The U.S. spends billions of dollars in its security cooperation program to develop “professional, accountable, and capable security forces” in other nations, part of a grand strategy to improve global stability and counter violent extremism. Despite its great investment in professionalizing foreign militaries, however, the U.S. has no functional definition of military professionalism – a term that until now has been considered too vague and multi-faceted to operationalize. In this article, the author seeks to remedy this oversight, drawing from twenty years of security cooperation fieldwork in Latin America and Africa, as well as a vigorous literature review, to define four important components of military professionalism: (1) formal military education and vocational training, (2) military subordination to elected civilian officials, (3) knowledge and practice of the law of armed conflict and human rights law, and (4) a clearly established program of professional military ethics. This article provides guidelines for U.S. and European officials who work with partner nations to develop more professional military forces and, in particular, for officials managing security assistance programs with developing countries.

Paterson, Patrick. “Measuring Military Professionalism in Partner Nations: Guidance for Security Assistance Officials.” Journal of Military Ethics 18 (2) 2019: 145-63. doi:10.1080/15027570.2019.1638461.

Only available commercially

a
Read more
Patrick Paterson's monograph, Training Surrogate Forces in International Humanitarian Law: Lessons from Peru, Colombia, El Salvador, and Iraq, leverages the author’s vast experience in Latin American history to examine how US Special Operations Forces (USSOF) train surrogate forces. He argues that it is necessary to employ United States Special Operations Command's (USSOCOM) indirect approach to grow and build partnership capacity through foreign internal defense (FID) and to find a balance with international humanitarian law (IHL). Paterson also examines the legal issues and restrictions on training and equipping foreign forces and the impact of these exchanges with our partners. His research methodology includes extensive interviews and incorporates a historical case study approach, examining FID efforts in Peru, Colombia, and El Salvador for lessons learned, and then compares and contrasts USSOF train and equip efforts in Iraq.
Read more
This article provides an overview of the Inter-American Strategy to Combat Threats to Cybersecurity, highlighting the roles and responsibilities of the various stakeholders, including governments, international organizations, the private sector, and civil society. The article emphasizes the recent success achieved by this international arrangement by observing the increase in the number of national Computer and Security Incident Response Teams (CSIRTs) in America, as well as the intent to create a regional cybersecurity culture in partnership with the private sector and civil society and the cooperation between law agencies throughout the continent.
Read more
This paper studies the impacts of the military securitization of cyberspace in the international politics of the 21st century. Cyberdefense is chosen as the object of study precisely because it allows inferences to be made about the political-institutional materialization of this issue, seeking support in the theory of securitization, proposed by the Copenhagen School. In this sense, this paper seeks to: (i) identify the main existential (cyber) threats to the military sector, revealing why this process is intensifying in the 21st century; (ii) project the conditions for such securitization; and (iii) explain its effects on international politics, based on the cases of the United States, Brazil and Canada. To this end, the Spectrum of Military Securitization of Cyberspace (ESMC) is designed, a framework of analysis based on the theory of securitization with a focus on cyberdefense in a given time and space. As for the literature review, Brazilian and foreign authors in Political Science and International Relations figure mostly in the body of this work. As for the methodology, it uses the qualitative-quantitative analysis style, despite the use of interviews, case studies, discourse and document analysis. Its conclusion aims to corroborate the hypothesis that, in addition to the securitization of cyberspace by the military sector, this process is reflected in current international politics. Consequently, it is possible to situate the three cases in this ESMC.
Read more
This paper addresses some of the policy issues affecting cybersecurity in the Caribbean and how best to respond to those challenges. International organizations such as the International Telecommunications Union and the Organization of American States called for all states in the region to develop national cybersecurity strategies to protect their critical infrastructure, business interests, and private citizens. The Caribbean states have lagged in establishing national cybersecurity strategies. The challenge for Caribbean states and other developing nations remains how best to protect their security and economic interests in a connected environment. Which strategic paradigm fits the culture and the capabilities of such nations? This paper examines the threat and the various alternative frameworks to respond to the growing cyber threat including national security, economic, and public health approaches to cybersecurity.
Read more

Twitter feed is not available at the moment.