Skip to content
NUPI skole

Defence and security

What are the central questions related to defence and security?
Publications
Publications
Scientific article

The Chinese Cyber Sovereignty Concept (Part 1 & 2)

Cyber sovereignty is a distinct concept from the more familiar term cybersecurity, which concerns protecting the infrastructure and processes connected to the Internet. Cyber sovereignty, on the other hand, is concerned with the information and content the Internet provides. China’s cyber sovereignty concept is based on two key principles: The first is that unwanted influence in a country’s “information space” should be banned. In effect, this would allow countries to prevent their citizens from being exposed to ideas and opinions deemed harmful by the regime. The other key principle is to move the governance of the Internet from the current bodies, which includes in them academics and companies, to an international forum such as the UN. This move would also entail a transfer of power from companies and individuals to states alone.

  • Security policy
  • Cyber
  • Asia
  • Security policy
  • Cyber
  • Asia
Publications
Publications
Scientific article

Norge, USA og folkeretten

(Available in Norwegian only): Når det gjelder USA og folkeretten, er problemet ikke så mye Trump, som at USA konsekvent bryter de verdiene de selv forfekter, skriver Minda Holm i denne kronikken.

  • NATO
  • Foreign policy
  • North America
  • Human rights
  • NATO
  • Foreign policy
  • North America
  • Human rights
News
News

Cyberattacks: How to protect critical infrastructure?

Michael Chertoff, former United States Secretary of Homeland Security, shares his insights on cybersecurity in a new NUPI podcast episode.

  • Security policy
  • Cyber
  • Europe
  • North America
  • Conflict
Bildet viser Michael Chertoff
Publications
Publications
Scientific article

Haukene tar over i Japan

(Norwegian only): Kina er i full fart mot supermaktstatus. Hva skjer så i Japan?

  • Defence
  • Security policy
  • Asia
  • Governance
  • Defence
  • Security policy
  • Asia
  • Governance
Publications
Publications
Scientific article

Measuring radicalisation: risk assessment conceptualisations and practice in England and Wales

Individual ‘radicalisation’- extremism- and terrorism-related risk assessment tools have become increasingly central instruments of counter-terrorism. The scholarship on such tools, however, is still its infancy, and remains concentrated on methodological issues and on identifying the ‘best’ indicator list for carrying out assessments. This article takes a different approach, and examines England and Wales’ main counter-terrorism relevant risk and vulnerability assessment tools: the Extremism Risk Guidance (ERG22+) and the Vulnerability Assessment Framework (VAF), concentrating on their shared 22 risk indicators and their uses in counter-terrorism. The article explores the ideas of ‘radicalisation’ emerging from these indicators and from their use at two different ‘ends’ of England and Wales’ counter-terrorism; to assess sentenced terrorism offenders in prison, and to assess non- criminal individuals referred over concerns over their possible ‘radicalisation’. The article hence clarifies the ideas of ‘radicalisation’ underpinning counter- terrorism policies in England and Wales, and considers the operational utility of the tools' present uses. The article finds that the tools' shared indicators suggest a conceptualisation of radicalisation associated with individual psychology and ways of thinking, and do not in and of themselves open for sufficient incorporation of relevant context. While not rejecting the possible value of specialised terrorism-related individual risk assessment tools, the article finds that the ideas underpinning the tools’ uses make their present counter-terrorism roles questionable. It concludes by stressing that any benefit associated with risk and vulnerability assessment tools in the counter-terrorism space would seem conditioned on them being reserved for the uses, target groups and assessors they were originally created for, and on them being used as only one component of a broad, contextual assessment of individuals about whom there is an evidence-based terrorism-related concern.

  • Terrorism and extremism
  • Terrorism and extremism
Event
14:00 - 15:30
NUPI
Engelsk
Event
14:00 - 15:30
NUPI
Engelsk
4. Sep 2018
Event
14:00 - 15:30
NUPI
Engelsk

Fighting violent extremism: What can be learned from the North Caucasus?

What factors affect the flow of recruits from the North Caucasus areas to jihadist groups in and outside of Russia?

Publications
Publications
Chapter

‘Brothers in arms’. Kinship, gender and military organizations

Kinship arguably is a particularly useful concept for studying the social structures, relations and culture of military organizations, both in exceptional situations and during ordinary service. Kinship helps us identify and understand how masculine values and fellowship among male soldiers are embedded in practice (e.g. rules, codes, rituals, communities) as well as in discourse (e.g. specific gendered lingo). When taking into account the male dominance in military organizations over time and the share numbers of male soldiers, compared to female soldiers, gender gaps are likely. Both conditions also help explain why government efforts in many countries aimed at improving the gender balance and creating equal opportunities for women in military organizations have met a lot of obstacles. Introducing kinship, this chapter seeks to identify how kinship as a social category of identity may represent the social glue that keeps military organizations together, as well as the exclusion mechanisms kinship entails through discourse and practice.

  • Defence
  • Defence
Publications
Publications
Report

Managing a Digital Revolution - Cyber Security Capacity Building in Myanmar

Digitalization is exposing developing countries to a growing number of risks, as well as opportunities associated with connecting to the Internet. Myanmar stands out as a critical case of both the pitfalls and the benefits Internet connection can bring. Amidst a political transition from military rule to a functioning democracy Myanmar is adding ICT to key areas like banking and e-government. Having been one of the least connected countries in the world only five years ago the country is now connecting to the Internet at an unprecedented pace, with little or no institutions in place to ensure the transition goes smoothly. Using the framework of Cyber Security Capacity Building (CCB) we examine the risks and potential benefits of Myanmar’s embracement of digital technologies.

  • Security policy
  • Cyber
  • Asia
  • Security policy
  • Cyber
  • Asia
Publications
Publications
Scientific article

From Liberal Peacebuilding to Stabilization and Counterterrorism

Since the end of the Cold War, international interventions have increasingly been deployed to deal with internal conflict. Liberal peacebuilding has been a guiding concept for many of these interventions, in particular those deployed by the UN. This article argues that liberal peacebuilding is waning in importance, both as a guiding concept and in practice. After long engagements in Afghanistan and the enduring effects of the financial crisis, Western states are shifting their strategy from liberal peacebuilding to stabilization and counterterrorism. In Africa, regional ad hoc coalitions set up to fight terrorists and other armed groups are on the rise, and progressively included in UN peacekeeping operations. To examine these shifts more closely, the article focuses on the crisis in Mali since 2012 and the growing Western security presence in neighbouring Niger. The article concludes that the turn from liberal peacebuilding to stabilization and counterterrorism is likely to be counterproductive, as it will lead to more oppressive governments and more disillusioned people joining the ranks of opposition and terrorist groups, as well as undermine the UN in general and UN peace operations in particular.

  • Security policy
  • United Nations
  • Security policy
  • United Nations
News
News

The frustrating nature of international counter-terrorism partnerships

Fighting terrorism requires wide-ranging cooperation between states. What does such cooperation look like in practice, and does it work?

  • Defence
  • Security policy
  • Terrorism and extremism
  • The Middle East and North Africa
  • Africa
741 - 750 of 1308 items