ISDP-header
Traditional and Non-traditional Security

494_security_and_political_violenceSince the end of the Cold War, the need to widen the concept of security and distinguish between "hard" and "soft" security threats has been increasingly accepted, but the implementation of strategies to face "soft" security threats has been less prominent. Moreover, there has been a failure to understand in what way old and new security threats overlap and in many ways in fact reinforce each other. This research area covers both traditional and non-traditional security threats, but more importantly seeks to understand their connection with each other. Another aim is to understand their impact on the region and what can be done to combat them.

Non-traditional and often transnational threats to security have risen to prominence, primarily in developing and post-communist areas. Among these, the trade in illicit drugs arguably carries the largest societal, political, and economic consequences. Linkages between security threats and weak political and economic performance not only reinforces the negative development, it in fact threatens the very fabric of the weak states in which security threats thrive.


Narcotics, Organized Crime and Security in Eurasia PDF Print Email
Projects

772x360_organized_crime_and_narcotics

During the latter part of the 20th century, illegal drug production for Western markets has developed and consolidated in various parts of Asia. The near entirety of the heroin consumed in Europe originates in Afghanistan, with major individual and societal problems in the countries of consumption. However, the production and smuggling of heroin causes even worse problems in the production and transit countries. In the states along the smuggling routes, narcotics affect the general health conditions of the population, with severe diseases including HIV/AIDS as a result. It also contributes to crime and social conflicts, exacerbates corruption and threatens sovereignty, fuels extremism and terrorism, and plays an important role in civil wars.

Read more...
 
Traditional and Non-traditional Security in Eurasia PDF Print Email
Projects

Since the end of the Cold War, the need to widen the concept of security and distinguish between "hard" and "soft" security threats has been increasingly accepted, but the implementation of strategies to face "soft" security threats has been less prominent. This has changed somewhat but the problem that we now faces is that the separation between hard (traditional) and soft (non-traditional) security threats has been almost total, and in many ways artificial. It has been a positive trend to elevate the so called new security threats, but there has been a failure to understand in what way old and new security threats overlap and in many ways in fact reinforce each other. This book aims at analyzing both the traditional and traditional security threats in Eurasia, but more importantly conncecting these with each other to see how they interact and reinforce each other. Another aim is to understand what the impact is on the region and what can be done to combat the security threats in Eurasia.

Read more...
 


Publications on Traditional and Non-traditional Security

Jacob Zenn
Kyrgyzstan Increasingly Vulnerable to Militant Islamism
ARTICLE, CACI Analyst, Volume 16, No. 05, March 05, 2014 Webpage Link
Bernt Berger
East Asian Security Beyond Models and Polar Orders?
CONFERENCE PAPER, February 25, 2014, pp. 38-41 Webpage Link
Tahir Azad
Pakistan's Nuclear Security: Separating Fact from Fear
POLICY BRIEF, No. 143, February 05, 2014 Webpage Link
Richard Weitz
Afghanistan and India Deepen Strategic Cooperation
ARTICLE, CACI Analyst, Volume 16, No. 02, January 22, 2014 Webpage Link
Valeriy Dzutsev
Moscow Takes Counterproductive Security Measures Ahead of Sochi
ARTICLE, CACI Analyst, Volume 16, No. 02, January 22, 2014 Webpage Link
Sangsoo Lee
Carving up the Skies: China's New Air Defense Zone
POLICY BRIEF, No. 140, January 14, 2014 Webpage Link
Stephen Blank
India's Challenges in Central Asia
ARTICLE, CACI Analyst, Volume 16, No. 01, January 08, 2014 Webpage Link
Emil Souleimanov
Volgograd Bombings Demonstrate the Inability of Russia's Security Services
ARTICLE, CACI Analyst, Volume 16, No. 01, January 08, 2014 Webpage Link
Stephen Blank
Azerbaijan's Security and U.S. Interests: Time for a Reassessment
SILK ROAD PAPER, December 2013, pp. 75 Webpage Link
Jamil Payaz
Hajj Remains a Source of Tension Between Kyrgyzstan's Muftiate and State Agencies
ARTICLE, CACI Analyst, Volume 15, No. 19, October 02, 2013 Webpage Link
Robert Bedeski
Reinventing Human Security: Lessons from Chinggis Khan's Biography
STOCKHOLM PAPER, August 2013, pp. 42 Webpage Link
Elliot Brennan
The New Prize: Asia’s “Fire Ice” Gas Revolution
COMMENTARY, The Diplomat, May 11, 2013 Webpage Link
Richard Weitz
The Turkey Triangle: Ankara, Moscow, Tehran
ANALYSIS, Turkey Analyst, Volume 6, No. 7, April 10, 2013 Webpage Link
Elliot Brennan
The “Fracking” Revolution Comes to China
ANALYSIS, The Diplomat, March 21, 2013 Webpage Link
Elliot Brennan
Shale Gas: The Key in the US’ Asia Pivot? (republished)
COMMENTARY, China US Focus, March 08, 2013 Webpage Link
Elliot Brennan
Shale Gas: The Key in the US’ Asia Pivot?
POLICY BRIEF, No. 115, February 27, 2013 Webpage Link
Lars-Erik Lundin, Kirsten van Kaathoven
Whither the OSCE and the Euro-Atlantic & Eurasian Security Community?
POLICY BRIEF, No. 111, January 16, 2013 Webpage Link
Sergei Gretsky
Astana and Tashkent Spearhead Move to a New Security Architecture For Central Asia
ANALYSIS, CACI Analyst, Volume 14, No. 23, December 12, 2012 Webpage Link
Jacob Zenn
Kazakhstan Affected by Regional Proliferation of Terrorist Networks
ANALYSIS, CACI Analyst, Volume 14, No. 23, December 12, 2012 Webpage Link

ISDP in Social Media

facebook 46x46 twitter 46x46 linkedin 46x46

Share this

Newsletter

icon-isdp-newsletter

johnshopkins

 

CACI_SRSP