Skip to content
NUPI skole

Defence and security

What are the central questions related to defence and security?
Publications
Publications
Chapter

Securitisation of the EU approach to the Western Balkans: from conflict transformation to crisis management.

This chapter analyses the EU’s crisis response in the Western Balkans through the lens of EULEX. By exploring how those immediately responsible for mandate execution and those directly affected by its outcomes perceive EULEX, we discover gaps that highlight the pitfalls of direct and ingrained political interference in the mission’s work. While EULEX has been seen as an important watchdog for preventing further human rights abuses, the EU’s approach to Kosovo and the region continues to be characterised by competing priorities: the EU’s broader political objectives impact the mission’s legal work and hamper the EU in achieving a coherent and impactful rule of law policy. In turn, this decreases the local populations’ trust and approval of EULEX and ultimately undermines the EU’s overall goals of promoting good governance and a European perspective for Kosovo. This tension highlights the incompatibility of the EU’s short-term focus on crisis management and the more longterm focus on crisis transformation. We see this as particularly problematic for an actor whose self-image as a ‘normative power’, is underpinned by an assumption that its influence in the world in gained through ‘the power of ideas’.

  • Defence and security
  • Security policy
  • Global economy
  • Regional integration
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • Europe
  • Peace, crisis and conflict
  • Conflict
  • Global governance
  • Human rights
  • Governance
  • The EU
The-EU-and-Crisis-response_large.jpg
  • Defence and security
  • Security policy
  • Global economy
  • Regional integration
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • Europe
  • Peace, crisis and conflict
  • Conflict
  • Global governance
  • Human rights
  • Governance
  • The EU
Media
Media
Lecture

Small states in the UNSC: Lessons learned from Estonia and Norway

Presentation given at conference on Small States in the UN Security Council.

  • Defence and security
  • Security policy
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • The Nordic countries
  • Global governance
  • International organizations
  • United Nations
  • Defence and security
  • Security policy
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • The Nordic countries
  • Global governance
  • International organizations
  • United Nations
Publications
Publications
Report

Small States, Different Approaches. Estonia and Norway on the UN Security Council

In 2021, Estonia and Norway serve alongside Ireland as elected European members on the UN Security Council. In this report we ask: Why do smaller states like Estonia and Norway invest time, energy and resources seeking a non-permanent seat on the Security Council? What can they hope to achieve during their period as elected members? And how did Estonia and Norway work – individually and together – to achieve their ambitions in 2021 when they were both serving on the Council?

  • Defence and security
  • Security policy
  • Cyber
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • Europe
  • The Nordic countries
  • Peace, crisis and conflict
  • Conflict
  • Natural resources and climate
  • Climate
  • Global governance
  • Governance
  • United Nations
Screenshot-2021-11-26-at-14.13.45_large.png
  • Defence and security
  • Security policy
  • Cyber
  • Diplomacy and foreign policy
  • Diplomacy
  • Foreign policy
  • Regions
  • Europe
  • The Nordic countries
  • Peace, crisis and conflict
  • Conflict
  • Natural resources and climate
  • Climate
  • Global governance
  • Governance
  • United Nations
Publications
Publications
Report

Digital technology and development

Increasingly, the global challenges posed by digitalization and cybersecurity are emerging as central to the organization of development assistance – with consequences for billions of people in the developing world. The distribution of digital technology and connectivity is occurring at an unprecedented pace, offering new opportunities and contributing to economic growth across the world. While development agencies and donor countries are utilizing such opportunities as a vehicle for achieving the Sustainable Development Goals (SDGs), new societal vulnerabilities are arising alongside them. These vulnerabilities have significant implications in terms of – among other things – freedom of speech, human rights, and modern forms of slavery. This is especially the case in those countries currently making the leap into the digital age, where there is a pressing need for knowledge, education, institution building and experience sharing. Sustainable growth through digital technology is dependent on analogue foundations, with donor countries having an important role to play through development assistance and capacity-building mechanisms. With this in mind, this article looks at the rapid growth in internet usage in sub-Saharan Africa and its implications for governance, cybersecurity and development in the region.

  • Defence and security
  • Cyber
  • Global economy
  • Globalisation
  • Diplomacy and foreign policy
  • Development policy
  • Regions
  • Africa
Digital-Technology-and-Development.png
  • Defence and security
  • Cyber
  • Global economy
  • Globalisation
  • Diplomacy and foreign policy
  • Development policy
  • Regions
  • Africa
Media
Media
Lecture

Going Through a Rough Patch: Danish and Norwegian Coping Strategies in the Transatlantic Relationship

Paper presentation at CAST Research Seminar on Nordic Security Policy.

  • Defence and security
  • Security policy
  • Regions
  • Europe
  • North America
  • The Nordic countries
  • Defence and security
  • Security policy
  • Regions
  • Europe
  • North America
  • The Nordic countries
Publications
Publications
Report

Surveillance Technology at the Fair: Proliferation of Cyber Capabilities in International Arms Markets

State cyber capabilities are increasingly abiding by the “pay-to-play” model—both US/NATO allies and adversaries can purchase interception and intrusion technologies from private firms for intelligence and surveillance purposes. NSO Group has repeatedly made headlines in 2021 for targeting government entities in cyberspace, but there are many more companies selling similar products that are just as detrimental. These vendors are increasingly looking to foreign governments to hawk their wares, and policymakers have yet to sufficiently recognize or respond to this emerging problem. Any cyber capabilities sold to foreign governments carry a risk: these capabilities could be used against individuals and organizations in allied countries, or even in one’s home country. Because much of this industry operates in the shadows, research into the industry in aggregate is rare. This paper analyzes active providers of interception/intrusion capabilities within the international surveillance market, cataloguing firms that have attended both ISSWorld (i.e., the Wiretapper’s Ball) and international arms fairs over the last twenty years.1 This dataset mostly focuses on Western firms and includes little on Chinese firms, due to historical under-attendance of Chinese firms at ISSWorld. However, the overarching nature of this work will help policymakers better understand the market at large, as well as the primary arms fairs at which these players operate. This paper identifies companies explicitly marketing interception/intrusion technology at arms fairs, and answers a series of questions, including: what companies are marketing interception/intrusion capabilities outside their headquartered region; which arms fairs and countries host a majority of these firms; and what companies market interception/intrusion capabilities to US and NATO adversaries? The resulting dataset shows that there are multiple firms headquartered in Europe and the Middle East that the authors assess, with high confidence, are marketing cyber interception/intrusion capabilities to US/NATO adversaries. They assume that companies offering interception/intrusion capabilities pose the greatest risk, both by bolstering oppressive regimes and by the proliferation of strategic capabilities.2 Many such firms congregate at Milipol France, Security & Policing UK, and other arms fairs in the UK, Germany, Singapore, Israel, and Qatar. The authors found that 75 percent of companies likely selling interception/intrusion technologies have marketed these capabilities to governments outside their home continent. Five irresponsible proliferators—BTT, Cellebrite, Micro Systemation AB, Verint, and Vastech—have marketed their capabilities to US/NATO adversaries in the last ten years.3 This paper categorizes these companies as potentially irresponsible proliferators because of their willingness to market outside their continents to nonallied governments of the United States and NATO—specifically, Russia and China.4 By marketing to these parties, these firms signal that they are willing to accept or ignore the risk that their products will bolster the capabilities of client governments that might wish to threaten US/NATO national security or harm marginalized populations. This is especially the case when the client government is a direct US or NATO adversary. This globalizing shift is important for two reasons. First, it indicates a widening pattern of proliferation of cyber capabilities across the globe. Second, many firms in the surveillance and offensive cyber capabilities markets have long argued for the legitimacy of their business model by pointing to the perceived legitimacy of their customers; yet, their marketing strategies contradict this argument. As the recent indictment of several former US intelligence personnel working for the United Arab Emirates (UAE) confirms, capabilities originally focusing on one target set may be expanded for other intelligence uses.5 When these firms begin to sell their wares to both NATO members and adversaries, it should provoke national security concerns for all customers. This paper profiles these important trends for their practical security impacts, and to enable further research into this topic. The authors suggest that the United States and NATO create know-your-customer (KYC) policies with companies operating in this space; work with arms fairs to limit irresponsible proliferators’ attendance at these events; tighten export-control loopholes; and name and shame both irresponsible vendors and customers. The authors encourage policymakers to focus their efforts to rein in companies that sell these capabilities directly to adversaries, or those willing to ignore the risk that their capabilities may be misused. The dataset presented below is open for use by others who might similarly seek to bring some measure of light to an industry that remains so insistently in the dark.

  • Defence and security
  • Security policy
  • NATO
  • Cyber
  • Intelligence
  • Peace, crisis and conflict
  • Humanitarian issues
LarsGjevikissuebrief_large.jpg
  • Defence and security
  • Security policy
  • NATO
  • Cyber
  • Intelligence
  • Peace, crisis and conflict
  • Humanitarian issues
Mariana Llorens Zabala
Researchers

Mariana Llorens Zabala

Junior Research Fellow

Mariana is a Junior Research Fellow at NUPI and works on the Training for Peace Programme, in the Research group on peace, conflict and developmen...

  • Defence
  • Security policy
  • Terrorism and extremism
  • Economic growth
  • Regional integration
  • Development policy
  • Diplomacy
  • Africa
  • Peace operations
  • Humanitarian issues
  • Conflict
  • Climate
  • Human rights
  • Governance
  • United Nations
  • AU
  • Defence
  • Security policy
  • Terrorism and extremism
  • Economic growth
  • Regional integration
  • Development policy
  • Diplomacy
  • Africa
  • Peace operations
  • Humanitarian issues
  • Conflict
  • Climate
  • Human rights
  • Governance
  • United Nations
  • AU
Media
Media
Lecture

Norden og alliansene: Sikkerhetspolitisk debatt og veivalg i 2021

Presentation of findings from the research project "Norden and the alliances".

  • Defence and security
  • Defence
  • Security policy
  • NATO
  • Regions
  • Europe
  • The Nordic countries
  • Global governance
  • International organizations
  • The EU
  • Defence and security
  • Defence
  • Security policy
  • NATO
  • Regions
  • Europe
  • The Nordic countries
  • Global governance
  • International organizations
  • The EU
Line Marie Breistrand
Researchers

Line Marie Breistrand

Research Fellow

Line Marie Breistrand is a doctoral student and works with China in international politics. In her doctoral project, she analyzes China's foreign...

  • Security policy
  • Cyber
  • Foreign policy
  • Russia and Eurasia
  • Asia
  • The Nordic countries
  • Security policy
  • Cyber
  • Foreign policy
  • Russia and Eurasia
  • Asia
  • The Nordic countries
Rolf  Tamnes
Researchers

Rolf Tamnes

Professor Emeritus

Professor Rolf Tamnes is a member of NUPI’s Research Group on Security and Defence. Tamnes holds a dr.philos (PhD) from 1991 and a cand.philol. (M...

  • Defence
  • Security policy
  • NATO
  • Europe
  • Russia and Eurasia
  • North America
  • The Nordic countries
  • Conflict
  • Governance
  • Historical IR
  • Defence
  • Security policy
  • NATO
  • Europe
  • Russia and Eurasia
  • North America
  • The Nordic countries
  • Conflict
  • Governance
  • Historical IR
321 - 330 of 1308 items