Securitization and Lithuania’s National Security Change

2017 ◽  
Vol 36 (1) ◽  
pp. 9-33
Author(s):  
Ieva Karpavičiūtė

Abstract The paper addresses the security threat perception and securitization of existential threats in Lithuania. It focuses upon the securitization theory and its ability to explain the change of national security agendas as affected by the changes in national identity and existential security threats. It takes into account the internal and external factors that are shaping the objective and subjective national threat perception. The paper applies O. Waever’s securitization theory with an aim to explain how the national security threats are being addressed and perceived in Lithuania. Moreover, the paper is developed against the backdrop of the most recent developments in securitization theory and evolution of its theoretical perceptions of identity, existential threats, and legitimacy. It also discusses the possibility of inclusion of hybrid security threats into an analysis of securitization. The empirical part of the article assesses the most recent security challenges, provides evaluation of changes in national security perception, and portrays the dynamics of national security threats as defined in the National Security Strategies and the Military Doctrine. The paper focuses upon the most recent dynamics in security policy of Lithuania. It also takes into account the hybrid nature of security threats and the reaction to hybrid security elements such as: cyber security, information security, and international terrorism.

Author(s):  
Sir Richard Dearlove

This article discusses the changing perceptions on national security and civic anxiety. During the Cold War and its aftermath, security was rather a simple and straightforward issue. The countries knew their enemies, where they are and the threats they presented. On the event that, the enemies's secrets were unknown, probing techniques were employed to determine the weaknesses of the enemy. This formulaic situation which seeped through in to the twenty-first century left little room for innovation. In fact, in some countries, security maintained at the Cold War levels despite criticisms that new and emerging national security threats should be addressed at a new level. Of the powerful nations, America maintained the role of a world policeman and adapted its national security priorities according to its perception of a new series of strategic threats; however these new security strategies were without a sense of urgency. However, the perception of global threats and national security radically changed in the event of the 9/11 attack. The sleeping national security priorities of America came to a full force which affected the national security priorities of other nations as well. In the twenty-first globalized world, no conflict remains a regional clash. The reverberations of the Russian military action in Georgia, the Israeli intervention in Gaza, and the results of the attacks in Mumbai resonates loudly and rapidly through the wider international security system. While today, nations continue to seek new methods for addressing new security threats, the paradox of the national security policy is that nation-states have lost their exclusive grip of their own security at a time when the private citizens are assailed by increased fears for their own security and demand a more enhanced safety from the state. Nation-states have been much safer from large-scale violence, however there exists a strong sense of anxiety about the lack of security in the face of multiplicity of threats. Nations have been largely dependent on international coordinated action to achieve their important national security objectives. National policies and security theory lack precision. In addition, the internationalization of national security has eroded the distinction between domestic and foreign security. These blurring lines suggest that the understanding of national security is still at the height of transformations.


2021 ◽  
Vol 18 (1) ◽  
Author(s):  
Christine Liu

Abstract What explains variations in the proactiveness of Japanese Prime Ministers (PMs) toward national defense? Although the Japanese Constitution renounces the use of force, leaders sometimes speak assertively over national security. Drawing on competing international relations and Japanese foreign policy theories, this study seeks to quantitatively model and analyze predictors of political rhetoric in PMs’ speeches and statements from 2009 to 2019. Each statement is coded into four sets of binary dependent variables through content analysis and tested against five competing hypotheses. The main finding reveals that leaders become more likely to advocate for specifically assertive national security policy when Chinese vessel intrusion increases, but not when North Korea missile tests and aircraft scrambles increase. Instead of a diversionary use of words, an emboldening effect is evident in rhetoric that evokes responsibility in international defense, moderated by ruling government strength. The findings advance academic understandings of Japanese national security policy messaging and highlight the effect of external threat perception on political rhetoric.


2021 ◽  
Vol 5 (1) ◽  
pp. 193-201
Author(s):  
I. R. Saidu ◽  
T. Suleiman ◽  
U. E. Akpan

This research work was conducted to examine critically and systematically cyber threat intelligence challenges and prospects in Nigeria. It judges the value and relevance of cyber threat intelligence in the society where they are lacking in providing necessary information. Dealing with these challenges that may cause threat intelligence to be useless has become a major concern to Nigeria. The work was intended to achieve the following objectives: to examine the nature of cybersecurity in Nigeria, to analyse the cybersecurity threats that can disrupt the functioning of the country, to identify the challenges facing the Nigeria cyberspace and the conduct of a cyber threat intelligence analysis, to discuss the means by which cyber threat can be used to boost Nigeria’s National Security Policy, to make recommendations to preserve important intelligence capabilities while ensuring the protection of its critical infrastructures through the use of threat intelligence. The scope of the study was limited to the period 2009 – 2019. The research was analytical. Relevant data were collected from both primary and secondary sources of data. The data analysis used the percentage instrument and the following conclusions were drawn: that threat data overload, threat data quality, privacy and legal issues and interoperability issues are some of the challenges of cyber threat intelligence; also, the need to continually invest in research, build local cyber threat management infrastructure and enhance the ability to anticipate, detect, respond and contain information security threats is very crucial. Nigeria 


Author(s):  
Olivera Injac ◽  
Ramo Šendelj

This chapter gives explanation on theoretical framework of the national security policy and strategy. Moreover, it analyzes selected countries approaches to cyber security in national policy and how countries build their capacities to face with risks, and address objectives in some cyber security policies. Also, in this chapter are described different sorts and sources of cyber threats, techniques of cyber attacks and frequently used tools (software and hardware) by cyber attackers. In addition, according with Symantec's and Kaspersky's annual report about Internet security threats for 2014, were analyzed the most important cyber threats and attacks during 2013. Furthermore, the chapter shows organization structure of cyber security system of Montenegro, statistical analysis of users activities in cyber space and cyber incidents that happened in Montenegro during 2014.


Author(s):  
Jakub Robel

The control of the military is an indispensable element of a democratic government. Author of the article says that the degree and type of such control will vary considerably according to the system of government, historical traditions and also cultural values. The democratic control over the armed forces has two dimensions, which both enhance and promote confidence – building and peace. The domestic dimension implies the primacy of the civilian general interest of the principles of a democracy over the military. The international dimension prohibits in general the threat or use of force against a State. The democratic control of the armed forces is a complex matter. The author has focused in particular on aspects related to the armed forces: ‘traditional’ issues such as military expenditure or military budget and appointment of top commanders and issues which correspond to the change in the role of the armed forces, both at national and international level. Indeed, since the end of the cold war, armed forces have undeniably undergone a profound shift in both the range and focus of their role. This refocusing of defence and security policy in many Council of Europe member States has led to more national participation in international peace missions. Likewise, the changing nature of the threats posed to national security and in particular the rise of international terrorism has resulted in the re-emergence of an international role of the army in many European states, which requires a specific control of the conditions by which a state uses the army in domestic issues.


Author(s):  
Daniel Stevens ◽  
Nick Vaughan-Williams

This chapter highlights the importance of the subject matter of the book and situates the approach and contribution in the fields of International Relations and Political Psychology. While spending on national security in the UK since 2001 has more than tripled to £3.5 billion (Cabinet Office, 2008), it remains unclear how the objectives of the National Security Strategy are received by the British public, whether they are aware of and/or understand those objectives, and if they feel more or less ‘secure’ as a result of their existence. One aspect of this lacuna is a broader lack of social scientific research, including a tendency within security studies to focus on elite perceptions and constructions of security threat. Another is a lack of understanding of the political psychology of different threat perceptions, of the kinds of information and communications that heighten or reduce sense of threat when there are multiple existing threats, as opposed to singular threats from international terrorism or immigration, and of the consequences of different threat perceptions for other political attitudes and behaviours. Having discussed these problems this Introduction maps out how the chapters that follow seek to redress them.


2017 ◽  
Vol 5 (5) ◽  
pp. 73 ◽  
Author(s):  
Agnija Tumkevič

Today, ensuring security in cyberspace is a top priority of national security policy for most states. States’ approaches to cybersecurity can be divided into two categories: those that regard cybersecurity as a civilian task; and those that involve their militaries in creating or implementing cybersecurity policies. Those states that have incorporated cyberwarfare into their military planning and organization perceive cyberattacks as a threat to their national security, while states that charge their civilian agencies with domestic cybersecurity missions classify cyber intrusions as security risks for only particular sectors. Adopting the framework of securitization theory, this article theorizes both civil and military approaches to cybersecurity and threat perceptions and their sources. The theoretical framework is then applied to a study of the cybersecurity policies of Central European countries and the Baltic States.


2019 ◽  
Vol 12 (2) ◽  
pp. 117
Author(s):  
Hend K. Alkahtani

Background: Information system use has substantially increased among the organization based on its effective integration of the resources and improved performance. The increasing reliance on the information system serves as a great security threat for the firms. Objective: The study intends to evaluate the security of the information system in the organization located in the region of Saudi Arabia, concerning the user’s awareness level. Methods: The quantitative design of the study is adopted which uses the survey approach. A close-ended questionnaire is used for evaluating the awareness level among the individuals. A total of 109 participants (males and females) in the Saudi Company were recruited for the study. Results: Despite the implementation of the policy, employees were unaware of it. The study highlights that the development of the firm’s information security policy requires the firm to make employees aware of the significance of the information security. Conclusion: The study concludes that the organization needs to educate the workforce of the information security policy and develop their necessary understanding of the information security system. This allows the employees to identify and report security threats and risks which helps in the improvement of information security awareness.


2015 ◽  
Vol 2 (4) ◽  
pp. 581-595
Author(s):  
Lisa A. Rich

This special Symposium Edition of the Texas A&M Law Review contains selected articles from presenters at the Fall Symposium entitled New Technology and Old Law: Rethinking National Security held at the Texas A&M School of Law on October 17, 2014. The symposium brought together some of the country’s leading scholars and practitioners on issues related to national security. Symposium participants specifically examined the challenges presented to existing domestic and international-legal frameworks to adapt to emerging national security threats. Panelists provided critical analysis of major issues including the use of Unmanned Aerial Vehicles (UAVs)/drones, big data and mass surveillance, cyber security and issues of privacy, the growth of asymmetric warfare, and challenges from new coalitions such as ISIS/ISIL.


2021 ◽  
Author(s):  
Jamie Reaser ◽  
Gary M. Tabor ◽  
Rohit A. Chitale ◽  
Peter Hudson ◽  
Raina Plowright

The COVID-19 pandemic has brought biosecurity to the forefront of national security policy. Land use change is a fundamental driver of zoonotic disease outbreaks, yet substantial study is yet required to unravel the mechanisms by which land use-induced spillover operates. Ecological degradation may be the 21st Century’s most overlooked security threat. Within the biosecurity context, we introduce ecological countermeasures as highly targeted, landscape-based interventions aimed at arresting one or more of the components of land use-induced spillover, the chain of biological events that facilitate large-scale outbreaks of diseases transmitted between wildlife and people. We provide case studies of ecological countermeasures of particular interest to the US Department of Defense, broadly discuss countermeasures in the defense and health sectors, and provide an overview of recent US policy decisions related to health security in order to underscore the need for greater attention to ecological resilience as our best defense against future pandemics.


Sign in / Sign up

Export Citation Format

Share Document