The North American Aerospace Defense Command (NORAD) has long been a function of the North American security environment. Initially established during the Cold War, NORAD was intended to fulfill a homeland defense role by looking outwardly to identify and interdict threats approaching Canada and the United States. In the post-9/11 period, NORAD’s focus has evolved and the institution has shifted from looking outwardly to include participation in homeland security operations taking place within the United States and Canada. NORAD’s participation in North American homeland security operations has resulted in the redefinition of the institution’s role in defense and security operations. In recent years, NORAD has provided airborne security at major sporting events, government conventions, and other large public gatherings. This homeland security support role has been buttressed by the institution’s appropriation of popular cultural icons, such as Santa Claus and Superman. These examples are symbolic of a broader shift away from strategic defense, towards a public relations’ role. In the post-9/11 period, NORAD’s primary function has been to affirm U.S. dominance over North American skies, and to convey to the public audience that the potential for future terrorist attacks remains a threat to domestic security. » More
October 7th marked the 11th anniversary of the United States-led war in Afghanistan. International combat forces are due to leave the country at the end of 2014, yet the war has remained “mission unaccomplished“. After years of conflict, NATO forces are set to handover responsibility for securing the country to the Afghan armed forces. However, it remains to be seen whether the Afghan’s will be able maintain order and stability after the withdrawal of foreign troops?
In the aftermath of 9/11, the United States and its NATO allies invaded Afghanistan in order to dismantle the Taliban regime and the core leadership of al Qaeda. After several weeks of conflict, NATO troops successfully ousted the Taliban from various cities and helped to establish a new democratic country — the Islamic Republic of Afghanistan. » More
Following the deaths of around a hundred people in southern Madagascar in clashes between zebu cattle rustlers (“dahalo”) and farmers, the government has decided to take special security measures to restore order. The violence is a symptom of the growing political instability in Madagascar that is affecting urban centers as well as rural communities.
People’s Justice in the South
Thefts and armed attacks are a recurring problem in Madagascar and have been growing more and more frequent since the political crisis in 2009. To overcome this problem, a national counter-instability plan [fr] was formally introduced in April 2012. The government has now mobilized the armed forces in the capital as well as in areas particularly affected by cattle theft.
However, initial attempts at stabilizing the southern region were far from successful. As Alain Rajaonarivony explains [fr]:
The military campaign carried out against the dahalo in the bush of the great south in June and July 2012 was a disaster. Not only were they more familiar with the local terrain, the dahalo were also just as well equipped as the government forces – and the lack of helicopters was sorely felt by the latter. The government forces were especially noted not for their combat ability but for their atrocities, when they burnt villages that could serve as support bases for the dahalo. » More
The CSS Expert Community “Crisis and Risk Network” (CRN) has just released a new report on strategies and policies in the field of Cybersecurity. Based on the cybersecurity strategies of the US, the UK, NATO and other actors, the paper explores what cybersecurity actually means, puts forward possible responses to the perceived threats and discusses that with a focus on the Swiss situation. The authors argue that the underlying problem to cybersecurity policies is that it remains unclear what is threatened, who is threatening, and what the potential consequences of cyberattacks could be.
The paper can be downloaded here.