Despite there being much speculation on how the events during the July 15, 2016 military uprising and the resultant mass purges and military reforms disrupted the operational effectiveness of the Turkish Armed Forces (TAF), no analytical piece assessing the TAF’s effectiveness and relying on field-related facts and insights derived from primary sources has appeared
Africa’s security problems, Democracy and Human Rights, Economic Development, Terrorism, Transparency and Corruption.
For a researcher of international relations, the African continent is only a very rich laboratory where it will be possible to analyze all the problems facing, at the present, the international community.
Since the September 11 attacks, counter-terrorism (CT) has gained prominence and become a central issue throughout the world. Given the growing transnational character of terrorism, counter-measures also entailed a collective nature. At this point, the role of global and regional organizations to bring the efforts of the individual countries into a meaningful action become much more important.
Border security ensures sustainable development of a state. Pakistan has the longest border with Afghanistan known as “Durand Line.“ The borderland is rugged, mountainous and porous unable to control the transition of people across the frontier. Both countries are having a history of strained relations but in the past forty years, there were two mass migrations of Afghan people to Pakistan.
NATO’s ability to accord and shape security environment can be considered in four folds of which all are mutually integrated: Alliance’s solidarity, coherent common vision, consolidated security architecture and the capacity for rational prioritisation, and effective operational conduct.
Ladies and gentlemen it is nice to see you. Unfortunately, Covid 19 prevents us from getting together in real. Fortunately, we have the high communications technology at our disposal to continue to do business as usual.
Introduction: The Conceptualisation of Terrorism The concept of security historically based on the emergence of human society is also an ambiguity concept both in International Relations discipline and in daily usage. On the one hand while discussions about defining and specifying of the scope of the concept is continuing, on the other hand it is frequently
Today’s media is no longer limited to newspaper, television or radio but modern media, in written or audio-video form, has become fast, effective and accessible as it can share information worldwide in no time. Everything can be saved electronically in computers, mobiles or other digital devices. Digital media has great impact on states and societies with some good and bad sides.
The rapid advancement of Information and Communication Technologies (ICT) since the mid-1980s has revolutionized the Information Infrastructure (II), which comprises communications networks and associated software and facilitates interaction among people and organizations. The prevalence of information at all levels of a society-individual,
NATO Allies on the both sides of the Atlantic have been witnessing various ongoing crises: from mass refugee influx to rising concerns over emboldening Russian maneuvers in Ukraine and Syria, and nowadays the strategic consequences of Brexit for Euro-Atlantic relations. Evidently, these interrelated challenges are of transnational and hybrid nature involving state and nonstate actors alike. These threats of hybrid nature posed by
This is hard to materialize the perpetual peace by Kantian dream. It needs a lot of transparency, a whole gamut of committed political leadership and a collective will for a lasting peace. The problem with ethnic conflicts, especially centered on self-determination, is that they last for decades. Moreover,
The ‘Border Security and Control’ is an important function of ‘State Sovereignty’. “Sovereignty of state is one of the key feature of the Westphalian order.”1 It is also accepted as the supreme legitimate authority within the territorial boundaries of the state.2
Soft power has become an increasingly important part of effective foreign policy strategies as the 21. Century is distinguished by transnational interactions and dispersion of power at local, national and international levels. The rise of networks
In contemporary armed conflicts, science and technology increasingly plays a determining role and decisively shape outcomes. This techno-scientific discourse has led to development of cutting edge weapon systems, with armed drone as its prime example.
• Is Donald Trump trying to move the focus away to something else from the pandemic?
• What are the discourses of US and Chinese politics that feed the pandemic accusations?
• What policy does the WHO implement between US and China?
The China advocates an authoritarian liberal policy in the administration of the communist party, far from democracy, human rights and a western-style government. On the other hand, China, which is fully integrated with the world, is increasing its presence in the regions it chooses such as Africa and Middle East and North Africa. Keywords: China, Middle East, North Africa, Military, Economic Power, Diplomacy, Soft Power
Autonomous Weapons Systems (AWS) enable operating almost independent from human intervention by providing continuous monitoring, data collection, and processing great mount of data in a short-time period. In that respect, AWS have been desired for Indigenous Defense Industry Countries (IDIC) such as India, Israel, and Turkey. Key Words: Autonomous Weapons, Indigenization, Defense Industries, Regional Security, Military
Nowadays, it is obvious that the over-demands of the consumption society are not entirely met and can not be satisfied by many people especially in the poor and developing ountries.
This is not a sustainable way of life. It can not be denied that it has caused great human migrations, insurrections and conflicts for centuries that eventually feed terrorism.
Do cyber wars pose threats to national or global security? What is the impact of the privatization of intelligence in cyber sector? How can cyber wars ruin people’s daily lives? Is it really possible to attribute cybercrimes to their rightful perpetrators? Will information warfare be bloodless or do virtual acts have the potential to shed real blood?