spots regarding the impact of uncertainty on state decision-making and offers suggestions for overcoming them.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emulating underdogs: Tactical drones in the Russia-Ukraine war","authors":"Kerry Chávez, Ori Swed","doi":"10.1080/13523260.2023.2257964","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257964","url":null,"abstract":"ABSTRACTEarly studies on state drone proliferation argued that it would be temperate, constrained by high financial, technical, and infrastructural requisites and fielded according to the logic of scarce, exquisite airpower. While this rationale has held for limited conflicts, the high attrition and massive demand of a total war compelled strong standing armies to follow a different model of adoption: emulating weaker violent nonstate actors leveraging low-cost commercial platforms. The Russia-Ukraine war has captured this trend. Despite earlier expectations of armies maintaining advanced airpower for strategic ends, underdog Ukraine, followed by Russia have developed heavy reliance on commercial drone technologies for tactical aims. Framing this in military and battlefield innovation literature and drawing on studies on commercial drone use among violent nonstate actors, we argue that this constitutes a new trajectory involving mixed military arsenals enhanced with dual-use commercial platforms.KEYWORDS: Dronesunmanned aerial vehiclesinterstate conflictmilitary innovationmodern warfare Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Islamic State is a prime example, but certainly not the only one. Many VNSAs from Houthi rebels, Burmese resistors, Syrian fighters, African insurgents, and Mexican cartels use commercial drones in one, some, or all the ways listed to advance their agendas.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Farewell by the outgoing editor: Publishing research from the Paris attacks to the war against Ukraine","authors":"Hylke Dijkstra","doi":"10.1080/13523260.2023.2254597","DOIUrl":"https://doi.org/10.1080/13523260.2023.2254597","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136309263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion","authors":"Anastasiia Kudlenko","doi":"10.1080/13523260.2023.2258620","DOIUrl":"https://doi.org/10.1080/13523260.2023.2258620","url":null,"abstract":"When Russia launched a full-scale invasion of Ukraine on February 24, 2022, Ukrainians did not crumble under the unprecedented attack but showed steely resolve to fight for independence and the right to decide their own fate. In the Western media and scholarly analysis, the Ukrainian resilience is often associated with the leadership of the state, in particular President Zelensky. This article offers a different take on the issue of resilience in war and looks at the value foundations of Ukrainian identity, the decentralized nature of Ukrainian society and the vision of a better future as part of the Euro-Atlantic community to better understand Ukraine’s agency in response to Russia’s invasion. It draws on the original data, collected from interviews of three categories of Ukrainians, affected by the war: refugees, internally displaced people, and those living close to the frontlines.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136263814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Remember Kabul? Reputation, strategic contexts, and American credibility after the Afghanistan withdrawal","authors":"D.G. Kim, J. Byun, Jiyoung Ko","doi":"10.1080/13523260.2023.2253406","DOIUrl":"https://doi.org/10.1080/13523260.2023.2253406","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings","authors":"E. Moussa","doi":"10.1080/13523260.2023.2214757","DOIUrl":"https://doi.org/10.1080/13523260.2023.2214757","url":null,"abstract":"ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"462 - 490"},"PeriodicalIF":5.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41621114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war","authors":"Costantino Pischedda, Andrew Cheon","doi":"10.1080/13523260.2023.2212464","DOIUrl":"https://doi.org/10.1080/13523260.2023.2212464","url":null,"abstract":"ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"345 - 371"},"PeriodicalIF":5.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47515747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity","authors":"Marcelo M. Leal, P. Musgrave","doi":"10.1080/13523260.2023.2216112","DOIUrl":"https://doi.org/10.1080/13523260.2023.2216112","url":null,"abstract":"ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"437 - 461"},"PeriodicalIF":5.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47896119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions","authors":"Jan Karlas","doi":"10.1080/13523260.2023.2211899","DOIUrl":"https://doi.org/10.1080/13523260.2023.2211899","url":null,"abstract":"ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"410 - 436"},"PeriodicalIF":5.9,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific","authors":"Rebecca Strating","doi":"10.1080/13523260.2023.2204266","DOIUrl":"https://doi.org/10.1080/13523260.2023.2204266","url":null,"abstract":"ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"372 - 409"},"PeriodicalIF":5.9,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45017288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}