This website uses cookies to ensure you have the best experience. Learn more

The Transnational Security Threats From Failed States

1334 words - 6 pages

Failed and weak states are posing greater security threats to the world than it were ever imagined. The collapse of autonomy and sovereignty among states is therefore a susceptible situation in the modern world. Developed states like the United States and other notable security sensitive nations are focusing their security efforts towards the failed states. This is mainly because these weak states have become breeding sites for criminal activities, and terrorist groups have established strong bases in such countries. The challenges posed by these failed states on security issues are far-reaching, and reliable measures have to be taken in order to safeguard the safety of the global ...view middle of the document...

According to a recent United Nations report on transnational security threats, failed states are characterized by extensive violation of human rights (Bar-Joseph, 2001). Critical analysis on failed states shows that there is reasonable evidence to link transnational security threats to these states. Some well known group that has taken refuge in failed states over the years includes Al Qaeda (Wyler, 2010).
Most failed countries are hospitable to terrorist groups and cruel warlords(Rotberg, 2002). This is because the prevalent governments in such countries are often illegitimate, at least from the international perspective. Most people and security systems in failed states are in conflict and the legal machinery do not take necessary note on terrorism (Rotberg, 2002) Pakistan, for instance, has been cited as a terrorist hotbed, since the security systems in the country are largely not adequately functional (Bellamy, 2008). According to many scholars and analysts, failed states are breed sites for terrorism. Thus, the presence of frail measures to curb transnational insecurity can be termed as an acute challenge to traditional security concerns in the world (Bellamy, 2008). Several security analysts have commented that the Pacific Islands are greatly preferred by terrorist groups since there are constant civil conflicts (Firth, S. 2008). Therefore, the state institutions in such failed countries do not pay much attention to crime occurrences.
International crime is also a notable challenge to traditional security concerns. Most transnational criminal groups have formed strongholds in the failed states (Wyler, 2010). Illicit trading such as money laundering, drug trafficking and arms smuggling is the order of the day in some failed countries. This has been attributed to the high levels of corruption and legislative failures in these countries. The national interest aspects are overlooked in failed countries, and transnational criminal activities are bound to take place under such conditions. According to the U.S Interagency Working Group, cases of international crimes are rampant in the failed states, such as the Balkans, Sub-Saharan Africa and also the Central Asian countries (Wyler, 2010). The transitional crime groups which perpetrate international security threats have diverse networks, whose operational offices are mainly located in failed states( Shahar, 2007). Thus, corruption and unmonitored state operations can lead to encourage transnational insecurity, thus challenging the traditional security concerns.
Peace and stability has been affected by resource wars in the world. Failed states which are well endowed with natural resources lack the proper resource management strategies, a factor that leads to insecurity ( Mittelman, 2010). Many criminal groups have used the advantage of weak economic and political policies in failed resources to exploit natural resources. The proceeds from this illegal trading are used to stage wars and arm...

Other Papers Like The Transnational Security Threats from Failed States

The United Nations Essay

2368 words - 10 pages Security Council, The International Court of Justice and The Economic and Social Council. The General Assembly is the only UN organ that contains all 193 state members, all with equal votes. The main powers of the General Assembly are overseeing the budget of the UN, appointing non-permanent states to the Security Council, and receiving reports from various organs of the UN. Aside from these responsibilities, the General Assembly is also required

Sociology Essay

2417 words - 10 pages , irrespective of their race or social status. (Peluso 389) With very little influence in decision-making from minority groups, policymakers deliberately target these low-income communities of visible minorities. Environmental racism is evident as the transnational corporations are allowed to dump toxic waste and acquire land to set up polluting industries in these communities. The results are the exposure of children and adults in these

Complex Interdependence

5624 words - 23 pages especially for security purposes. We have seen the complicated interdependence among states in the alliance system to achieve their political ends before First World War. The earliest example of interdependence comes from Norman Angell’s “The great illusion (1910) when he said the economic interdependence will minimize the occurrence of war on the basis of cost-benefit analysis.” Countries are dependent on each other for trade and transaction, they

Global Banking

2083 words - 9 pages • Rise of petrodollars of the oil-producing countries in the middle east • Outflow of dollars from United States as a result of US military and economic spending in foreign countries, and foreign investments by US corporations - Before the 1970s, IMF, WB, and the governments of the industrial countries financed most of the borrowings of the developing countries. However, in recent years the transnational banks have assumed a major role in

11.2.2.6 Lab Cnaa

608 words - 3 pages ), and the SANS Institute. The list was developed to prioritize the cyber security controls and spending for DoD. It has become the centerpiece for effective security programs for the United States government. From the Resources menu, select Top 20 Critical Controls. Select one of the 20 Critical Controls and list three of the implementation suggestions for this control

The Way Forward in Afghanistan and Pakistan

738 words - 3 pages ? The 2008 National Defense Strategy counter balances the armed forces ‘ past tendency to focus on conventional threats and conflicts mainly because of the irregular warfare that the United States has faced OCONUS (Iraq) (Afghanistan) and CONUS (Twin Towers of New York City on 9/11) or as quoted from the June 2008 National Defense Strategy, “For the foreseeable future, this environment will be defined by a global struggle against a

Iran Economic Swot

1804 words - 8 pages ) London, a walker could be filmed on average 8 times a day ! Recognition and identification of one particular person from the crowd (using face recognition software and photo database) 51 Geopolitics, International Environment and Business Risks identification Company and information security Information Security 52 3 components Integrity Availability Confidentiality 53 3 information systems levels Communications

Terrorism of 21st Century

3157 words - 13 pages , 2001. (Intellectual Takeout , 2014) During the 1990s, the end of the cold war led to an entirely new global security environment, marked by a focus on internal rather than inter-state wars. In the early 21st century, new global threats emerged. The attacks of 11 September 2001 on the United States clearly demonstrated the challenge of international terrorism, while subsequent events heightened concern about the proliferation of nuclear weapons

Multinational Lenses On Migration

5218 words - 21 pages movements; however, absolutely, the concerns of states about security are very different from individuals’ concerns. General perception on Immigration and Motivations of Immigration As written above in abstract section and above, the focus of perception in terms of receiver nations is specified with northern perspective, that is, European countries and the United States where of the pull factors for potential immigrants are several. What is the

Contemporary Globalisation Has Made The Nation State Obsolete. Discuss With Reference To Political Relations

1807 words - 8 pages the political perspectives from all three theories will conclude that although there are some deficiencies, the transformationalist theory seems to be the most sound.The contemporary world is divided into geo-political space and has its roots in the Westphalian system, 'The organisation of humanity into sovereign, territorially exclusive nation-states' (McGrew, 2004, p133) implemented in 1648. This system centres on the legal and political

Are Regional Organizations Best Suited to Manage Security Threats in Their Own Geographical Area?

3066 words - 13 pages own geographical area. Since the treaty of Westphalia, security has been dominated by power structure defined from the realist perspective of balancing one power against another. The concept of formulating regional security policy has to be changed. If states transcend from the realist mindset and adopt more of an idealist approach, regional organisations are very likely to succeed in managing security threats in their own geographical area

Related Essays

From Stars And Stripes To Rising Sun: A Study Of Patent Laws In The United States And Japan

3438 words - 14 pages From Stars and Stripes to Rising Sun: A Study of Patent Laws in the United States and Japan Introduction There is no question that the United States and Japan are technological leaders of the world. They are two of the nations with the highest annual number of intellectual property patents granted.1 Both nations have achieved such great successes in the world of intellectual property as a result of a variety of reasons. Among these reasons

Fetal States While The Baby Is Still In The Womb, How Things Are Different From Inside And Out. "Mystery Of A Hidden Life"

560 words - 3 pages The article entitled,"The mystery of fetal life: Secrets from the womb" (Pekkanen, 2001) starts out with a brief discussion about an embryo's development (e.g. rapid cell division, cell differentiation, development of organs) capabilities (e.g. movement of arms/legs, swallowing, awareness, sending hormonal signals) and threats (e.g. mother's emotions, health and behaviors, environmental factors) while in the mother's uterus. The importance of

Security Management In Noi Bai Airport

1339 words - 6 pages assurance that goods have not been tampered with and kept secure. There are several security threats such as Terrorism, Organised Crime and Cargo Theft, Hijacking and Piracy, Drug/human smuggling, Illegal weapons, Counterfeit goods, Illegal exports of licensed materials/technology For instance, transnational criminal organizations use the aviation system to transport contraband and, increasingly, people across the globe. Cocaine smugglers have used

Intelligence Essay

1063 words - 5 pages efforts in the protection of national and homeland security. The Intelligence Community faces persistent challenges and transnational issues. The IC must be agile in adapting to emerging threats and harnessing opportunities. The IC has been criticized for its lack of coordination, cooperation, and intelligence-sharing leading to intelligence failures such as the attacks of September 11, 2001. Parts of the criticism of the IC are duplicative