Assessing The Network-State in 2050

Bryce Johnston (@am_Bryce) is an U.S. Army officer currently serving in the 173 rd Airborne Brigade. He is a West Point graduate and a Fulbright Scholar. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing The Network-State in 2050

Date Originally Written:  December 12, 2022.

Date Originally Published:  December 26, 2022.   

Author and / or Article Point of View:  The author is an active-duty U.S. Army officer whose studies intersect technology and politics. His assessment combines Balaji Srinivasan’s concept of the network-state with Chamath Palihapitiya’s[1] claim that the marginal cost of energy and computation will eventually reach zero. The article is written from the point of view of an advisor to nation-states.

Summary:  Online communities have become an integral part of life in 2022. As money, computing power, and energy become cheaper, citizens may find themselves identifying more with an immersive online network than their nation. If this trend continues, the world’s balance of power may soon include powerful network-states that do not respect political boundaries and control important aspects of the globe’s information domain. 

Text:  The nation-state was the primary actor in international affairs for the last two centuries; advances in digital technology may ensure the network-state dominates the next two centuries. The network-state, as conceived by Balaji Srinivasan, is a cohesive digital community that is capable of achieving political aims and is recognized as sovereign by the international community[2]. The citizens of the network-state are not tied to a physical location. Instead, they gain their political and cultural identity through their affiliation with a global network connected through digital technology. The idea of the network-state poses an immediate challenge to the nation-state whose legitimacy comes through its ability to protect its physical territory.  By 2050, nation-states like the United States of America could compete with sovereign entities that exist within their borders. 

An accepted definition of a state is an entity that has a monopoly on violence within its territory[3]. While a network-state may have a weak claim to a monopoly of physical violence, they could monopolize an alternate form of power that is just as important. Most aspects of modern life rely on the cooperation of networks. A network-state that has a monopoly over the traffic that comes through it could very easily erode the will of a nation-state by denying its citizens the ability to move money, communicate with family, or even drive their car. One only has to look at China today to see this sort of power in action. 

Culturally, citizens in developed countries have grown used to spending most of their time online. The average American spends about eight hours online engaged with digital media[4]. Digital communities such as QAnon and WallStreetBets have been able to coordinate their members to affect the physical world. These communities were able to distill a strong sense of identity in their members even though they only ever interacted with each other in an online forum. Advances in generative media, virtual reality hardware, and digital currencies will only make these communities more engaging in the near future. 

The network-state is not inevitable. Three conditions are necessary to create the technology needed to sustain a politically viable digital community that spans the world by 2050. First, the marginal cost of capital must approach zero. The last decade saw interest rates stay near zero. Cheap money leads to the misallocation of capital towards frivolous endeavors, but it also nudges technologists to place a higher value on innovations that have a longer time horizon[5]. Artificial intelligence, crypto, and virtual reality all need significant investments to make them viable for the market. These same technologies also make up the building blocks of the network-state.

Second, the marginal cost of computing must approach zero. The technologies mentioned above require vast amounts of computational power. To persuade millions of users to make their online community the core of their identity, online communities will need to provide a persistent level of immersion that is not feasible today. This technical challenge is best understood by looking at the billions of dollars it took to allow Mark Zuckerberg’s metaverse citizens to traverse their community on legs[6]. Moore’s Law, which states that the number of transistors on microchips will double every year, has remained largely true for the last forty years[7]. While this pattern will likely come to an end, other technologies such as NVIDIA’s specialized graphic chips and quantum computing will ensure that the cost of computing power will drop over time[8].

Finally, the marginal cost of energy must approach zero. Improvements in computing technology will likely make systems more energy efficient, but digital communities that encompass a majority of mankind will require a large amount of energy. The ability to transfer this energy to decentralized nodes will become important as network-states span vast swaths of the earth. Solar panels and battery stations are already becoming cheap enough for individuals to buy. As these materials become cheaper and more reliable, most of the citizens in a network-state likely provide their own power. This decoupling from national grids and fossil fuels will not only allow these citizens to run their machines uninhibited but make them less vulnerable to coercion by nation-states who derive their power from energy production. 

The likelihood of these conditions occurring by 2050 is high. Investors like billionaire Chamath Palihapitiya are already betting on a drastic reduction in the cost of energy and computing power[9].  Assuming these three trends do allow for the creation of sovereign network-states, the balance of power on the global stage will shift. A world in which there is a unipolar moment amongst nation-states does not preclude the existence of a multipolar balance amongst network-states. Nation-states and network-states will not compete for many of the same resources, but the proliferation of new sovereign entities creates more opportunities for friction and miscalculation.

If war comes, nation-states will consider how to fight against an adversary that is not bound by territorial lines. Nation-states will have an advantage in that they control the physical means of production for commodities such as food and raw materials, but as the world becomes more connected to the internet, networks will still have a reach into this domain. The rise of the network-state makes it more important than ever for nation-states to control their physical infrastructure and learn to project power in the cognitive domain. Advanced missile systems and drones will do little to threaten the power of the network-state; instead, offensive capabilities will be limited to information campaigns and sophisticated cyber-attacks will allow the nation-state to protect its interests in a world where borders become meaningless.


Endnotes:

[1] Fridman, L. (November 15, 2022). Chamath Palihapitiya: Money, Success, Startups, Energy, Poker & Happiness (No. 338). Retrieved December 1, 2022, from https://www.youtube.com/watch?v=kFQUDCgMjRc

[2] Balaji, S. (2022, July 4). The Network-state in One Sentence. The Network-state. https://thenetworkstate.com/the-network-state-in-one-sentence

[3] Waters, T., & Waters, D. (2015). Politics As Vocation. In Weber’s Rationalism and Modern Society (pp. 129-198). Palgrave MacMillan, New York.

[4] Statista Research Department. (2022, August 16). Time spent with digital media in the U.S. 2011-2024. Statista Media. https://www.statista.com/statistics/262340/daily-time-spent-with-digital-media-according-to-us-consumsers

[5] Caggese, A., & Perez-Orive, A. (2017). Capital misallocation and secular stagnation. Finance and Economics Discussion Series, 9.

[6] Klee, M. (2022, October 12). After Spending Billions on the Metaverse, Mark Zuckerberg Is Left Standing on Virtual Legs. Rolling Stone. https://www.federalreserve.gov/econres/feds/capital-misallocation-and-secular-stagnation.html

[7] Roser, M., Ritchie, H., & Mathieu, E. (2022, March). Technological Change. Our World in Data. https://ourworldindata.org/grapher/transistors-per-microprocessor

[8] Sterling, B. (2020, March 10). Preparing for the end of Moore’s Law. Wired. https://www.wired.com/beyond-the-beyond/2020/03/preparing-end-moores-law/

[9] Fridman, L. (November 15, 2022). Chamath Palihapitiya: Money, Success, Startups, Energy, Poker & Happiness (No. 338). Retrieved December 1, 2022, from https://www.youtube.com/watch?v=kFQUDCgMjRc

 

Assessment Papers Bryce Johnston Emerging Technology Government Information Systems

Assessing the Tension Between Privacy and Innovation

Channing Lee studies International Politics at the Edmund A. Walsh School of Foreign Service at Georgetown University. She can be found on Twitter @channingclee. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization, or any group.


Title:  Assessing the Tension Between Privacy and Innovation

Date Originally Written:  April 1, 2022.

Date Originally Published:  April 11, 2022.

Author and / or Article Point of View:  The author is a student of international politics. 

Summary:  Given the importance of data to emerging technologies, future innovation may be dependent upon personal data access and a new relationship with privacy. To fully unleash the potential of technological innovation, societies that traditionally prize individual privacy may need to reevaluate their attitudes toward data collection in order to remain globally competitive.

Text:  The U.S. may be positioning itself to lag behind other nations that are more willing to collect and use personal data to drive Artificial Intelligence (AI) advancement and innovation. When the COVID-19 pandemic began, the idea of conducting contact tracing to assess virus exposure through personal devices sounded alarm bells across the United States[1]. However, that was not the first time technologies were engaged in personal data collection. Beyond the pandemic, the accumulation of personal data has already unlocked enhanced experiences with technology—empowering user devices to better accommodate personal preferences. As technology continues to advance, communities around the world will need to decide which ideals of personal privacy take precedence over innovation.

Some experts like Kai-Fu Lee argue that the collection of personal data may actually be the key that unlocks the future potential of technology, especially in the context of AI[2]. AI is already being integrated into nearly all industries, from healthcare to digital payments to driverless automobiles and more. AI works by training algorithms on existing data, but it can only succeed if such data is available. In Sweden, for example, data has enabled the creation of “Smart Grid Gotland,” which tracks electricity consumption according to wind energy supply fluctuations and reduces household energy costs[3]. Such integration of technology with urban planning, otherwise known as “smart cities,” has become a popular aspiration of governments across the globe to make their cities safer and more efficient. However, these projects also require massive amounts of data.

Indeed, data is already the driving force behind many research problems and innovations, though not without concerns. For example, AI is being used to improve cancer screening in cervical and prostate cancer, and AI might be the human invention that eventually leads scientists to discover a cancer cure[4]. Researchers like Dr. Fei Sha from the University of Southern California are working to apply big data and algorithmic models to “generate life-saving biomedical research outcomes[5].” But if patients deny access to their healthcare histories and other information, researchers will not have the adequate data to uncover more effective methods of treatment. Similarly, AI will likely be the technology that streamlines the advancement of digital payments, detecting fraudulent transactions and approving loan applications at a quicker speed. Yet, if people resist data collection, the algorithms cannot reach their full potential. As these examples demonstrate, “big data” can unlock the next chapter of human advances, but privacy concerns stand in the way.

Different societies use different approaches to deal with and respond to questions of data and privacy. In Western communities, individuals demonstrate strong opposition to the collection of their personal information by private sector actors, believing collection to be a breach of their personal privacy privileges. The European Union’s (EU) General Data Protection Regulation  and its newly introduced Digital Services Act, Canada’s Personal Information Protection and Electronic Documents Act, and California’s Consumer Privacy Act curb the non-consensual collection of personal information by businesses, thereby empowering individuals to take ownership of their data. Recently, big tech companies such as Meta and Google have come under public scrutiny for collecting personal data, and polls reveal that Americans are increasingly distrustful of popular social media apps such as Facebook and Instagram[6]. 

Still, the American public is not as guarded as it may appear. Video-focused social media app TikTok, whose parent company Bytedance is based in China, reported more than 100 million daily U.S. users in August 2020, up 800% since January 2018[7]. Despite warnings that the Shanghai-based company could potentially share personal data with Beijing, including threats by the Trump administration to “ban TikTok” for national security reasons, nearly a third of Americans continue to use the application on a daily basis, seemingly ignoring privacy concerns. While lawmakers have attempted to regulate the collection of data by large corporations, especially foreign companies, public opinion appears mixed.

Norms in the Eastern hemisphere tell a different story. Privacy laws exist, such as China’s Personal Information Protection Law and Japan’s upcoming ​​Amended Act on Protection of Personal Information, but the culture surrounding them is completely distinct, particularly when it comes to government collection of personal data. At the height of the pandemic, South Korea introduced a robust contact tracing campaign that relied on large databases constructed by data from credit card transactions[8]. Taiwan succeed in contact tracing efforts by launching an electronic security monitoring system that tracks isolating individuals’ locations through their cell phones[9]. In China, almost everything can be achieved through a single app, WeChat, which allows users to post pictures, order food, message friends, hire babysitters, hail a cab, pay for groceries, and more. This technological integration, which has transformed Chinese society, works because enough personal information is stored and linked together in the application. 

Some may argue that not all the data being collected by governments and even corporations has been neither voluntary nor consensual, which is why collection discussions require legal frameworks regarding privacy. Nevertheless, governments that emphasize the collective good over personal privacy have fostered societies where people possess less paranoia about companies utilizing their information and enjoy more technological progress. Despite aforementioned privacy concerns, WeChat topped more than one billion users by the end of 2021, including overseas users[10].

Regardless of a nation’s approach to technological innovation, one thing must be made clear: privacy concerns are real and cannot be diminished. In fact, personal privacy as a principle forms the foundation of liberal democratic citizenship, and infringements upon privacy threaten such societal fabrics. Law enforcement, for example, are more actively optimizing emerging technologies such as facial recognition and surveillance methods to monitor protests and collect individual location data. These trends have the potential to compromise civil liberties, in addition to the injustices that arise from data biases[11].

Yet there is also no doubt that the direction global privacy laws are headed may potentially stifle innovation, especially because developing technologies such as AI requires large quantities of data. 

The U.S. will soon need to reevaluate the way it conceives of privacy as it relates to innovation. If the U.S. follows the EU’s footsteps and tightens its grip on the act of data collection, rather than the technology behind the data collection, it might be setting itself up for failure, or at least falling behind. If the U.S. wants to continue leading the world in technological advancement, it may pursue policies that allow technology to flourish without discounting personal protections. The U.S. can, for example, simultaneously implement strident safeguards against government or corporate misuse of personal data and invest in the next generation of technological innovation. The U.S. has options, but these options require viewing big data as a friend, not a foe.


Endnotes:

[1] Kate Blackwood, “Study: Americans skeptical of COVID-19 contact tracing apps,” Cornell Chronicle, January 21, 2021, https://news.cornell.edu/stories/2021/01/study-americans-skeptical-covid-19-contact-tracing-apps.

[2] Kai-Fu Lee, AI Superpowers: China, Silicon Valley, and the New World Order (Boston: Mariner Books, 2018).

[3] “Data driving the next wave of Swedish super cities,” KPMG, accessed March 12, 2022, https://home.kpmg/se/sv/home/nyheter-rapporter/2020/12/data-driving-the-next-wave-of-swedish-super-cities.html.

[4] “Artificial Intelligence – Opportunities in Cancer Research,” National Cancer Institute, accessed February 15, 2022, https://www.cancer.gov/research/areas/diagnosis/artificial-intelligence.

[5] Marc Ballon, “Can artificial intelligence help to detect and cure cancer?,” USC News, November 6, 2017, https://news.usc.edu/130825/can-artificial-intelligence-help-to-detect-and-cure-cancer/.

[6] Heather Kelly and Emily Guskin, “Americans widely distrust Facebook, TikTok and Instagram with their data, poll finds,” The Washington Post, December 22, 2021, https://www.washingtonpost.com/technology/2021/12/22/tech-trust-survey/.

[7] Alex Sherman, “TikTok reveals detailed user numbers for the first time,” CNBC, August 24, 2020, https://www.cnbc.com/2020/08/24/tiktok-reveals-us-global-user-growth-numbers-for-first-time.html.

[8] Young Joon Park, Young June Choe, Ok Park, et al. “Contact Tracing during Coronavirus Disease Outbreak, South Korea, 2020,” Emerging Infectious Diseases 26, no. 10 (October 2020):2465-2468. https://wwwnc.cdc.gov/eid/article/26/10/20-1315_article.

[9] Emily Weinstein, “Technology without Authoritarian Characteristics: An Assessment of the Taiwan Model of Combating COVID-19,” Taiwan Insight, December 10, 2020, https://taiwaninsight.org/2020/11/24/technology-without-authoritarian-characteristics-an-assessment-of-the-taiwan-model-of-combating-covid-19/.

[10] “WeChat users & platform insights 2022,” China Internet Watch, March 24, 2022, https://www.chinainternetwatch.com/31608/wechat-statistics/#:~:text=Over%20330%20million%20of%20WeChat’s,Account%20has%20360%20million%20users.

[11] Aaron Holmes, “How police are using technology like drones and facial recognition to monitor protests and track people across the US,” Business Insider, June 1, 2020, https://www.businessinsider.com/how-police-use-tech-facial-recognition-ai-drones-2019-10.

Assessment Papers Channing Lee Emerging Technology Governing Documents and Ideas Government Information Systems Privacy

Options for the Demilitarization of Security in Nigeria

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He now works for a leading airline in Nigeria. He can be found on Twitter @DAOlawuyi. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


National Security Situation:  The increased use of the Nigerian military to carry out constabulary duties[1] has created an undue strain on the armed forces[2] and left it unable to focus on its core functions. This strain has coincided with a continued diminishing of Nigeria’s internal security[3].

Date Originally Written:  January 1, 2020.

Date Originally Published:  March 8, 2021.

Author and / or Article Point of View:  The author believes that the roles of the various armed services of the Nigerian state have become unnecessarily blurred by the willingness of political leaders to deploy force (too often deadly) for roles best served by other levers of governance.

Background:  Over two decades after Nigeria returned to democratic rule, the military has continued to play an outsized role in governance at the highest levels[4]. The election and appointment of former military and security personnel into political positions has stifled alternative voices and catalyzed despotic tendencies, even in politicians without regimented backgrounds. The continued deployment of the military in scenarios better served by other agencies has left it unable to deal with the insurgencies ravaging the North-West, North East, and Middle-Belt geopolitical zones of Nigeria[5]. 

Significance:  There is a pressing need to reinvigorate other branches of law enforcement and security in Nigeria[6][7]. Too often, political leaders authorize the deployment of military force as quick fixes to problems better solved by the long term application of legal, political, and social interventions, or other avenues of conflict resolution. These military deployments have lacked oversight and often resulted in human rights violations against Nigerians living in the crisis areas[5].

Option #1:  The Nigerian Government bans the use of the military in Internal Security Operations. 

Risk:  This option risks forcing the government to rely on inappropriate or insufficient resources domiciled in law enforcement or other internal security organizations to deal with violent events. As was seen during the 1972 Munich Olympics massacre[8], unforeseen situations may require capabilities that only the military can provide. Considering Nigeria’s current internal security crises, there will be the need for a transition period for current security operations to be transferred from the military to the civilian side of government.  Considering the length of some of these operations, the transfer may be messy and cause serious operational deficiencies that malign actors may exploit to wreak havoc. The resultant transfer of heavy weapons to civilian law enforcement and security agencies, with their continued lack of accountability and history of corruption and human rights violations, will only exacerbate the lack of trust from the larger society

Gain:  The removal of the option of military force to resolve internal security challenges will force the political class to invest in the manning, training and equipping of those agencies who are primarily tasked with securing the nation from within. This option will also incentivize proactive confrontation of violent and fringe groups before they manifest as major challenges to the peace of the nation. This option will also encourage the deployment of other forces of persuasion in dealing with issues. By freeing the nation’s armed forces of their local constabulary obligations, they are freed to focus on external threats from the near abroad.

Option #2:  The Nigerian Government imposes reporting requirements on the deployment of the military for internal security operations. Also, the military must answer to predefined civil authorities and agencies for the duration of their engagement. 

Risk:  In this option, politicians unwilling to meet additional requirements before deploying troops will simply refuse to call on military assistance when it is appropriate. This option may also exacerbate the inter-service rivalries between the various armed services that have often turned deadly[9][10][11][12][13]. Also, the current lack of accountability that pervades governance in Nigeria means that these requirements will likely simply be ignored without repercussion.

Gain:  Nigerian Government Officials will have to publicly justify their deployment of military force and may face potential repercussions for their choices in the national security sphere. This option also provides a framework for nongovernment security analysts and commentators to examine the decision-making processes of government in the civilian sphere.

Option #3:  The Nigerian Government bans serving and retired personnel of the armed services from holding executive political positions over armed agencies.

Risk:  This option will be very radical and risk alienating very powerful members of the political class. Political leaders without military or paramilitary experience lose a unique insight into the thinking and abilities of the military and how they can contribute in times of extreme national emergency. This blanket ban will rob former military officers with the requisite qualities from serving in these positions.

Gain:  The military has, directly and indirectly, continued to exert a very powerful influence over the direction of Nigeria’s security. This option goes beyond the U.S. National Security Act of 1947[14], which requires a waiver for former military officers separated by less than seven years from service in certain positions. This option ensures that those who are appointed to oversee armed agencies can face political accountability for their actions. This option will make politicians less willing to deploy military might without justification.

Option #4:  The Nigerian Government creates legislation setting out clear limits for when and how military force can deploy in internal security operations.

Risk:  The ambiguity that will result from possibly poorly worded legislation will only intensify the friction between the military and various security agencies. A lack of institutional robustness means that career military personnel, law enforcement agents, and civil servants are unable to prevent political leaders who wish to simply ignore the provisions of such legislation. This option may also lead to a situation where unanswered jurisdictional questions will create cracks to be exploited by malevolent actors who wish to keep their activities below a level that will allow the authorization of more forceful response from the government.

Gain:  This legislation will force the various nonmilitary agencies to scrutinize their capabilities and work towards shoring up any deficiencies. This option will provide another incentive for political leaders to expend the political capital required to pursue non-violent solutions to situations. Option #4 allows the military to begin to transfer the burden of continuous internal deployments and begin to rest and refit to tackle challenges more appropriate to its abilities.

Other Comments:  None.

Recommendation:  None.


Endnotes:

[1] SBM Intelligence (2020, January 15). Chart of the Week: Military exercises in Nigeria. Retrieved January 7 from https://www.sbmintel.com/2020/01/chart-of-the-week-military-exercises-in-nigeria/ 

[2] Ogundipe, S. (2016, August 4). Insecurity: Soldiers deployed in 30 of Nigeria’s 36 states. Retrieved January 7 from https://www.premiumtimesng.com/news/more-news/208055-insecurity-soldiers-deployed-30-nigerias-36-states-report.html 

[3] Nwabuezez, B. (2018, February 3). Why ‘Nigeria’ is now qualified as a failed state. Retrieved January 7 from https://www.vanguardngr.com/2018/02/nigeria-now-qualified-failed-state/ 

[4] Osogbue, E. (2018, December 1). Military Hangover and The Nigerian Democracy. Retrieved January 7 from https://www.vanguardngr.com/2018/12/military-hangover-and-the-nigerian-democracy/ 

[5] Shehu, S. (2019, August 13). Making Military Reform and Civilian Oversight a Reality in Nigeria. Retrieved January 7 from https://www.cfr.org/blog/making-military-reform-and-civilian-oversight-reality-nigeria 

[6] Solomon, S. (2020, December 2). After Outcry Over Abuse, Nigeria’s Police Reforms Under Scrutiny. Retrieved January 7 from https://www.voanews.com/africa/after-outcry-over-abuse-nigerias-police-reform-efforts-under-scrutiny 

[7] Page, M. (2019, April 2). Nigeria Struggles With Security Sector Reform. Retrieved January 7 from https://www.chathamhouse.org/2019/04/nigeria-struggles-security-sector-reform 

[8] Chambers, G. (2018, August 15). 1972 Munich Olympics massacre: What happened and why is Jeremy Corbyn under fire? Retrieved January 7 from https://www.standard.co.uk/news/politics/1972-munich-olympics-massacre-what-happened-and-why-is-jeremy-corbyn-under-fire-a3911491.html 

[9] Polgreen, L. (2005, October 6). 3 Killed as Nigerian Police and Soldiers Clash. Retrieved February 6 from https://www.nytimes.com/2005/10/06/world/africa/3-killed-as-nigerian-police-and-soldiers-clash.html 

[10] Ugbodaga, K. (2011, June 23). Soldiers, Policemen Clash Again. Retrieved February 6 from https://www.pmnewsnigeria.com/2011/06/23/soldiers-policemen-clash-again/ 

[11] (2013, August 22). Police, army clash in Nigeria. Retrieved February 6 from https://www.sbs.com.au/news/police-army-clash-in-nigeria 

[12] Ogundipe, S. (2018, March 14). Updated: Tension as Police, soldiers clash with Road Safety officers in Abuja. Retrieved February 6 from https://www.premiumtimesng.com/news/headlines/261751-updated-tension-as-police-soldiers-clash-with-road-safety-officers-in-abuja.html 

[13] (2018, June 15). Three die as soldiers clash with Police in Aba. Retrieved February 6 from https://thenationonlineng.net/three-die-as-soldiers-clash-with-police-in-aba/ 

[14] Levine, D. (2016, December 1). Why James Mattis Needs a Waiver to Be Trump’s Defense Secretary. Retrieved January 7 from https://heavy.com/news/2016/12/why-does-james-mad-dog-mattis-need-waiver-donald-trump-defense-secretary-pentagon-george-marshall-gillibrand/ 

Damimola Olawuyi Defense and Military Reform Government Homeland Defense Insurgency & Counteinsurgency Nigeria

Assessing the Role of Civil Government Agencies in Irregular Warfare

Damimola Olawuyi has served as a Geopolitical Analyst for SBM Intelligence. He can be found on Twitter @DAOlawuyi. Paul Jemitola is a lecturer at the Air Force Institute of Technology. He can be reached on Linkedin. Divergent Options’ content does not contain information of an official nature nor does the content represent the official position of any government, any organization or any group.


Title:  Assessing the Role of Civil Government Agencies in Irregular Warfare

Date Originally Written:  August 5, 2020.

Date Originally Published:  November 9, 2020.

Author and / or Article Point of View:  The authors believe that governments engaged in countering violent extremists must pair hard and soft power to consolidate gains and bring about lasting peace.

Summary:  There are no recent success stories of a multifaceted approach to irregular warfare as leaders have been unwilling to engage in the work required. Responses to militant non-state actors will be ineffective without a whole of government effort that emphasizes military and nonmilitary interventions in appropriate measures to defeat violent threats, stabilize territories and restore the lives of affected populations.

Text:  As the world resumes Great Power Competition, irregular warfare will continue to be a means for states and groups to project power beyond their conventional means[1][2]. As in the Cold War, powerful nations will continue to employ indirect means to counter adversaries and shape events in the wider world[3]. As political leaders deal with the new global order, states can move from a military-first model of countering violent non-state actors and move to a whole of government approach that encompasses every facet of state power[4][5].

Countries confronting irregular warfare usually have underlying socio-economic difficulties[6][7]. Often, the authority of governing structures has been discredited by discontentment[8]. Both terrorists and insurgents usually seek to achieve political objectives by violence, either against the civil population, representatives of government, or both[9]. This violence to political transition implies that while military forces may defeat the irregular combatants and shape events on the ground, other means of power projection options are required to bring about durable peace. Without integrated and synchronized political, economic, legal, security, economic, development, and psychological activities[6], strategies against guerrillas, insurgents, and militias will not be effective.

Law enforcement agencies are often the most visible symbols of a government’s authority and the target of most attacks by insurgents and terrorists[10]. Historically, police action is the most effective strategy that ends terrorist groups that don’t abandon violence for political action[11]. The police organization’s ability to maintain a significant presence on the ground undercuts any narrative of strength insurgents may seek to project. Police Officers may carry out their usual functions of enforcing the law, mediating in disputes between locals, and protecting the population from criminals looking to take advantage of security vacuums.

Paramilitary forces can protect critical infrastructure, assist in force protection, expand the capacity of law enforcement, and deter militant activity with expanded presence and routine patrols. As these groups are often made up of volunteers from the local population, they can also serve as invaluable sources of intelligence and are less intimidating than armed forces[12][13].

Intelligence agencies can gather information about the combatants to facilitate a proper understanding of what the government is confronting how best to address them[14]. Human Intelligence from interrogations and agents, Signals Intelligence from intercepted communications, and other means of data gathering can help develop the picture of the guerillas, their leadership structures, the forces, the equipment available to them, and their support system both local and international[15][16]. These intelligence activities will include working with financial authorities to cut off their sources of funding and supporting military, security, and law enforcement tactical and operational actions[17].

The government can deploy its diplomatic corps to ensure international support for itself while dissuading foreign actors from intervening in support of the insurgents. These diplomats will ensure that the government’s narrative finds receptive audiences in foreign capitals and populations. This narrative can be converted to concrete support in terms of aid for securing military materiel and social-economic interventions in areas affected by the conflict. These diplomats will also work to dissuade foreign actors from providing aid to the militants and prolonging the conflict unduly[18].

Government agencies may provide social and economic interventions to support refugees and returnees seeking to rebuild their societies. The provision of health care, nutritional aid, job training, and economic opportunities will go a long way to break the attraction of militants and ensure that the population is invested in keeping the peace[19].

The government may encourage well-spirited Non-Government Organizations (NGO) and international agencies seeking to assist people caught up in the conflict. These agencies usually have vast experience and technical knowledge operating the areas of conflict around the world. While ensuring that these groups are acting in good faith, the government does not unduly burden them with regulatory requirements. Security for NGOs can be guaranteed to the extent possible[20].

Political leaders can ensure their words and deeds do not inflame tensions. They can seek to forge national identities that transcend tribal and ethnic leanings. They can address the concerns of indigenous population in the areas under attack work to separate legitimate grievances from violent acts. The governed must be able to advocate peacefully for change without resorting to violence. Governing structures can be focused on meeting societal needs to ensure peace and prosperity. Military and nonmilitary forces can be properly resourced and adequately overseen. They can facilitate understanding and unity of purpose. Concerns raised by security agencies can get the desired attention and support for measured actions to address them. The advent of nationalism and the non-applicability of democracy to all cultures demands that peoples be given sufficient avenues and support to organize themselves and that their demands be respected.

The attacks of September 11, 2001, built up the appetite of politicians for military interventions at home and abroad. This emphasis on military powers was to the detriment of other levers of power. Unfortunately, the abuse of military power to achieve goals best left to civilian or political institutions unfairly discredited the use of force in the eyes of the general public. This discrediting made it harder for politicians to justify military interventions even in situations where its deployment could be justified. While the military may continue to have a legitimate and even necessary role in countering irregular warfare, any successful strategy requires every element of national power. There are no recent success stories of a multifaceted approach to irregular warfare. This is because national leaders have been unwilling to engage in the work required. Political leaders can lead the way to move from violent responses to civil but more effective means to address conflicts.


Endnotes:

[1] Vrolyk, J. (2019, December 19). Insurgency, Not War, is China’s Most Likely Course of Action. Retrieved July 02, 2020, from https://warontherocks.com/2019/12/insurgency-not-war-is-chinas-most-likely-course-of-action

[2] Goodson, J. (2020, May 20). Irregular Warfare in a New Era of Great-Power Competition. Retrieved July 02, 2020, from https://mwi.usma.edu/irregular-warfare-new-era-great-power-competition

[3] Fowler, M. (2019, November 4). The Rise of the Present Unconventional Character of Warfare. Retrieved July 02, 2020, from https://thestrategybridge.org/the-bridge/2019/11/4/the-rise-of-the-present-unconventional-character-of-warfare

[4] McDonnell, E. (2013, January 7). Whole-of-Government Support for Irregular Warfare. Retrieved July 03, 2020, from https://smallwarsjournal.com/jrnl/art/whole-of-government-support-for-irregular-warfare

[5] White, N. (2014, December 28). Organizing for War: Overcoming barriers to Whole-of-Government Strategy in the ISIL Campaign. Retrieved July 03, 2020, from https://cco.ndu.edu/Portals/96/Documents/Articles/White_Organizing-for-War-Overcoming-Barriers-to-Whole-of-Government-Strategy-in-the-ISIL-Campaign-2014-12-28.pdf

[6] US Government (2012). Guide to the Analysis of Insurgency. Retrieved July 03, 2020, from https://www.hsdl.org/?view&did=713599

[7] Cox, D., Ryan, A. (2017). Countering Insurgency and the Myth of “The Cause”. Retrieved July 03, 2020, from https://www.airuniversity.af.edu/Portals/10/ASPJ_French/journals_E/Volume-08_Issue-4/cox_e.pdf

[8] Nyberg, E. (1991). Insurgency: The Unsolved Mystery. Retrieved July 04, 2020, from https://www.globalsecurity.org/military/library/report/1991/NEN.htm

[9] Office of the Chairman of the Joint Chiefs of Staff. (2020, June). DOD Dictionary of Military and Associated Terms. Retrieved July 04, 2020, from https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.pdf

[10] Celeski, J. (2009, February). Policing and Law Enforcement in COIN – the Thick Blue Line. Retrieved July 08, 2020, from https://www.socom.mil/JSOU/JSOUPublications/JSOU09-2celeskiPolicing.pdf

[11] Jones, S. and Libicki, M. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. Retrieved July 08, 2020, from https://www.rand.org/content/dam/rand/pubs/monographs/2008/RAND_MG741-1.pdf

[12] Espino, I. (2004, December). Counterinsurgency: The Role of Paramilitaries. Retrieved July 14, 2020, from https://calhoun.nps.edu/bitstream/handle/10945/1269/04Dec_Espino.pdf

[13] Dasgupta, S. (2016, June 6). Paramilitary groups: Local Alliances in Counterinsurgency Operations. Retrieved July 14, 2020, from https://www.brookings.edu/wp-content/uploads/2016/06/06_counterinsurgency_dasgupta.pdf

[14] Clark, D. (2008, June 27). The Vital Role of Intelligence in Counterinsurgency Operations. Retrieved July 14, 2020, from https://apps.dtic.mil/sti/pdfs/ADA448457.pdf

[15] White, J. (2007, April 14). Some Thoughts on Irregular Warfare. Retrieved July 14, 2020, from https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/96unclass/iregular.htm

[16] Steinmeyer, W. (2011, August 5). The Intelligence Role in Counterinsurgency. Retrieved July 14, 2020, from https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol9no4/html/v09i4a06p_0001.htm

[17] Department of the Army. (2006, December) Counterinsurgency. Retrieved July 14, 2020, from https://www.hsdl.org/?view&did=468442

[18] Murray, S. Blannin, P. (2017, September 18). Diplomacy and the War on Terror. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/diplomacy-and-the-war-on-terror

[19] Godson, J. (2015, August 16). Strategic Development and Irregular Warfare: Lessons from the High Water Mark of Full-Spectrum COIN. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/strategic-development-and-irregular-warfare-lessons-from-the-high-water-mark-of-full-spectr

[20] Penner, G. (2014, July 07). A Framework for NGO-Military Collaboration. Retrieved July 14, 2020, from https://smallwarsjournal.com/jrnl/art/a-framework-for-ngo-military-collaboration

Assessment Papers Civilian Concerns Damimola Olawuyi Dr. Paul Jemitola Government Irregular Forces / Irregular Warfare

Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Hari Prasad is an independent researcher on Middle East/South Asian Politics and Security. He holds a MA in International Affairs from George Washington University.  Divergent Options’ content does not contain information of any official nature nor does the content represent the official position of any government, any organization, or any group. 


Title:  Assessment of the Role of Authoritarianism in Fomenting Extremism in the Arab World

Date Originally Written:  December 29, 2017.

Date Originally Published:  March 19, 2018.

Summary:  Many Countering Violent Extremism (CVE) works have focused on the role of individual and enabling factors in the rise of extremism, yet it is important to not overlook larger structural factors.  In particular, authoritarianism in the Arab world has proven to help foment conditions that can help encourage the rise of extremism, or discredit counter extremism efforts.

Text:  In recent years with the rise of extremist groups like the Islamic State, the concept of CVE has gained traction in policy and academic circles.  A lot of emphasis has been put on the individual and community level with ideas such as examining the effects of discrimination, mental illness, and extremist ideology on influencing individuals to join violent extremist organizations.  However, it is also important to have an understanding of how larger structural issues, such as regime type, might allow for an environment that fosters extremism.  Using examples from throughout the Arab World, this assessment paper will show how authoritarianism contributes to extremism by encouraging divisions in society, undermining religious messaging, normalizing extremist rhetoric, denying outlets for political expression, and even facilitating the rise of extremist groups.

First and foremost, many Arab regimes fail to counteract sectarianism in the region. Instead of resolving ethnic, sectarian, or other tensions, the regimes exploit them.  As Syrian opposition intellectual Yassin al-Haj Saleh has observed, sectarianism played an important role in consolidating Syrian President Bashar al-Assad and his regime’s power[1].  Encouraging divisions in society causes the various sects to suspect one another, and ‘otherise’ them.  This ‘otherising’ continues sectarian tension and demonization, something that becomes operationalized to deadly effect during times of upheaval.  Authoritarian regimes also try to position themselves, especially to minority groups, as the sole protectors from radical groups.  This protector role provides some blackmailing towards minorities to support the regime or else, while also playing into the narratives of extremist groups that majority groups like Arabs and Sunnis are discriminated against by the regime[2].

Especially in combatting religious extremism, authoritarian Arab regimes can easily undermine religious messaging.  Often Arab regimes attempt to hold influence or control their respective official religious establishments to monitor the content as well as prevent criticism of the regime itself[3].  Although this has been used to also try to counteract extremist messaging, the fact that many religious establishments rarely stray from the regime narrative undermines counter-extremist messaging.  As official religious establishments primarily propagate a pro-regime narrative, they will be accurately perceived as simply another mouthpiece for the authoritarian regime.  Rather than serving as an important pulpit for counteracting extremist messages, the delegitimization of these religious institutions instead inadvertently encourage followers to seek out alternative narratives.

Along with this regime undermining of religious messaging, religion also is a valuable tool for regimes to turn to in times of crisis.  Former Iraqi President Saddam Hussein enacted his ‘faith campaign’ while dealing with the harsh sanctions regime.  This campaign led to the rise of new Islamic institutions and organizations, including institutions that the Islamic State’s leader, Abu Bakr al Baghdadi, attended[4].  In Egypt, despite overthrowing the democratically elected Islamist Mohammad Morsi, Egyptian President Abdel Fattah al-Sisi has also turned to Islam to help prop up his rule[5].  Regime manipulation of religion only further delegitimizes traditional religious leaders, while also normalizing religious language in denigrating their opponents.  Indeed, one of Egypt’s former Muftis went as far as to engage in similar takfirist (to declare a Muslim an apostate) justifications against Sisi’s opponents that the Islamic State and other extremist groups have engaged in[6].  Although it can be debated whether these initiatives are carried out to co-opt leaders or out of the personal faith of the leaders, these initiatives instead help normalize extremist rhetoric rather than counteracting it.

Many authoritarian regimes in the Arab World also limit political freedoms and outlets for political expression and change.  Indeed, scholars like Mohammad Hafez have demonstrated the role that repression and political exclusion has played in the rise of Islamic extremist movements around the world[7], especially in the Arab World.  Rather than serving as islands of stability, authoritarian regimes remain fragile and encourage resentment.  As there are few outlets to express one’s political opinions, and many ‘opposition’ parties are co-opted by the regimes, this encourages the rise of groups that lay outside of the realm of formal politics.

Finally, authoritarian regimes can directly facilitate the rise of extremist groups.  It is no secret that since the 9/11 attacks, many Westerners have preferred the ‘secular’ dictators instead of an ‘Islamist.’  These secular dictators have used the specter of Islamism to justify crackdowns and repression against all opposition.  While playing into the other factors that encourage victims to seek alternative ways of confronting the state, this has also proven useful for states that lack international legitimacy.  It is well-known that to support its narrative that it was simply fighting terrorists, the Assad regime released extremists and other unsavory characters from its prisons during the initial uprising in Syria[8].  As the initial protests turned to an uprising, these former prisoners formed organizations that helped paint the groups opposing Assad as extremist.  Groups like the Islamic State even temporarily received support from the Assad regime in its fight against the Free Syrian Army and other Syrian opposition groups.  Of course these are temporary alliances, but it demonstrates how authoritarian regimes will tactically allow extremist groups to form for the sake of their own survival.

Without reforming or changing these authoritarian structures in the Arab World, CVE efforts will only have a limited effect.  Of course, the demise of authoritarianism will not necessarily lead to an extremist free region.  After all, it is the newly democratic Tunisia that has become a large contributor for fighters for the Islamic State.  Nor will authoritarian reform lead to the erasure of extremist ideologies.  Yet, changing these authoritarian structures will provide a political opening that will allow better combatting of extremist ideology, while also providing a less repressive life for those that live in the region.  Authoritarian reform should not be mistaken as purely a humanitarian effort.  It is no secret that Western support for authoritarian regimes has been a common grievance for many extremist groups in the Middle East.  Mohammad Hafez in his keynote remarks to the RESOLVE Network in 2016 noted that the choice between repressive states or extremists, or rather “between barrel bombs and beheadings” is a false one, and one that the regimes themselves try to create[9].  Extremism in the region will never be fully addressed until policymakers understand the structural factors within authoritarian regimes that drive this behavior.


Endnotes:

[1] Saleh, Y. A. (2017). The Impossible Revolution: Making Sense of the Syrian Tragedy. Chicago, IL: Haymarket Books.

[2] Shabi, R. (2014, April 10). Battling Perceptions: Minorities in the Arab World. Retrieved December 29, 2017, from http://www.aljazeera.com/indepth/opinion/2014/04/battling-perceptions-minorities–20144965348535478.html

[3] Brown, N. (2017, May 11). Official Islam in the Arab World: The Contest for Religious Authority. Retrieved December 29, 2017, from http://carnegieendowment.org/2017/05/11/official-islam-in-arab-world-contest-for-religious-authority-pub-69929

[4] McCants, W. (2015, September 1). The Believer: How Abu Bakr al-Baghdadi Became Leader of the Islamic State. Retrieved December 29, 2017, from http://csweb.brookings.edu/content/research/essays/2015/thebeliever.html

[5] Springborg, R. (2014, May 24). Sisi’s Secret Islamism. Retrieved December 29, 2017, from https://www.foreignaffairs.com/articles/middle-east/2014-05-26/sisis-secret-islamism

[6] Elmasry, M. (2015, June 27). Ali Gumah: Sisi’s Most Loyal Islamic Scholar. Retrieved December 29, 2017, from http://www.middleeasteye.net/columns/ali-gumah-sisi-s-most-loyal-islamic-scholar-1205811558

[7] Hafez, M. M. (2005). Why Muslims Rebel: Repression and Resistance in the Islamic World. Boulder: Lynne Rienner .

[8] Gutman, R. (2016, December 01). Assad Henchman: Here’s How We Built ISIS. Retrieved December 29, 2017, from https://www.thedailybeast.com/assad-henchman-heres-how-we-built-isis

[9] 2016 RESOLVE Forum Flashback: Keynote Speaker Dr. Mohammed Hafez. (2017, September 15). Retrieved December 29, 2017, from http://www.resolvenet.org/news/2016-resolve-forum-flashback-keynote-speaker-dr-mohammed-hafez

Assessment Papers Government Hari Prasad Violent Extremism