MULTI-DIMENSIONAL SECURITY Headaches and recipes for public policy.

Slides:



Advertisements
Similar presentations
Hazard and Risk Analysis What are the socio-economic and political trends? Consider recent assessment / reviews / baseline studies / analytical exercises.
Advertisements

BUSINESS AND SECURITY What does that make you think of?
Unofficial thoughts on liability Herb Lin The viewgraphs following this presentation do not represent the views.
TACKLING TERRORISM A talk-through exercise. WHAT CAN BE DONE? Not to ‘eliminate’ terrorism or defeat it in a ‘war’- it can be cut back/phased out here.
Future International Environmental Security Issues and Potential Military Requirements over the period of 2010 to for the U.S. Army Environmental.
Global Problems, Global Solutions.  The fast, interdependent spread of open society, open economy, and open technology infrastructure.  Globalization.
Session 8: Modeling the Vulnerability of Targets to Threats of Terrorism 1 Session 8 Modeling the Vulnerability of Targets to Threats of Terrorism John.
City of Leesburg Electric Department City of Leesburg Electric Department CIP-001 Sabotage Reporting.
Cyberterrorism. Critical Infrastructure Vulnerability.
Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA, Aleksandar Pašagić General Security d.o.o., Zagreb, CROATIA,
References: J.A. & Geiser K. 2001: The precautionary principle stimulus for solutions and alternatives based environmental policy Menv. 2003: Québec adoptes.
Progressiveness A Vital Principle in Emergency Management.
Reliability Risk Assessment
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 5, 2003.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Lecture 11 Reliability and Security in IT infrastructure.
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
Defining Security Culture Peteris Treijs, project manager, State Information Network Agency, Latvia.
Risk and Uncertainty Econ 373 Environmental Economics February 8,
ETHICS OF ENERGY TECHNOLOGIES DR. MARK COECKELBERGH (DEPT. OF PHILOSOPHY)
Software Dependability CIS 376 Bruce R. Maxim UM-Dearborn.
TERRORISM And how to tackle it. TERRORISM: THE USUAL CONFUSIONS ‘A new threat…’ - and aimed at the West ‘One man’s terrorist is another man’s freedom.
R ISK MANAGEMENT : A POWERFUL INSTRUMENT FOR SUSTAINABLE DEVELOPMENT S ADEGH B AKHTIARI (2014) Roxane Doll - Noëlia Collado 1.
“Mitigating Offshoring Risks in a Global Business Environment“
Food and Consumer Product Safety Authority Ministry of Economic Affairs, Agriculture and Innovation Rob de Heus Chris Hagen Internal Audit Department.
Isdefe ISXXXX XX Your best ally Panel: Future scenarios for European critical infrastructures protection Carlos Martí Sempere. Essen.
Risk Management - the process of identifying and controlling hazards to protect the force.  It’s five steps represent a logical thought process from.
ENERGY (AND) SECURITY Complications and challenges.
Engineering Risk Assessments and Risk Communication Sarah Arulanandam, Hazard and Risk Group RWDI West Inc. DISCLOSURE OF MATERIAL ENVIRONMENTAL EXPOSURES:
Plan for Today: Neoliberal Institutionalism & Concluding Liberalism 1. Complete group activity reporting. 2. Survey neoliberal solutions to the Prisoner’s.
Freak Waves: A Suggested Definition and Possible Consequences for Marine Structures 1. What is the target safety level of offshore structures? 2. Are rogue.
The need for a ” The need for a ”Spectrum of conflict”
1 Extreme Weather Impacts on Infrastructure G. L. Geernaert, S. J. Fernandez Los Alamos National Laboratory Los Alamos, NM.
Health & Safety At Work.
Studying the Asymmetric Threat “NPS provides high-quality, relevant and unique advanced education and research programs that increase the combat effectiveness.
Risk Management. 2 Policy and planning Key Messages Assess all likely risks, be prepared and practice. Structure the risk management process simply and.
ADVANCEMENT EXAM TRAINING YN1(SW) FANT NAVY DOCTRINE FOR ANTITERRORISM AND FORCE PROTECTION.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
1-3 Economic Systems n Goals: –Identify the 3 economic ?s –Differentiate among the main types of economic systems –Describe the economic systems of the.
Changed Nature of Intl Security, Human Security, Securitization Jang, Hanna.
Copyright © 2014 by John Wiley & Sons, Inc. All rights reserved. Managing for the Unexpected Sports Event Management and Marketing Playbook Play 14.
Key Messages for Policy Makers and Elected Officials Edward Evans Lead technical advisor and studies manager.
Balanced Portfolio for Reliable Electricity System YES Inc. Brief Assessment.
CHEVRON PIPE LINE COMPANY Risk Based Prioritization Process.
Introduction to Hazards Risk Management
European security Security definitions and the main dilemmas Dr. Arūnas Molis 22 April, 2014 Tallinn.
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
Operační program Vzdělávání pro konkurenceschopnost Název projektu: Inovace magisterského studijního programu Fakulty ekonomiky a managementu Registrační.
Session 7 Crisis and Risk Communication Session 7 Slide Deck Slide 7-1.
Defining Protection Protection of what, from what, by whom? Inter-Agency Definitions How do we do it? Priorities? ProCap Protection Stand-By Training.
WHAT IS HUMAN SECURITY? 1) ‘ I was young and travelled alone, not knowing the road: I felt rich when I found a comrade. Man is man’s delight.’ 2) ‘Homo.
Key Terms in Disaster Risk Reduction
M IGRATION AND T ERRORISM H UMAN R IGHTS AND S ECURITY Dr. Asta Maskaliūnaitė Baltic Defence College.
Group -3 HFA 2 Proposed Elements Paper. Question: If the proposed 5 Guiding principles reflect regional priorities? USAID-- Risk management should encompass.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Business Strategy Introduction to Strategy Session 1 1.
Safety Management Standards. Introduction Health and Safety Procedures (which identify the risks, hazards and ways of mitigating these) are weak in that.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Universiteitstraat 4, B-9000 Ghent, Belgium T +32 (0) , F +32 (0) Prof. Dr. T. Vander Beken.
NANDHA ENGINEERING COLLEGE ERODE-52. CYBER WAR-A NEW FACE OF TERRORISM Guided byGuided by E.Kanimozhi,M.EE.Kanimozhi,M.E AP/Dept of ITAP/Dept of IT PRESENTED.
THE COMMERCIALIZATION OF SECURITY IN WAR AND PEACE Introduction to SAMPOL 208 Spring 2015
Getting Prepared: Policy Implications for Transportation Planning
Services Delivery in Emergencies
COURSE REVIEW AND CONCLUSION
4.1.1 Understandings and critiques of sustainability and sustainable development.
Health Risk Communication
Complications and challenges
A means to an end: criminal analysis and organised crime policy
Presentation transcript:

MULTI-DIMENSIONAL SECURITY Headaches and recipes for public policy

‘WHAT IS SECURITY?’ We are not going back over basic questions eg etymology, negative/ positive security, ‘security for whom’ We start from the assumption that there are different dimensions of security today that cause concern at level of states, organizations of states, societies, and individuals

WHAT DOES THE ‘SECURITY SPECTRUM’ TELL US? Look at the range - typical for a developed democratic state (differences for a weak ‘Southern’ state, an ‘emerging’ power...??) What is left off at the bottom? Note options for grouping/packaging Choice of ‘packages’ is itself a sign of priorities, doctrines, fashions Any dimensions or possible packages left out?

IS THIS PRACTICAL? Common critiques: (i) over-extended definitions ‘meaningless’ and/or ‘too complicated’ (eg for comparative risk assessment, executive handling); (ii) critique of ‘securitization’ BUT: - main risks for West objectively moving down the spectrum; non-securitizing can also mean ignoring/downplaying them (cf US experience..) - all action comes out of same resource pot (state and non-state) - look at what our govts/organiz’ns are actually saying, even pre-kreppa! (‘Threats’ handout)

MORE ON NON-MILITARY DIMENSIONS See ‘”Something” Security’ handout: - types of functional security problem - interplay with ‘hard’ security - introducing idea of chains of causation, chains of consequences Chains idea in more detail:

EXAMPLE: THE HERBERT BRAUN DIAGRAM ON EFFECTS OF A MAJOR ENERGY BREAKDOWN (EG, NATION-WIDE OR VERY LARGE ELECTRICITY FAILURE): ‘WORST SCENARIO’ FOR SWISS NATIONAL SECURITY (Who is Herbert Braun??)

THINGS BRAUN SAYS CAN CAUSE THIS Storm or drought (eg, caused by climate change) Nuclear accident Cyberterrorism Internal political/economic crisis (how?) THINK OF MORE!

THINGS BRAUN SAYS THIS CAN LEAD TO Breakdown of economy/banking Ditto IT networks Ditto ‘international competitiveness’ Ditto health system THINK OF MORE!!

IN SUM: Military, terrorist, internal-political, human accident and natural forces can cause the problem Military, law and order, economic, technological, and human dimensions of security can suffer as a result

WHAT REMEDIES? (a) PRIORITIZING CAUSES Which are more likely/frequent? Which are likely to have bigger impact than others (always bigger, or wider range)? Which are likely to have multiple impacts? WHICH CAN WE DO ANYTHING ABOUT??

CAUSES: WHAT CAN WE DO? State alone or with other states/institutions State alone or with other kinds of actors Eliminate, deter, divert; reduce motive or targets or impact or frequency GIVE EXAMPLES relevant for (i) cyber- terrorism (ii) climate change

(b)DAMAGE: PRIORITIZING CONCERNS Vulnerability/exposure Robustness - survival, functioning Nature of (direct) consequences Seriousness/scale of consequences for (a) the state, (b) people, (c) the environment ((d) allies if any) Likelihood, number and seriousness of secondary consequences (dominos)

DAMAGE: WHAT CAN WE DO? Reduce exposure (harden, disperse and diversify, find substitutes etc) Increase robustness (material + human, objective + psychological) Block/reduce direct losses Block/reduce domino effects (firewalls, redundancy etc) GIVE EXAMPLES for (a) health system (b) transport networks

HOW TO DISTRIBUTE RESOURCES? Traditional defence OR new violence All violence vs. all accidental+natural risks All ‘security’ probs vs permanent needs Frequent OR exceptional risks Short-term OR long-term risks Obvious OR creeping/invisible risks Just for ourselves or for the world as a whole??

HOW TO LINK THIS WITH OUR NON-STATE ANALYSIS? Triangles document (More detailed lists on business in session 4)