JF Guitba Report
JF Guitba Report
JF Guitba Report
LEARNING OBJECTIVES:
1) To analyze the types and impacts of threats that cross national borders and affect global
safety and security.
2) To examine how organizations like the UN work to counter these threats and promote
worldwide security.
3) To evaluate how well existing agreements between nations help reduce risks that
transcend borders.
4) To identify and study successful strategies and actions that contribute to making the
world safer, and understand their effects.
INTRODUCTION
BODY OF REPORT
TRANSNATIONAL THREATS are the defining security issues of our time (Cambone,
1998). These are non-traditional security issues that threaten the national security or
economic stability of a state’s society, and are not bounded by the borders of any state.
Transnational threats did not emerge fully formed with the 9/11 attacks. They
have deep historical roots, but have evolved most rapidly during and immediately
Page 1
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
following the Cold War-era. The advent of airplane hijackings in the 1970s was the birth
of modern transnational terrorism, according to Bruce Hoffman in his book Inside
Terrorism, because all elements of the act transcended borders. The victims,
perpetrators, and audience of the acts were from and in many different states, and the
hijackings themselves took advantage of the new normal of high-speed international air
travel (Hoffman, 2002).
Typically, transnational threats or challenges arrive in the host state because of
their intrinsic nature (e.g., air pollution that crosses an international border due to
prevailing winds) or because of porous borders resulting from government policies that
reflect either an unwillingness or inability to restrict or regulate cross-border flows.
Examples of key transnational threats include, among others:
1. transnational crime
2. terrorism
3. arms trafficking
4. human trafficking
5. illegal drugs trafficking
6. internal displacement
7. infectious disease
8. environmental degradation
Page 2
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
scholars have gone as far as to suggest that the term 'transnational' should become
redundant and replaced with what is considered a more accurate description: 'trans
sovereign'. For these scholars, in view of the fact that the term 'nation' is not
synonymous with the term 'sovereign state', the word 'transnational' is argued to simply
add needless confusion to what is an already complicated idea. However, a workable
definition has been provided in a 1997 outline of the emerging field, Security Studies for
the 21st Century, written by Richard Shultz, Roy Godson, and George Quester. In the
text, the term 'Transnational security' was referred to as a 'paradigm for
understanding the ways in which governments and non-state actors—functioning
within and across state borders—interact and affect the defense of states and
their citizens.'
Page 3
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
pandemics include the global spread of COVID-19 and the devastating impact of
HIV/AIDS in sub-Saharan Africa.
5. Global environmental degradation and climate change involve the
deterioration of ecosystems and the Earth's climate system on a planetary scale.
Human activities such as deforestation, pollution, and greenhouse gas emissions
contribute to climate change, leading to rising temperatures, sea-level rise,
extreme weather events, and loss of biodiversity. Climate change poses
existential threats to human societies, exacerbating existing vulnerabilities and
contributing to conflicts over resources. Addressing environmental degradation
and climate change requires international cooperation and concerted efforts to
mitigate emissions and adapt to changing conditions. Examples of global
environmental degradation and climate change include deforestation in the
Amazon rainforest and the melting of polar ice caps due to global warming.
Page 4
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Page 5
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Page 6
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
11. African Union (AU): The AU, also mentioned earlier, works to promote peace,
security, and stability in Africa through conflict prevention, peacekeeping
operations, mediation efforts, and addressing various security challenges,
including armed conflicts, terrorism, and transnational crime.
12. Organization of American States (OAS): The OAS is an organization that
promotes cooperation and dialogue among countries in the Americas. It
addresses various security challenges in the region, including promoting
democracy, human rights, and addressing transnational threats such as drug
trafficking and organized crime.
Page 7
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Security Council. Thus, UN resolutions are legally binding on UN Member States, and no
signature or ratification is necessary.
In addition to treaties, there are other less formal international agreements.
These include such efforts as the Proliferation Security Initiative (PSI) and the G7 Global
Partnership Against the Spread of Weapons of Mass Destruction. Although the PSI has
a “Statement of Interdiction Principles” and the G7 Global Partnership has several
statements by G7 leaders, neither has a legally binding document that lays out specific
obligations and that is signed or ratified by member countries.
Page 8
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
There are two main explanations for treaty compliance. The rational actor
model suggests that States comply with their international obligations when it is directly
in their self-interest. On the other hand, the normative schools of thought argue that
compliance is influenced by long-term interests, including reputation, the functioning of
the international system, and internalized commitment to international regimes.
Understanding why States comply with their obligations is crucial for developing
strategies to promote compliance in various areas of international law, including WMD
treaties. Approaches can range from emphasizing sanctions and strong enforcement
powers to encouraging and facilitating compliance rather than focusing on punishments.
Page 9
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
RESPONSES TO NON-COMPLIANCE
1. Treaty-based mechanisms are important for enforcing compliance and
resolving disputes related to non-compliance. Weapons of Mass Destruction
(WMD)-related treaties include provisions for dispute resolution, starting with soft
enforcement measures like consultations and fact-finding. If non-compliance
persists, more severe options such as sanctions can be imposed. Dispute
resolution aims to gradually escalate in intensity while maintaining momentum
and preventing escalation. However, complete resolution of disputes can be
difficult, and the focus may shift towards managing and preventing further
escalation.
2. The Security Council has authority over matters of international peace and
security, including cases of persistent non-compliance with WMD-related treaties.
It can act even in the absence of specific references in treaty regimes if non-
compliance poses a threat to international peace and security. Many treaties
explicitly mention the role of the Security Council, such as the Biological
Weapons Convention (BWC) which allows any State Party to lodge a complaint
with the Security Council regarding non-compliance.
3. The International Court of Justice. There is no centralized, automatic recourse
to judicial forms of dispute resolution in international law generally or in the area
of arms control and disarmament specifically. However, there are examples of
attempts by States to enforce compliance of WMD-treaties through the
International Court of Justice (ICJ).
a. Provisions in the treaty regimes. Negotiating states prefer to keep
disputes within the treaty regime rather than seeking external
adjudication. For example, in the Chemical Weapons Convention (CWC),
the option to refer a dispute to the ICJ is available, but it has never been
pursued. The Conference of the States Parties and the Executive Council
of the OPCW can request advisory opinions from the ICJ, but no such
request has been made to date.
b. Routes to the ICJ outside treaty regimes. Recourse to the International
Court of Justice (ICJ) for compliance disputes can be achieved if states
have accepted the Court's jurisdiction independently of the treaty.
However, the Court's jurisdiction only applies if all parties to the dispute
have accepted it, which has proven to be a significant obstacle. Another
option is seeking an advisory opinion from the ICJ, which involves
obtaining the Court's opinion on a specific legal question. Examples of
this include advisory opinions sought regarding the use of nuclear
weapons.
4. Countermeasures are actions taken by one state in response to another state's
violation of international law. They are an enforcement measure recognized
under general international law. However, their permissibility in the context of
arms control treaties is unclear. Certain obligations, such as those for the
protection of human rights and prohibitions on reprisals, are not affected by
countermeasures. Disarmament obligations do not fall into these categories, but
arguments can be made based on provisions in relevant treaties. It is important
to note that while countermeasures may be lawful, their imposition can be
politically difficult without independent confirmation of non-compliance and
adherence to relevant treaty provisions.
5. Unilateral withdrawal or termination of a treaty can be a lawful enforcement
measure in response to another party's wrongful act. Many multilateral treaties
Page 10
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Page 11
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
The collaborative efforts of the multinational coalition yielded significant results. The
number of successful pirate attacks and hijackings off the coast of Somalia dramatically
decreased over time. This success can be attributed to the joint efforts, shared resources,
and coordinated actions of the participating countries.
Lessons learned from this collaborative effort include the importance of:
1. Multilateral cooperation: Effective collaboration requires the participation of multiple
countries, each bringing their unique capabilities and resources to the table.
2. Information sharing and coordination: Timely and accurate sharing of intelligence is
crucial for tracking pirate activities and enabling coordinated responses.
3. Regional engagement: Involving regional partners and building their capacity is essential
for long-term sustainability and addressing the root causes of piracy.
4. Flexibility and adaptability: The collaborative effort demonstrated the need for flexibility in
adapting strategies and tactics based on evolving pirate tactics and the changing
security landscape.
The successful collaboration in confronting piracy off the coast of Somalia serves as a
valuable example of how international cooperation and joint efforts can effectively address
global security challenges. It highlights the importance of collective action and shared
responsibility in maintaining maritime security and safeguarding international trade routes.
Page 12
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
effective strategies and measures to prevent and address similar threats in the future.
Some key lessons learned from past security challenges include:
1. Importance of Intelligence and Information Sharing: Effective intelligence gathering
and sharing are essential for detecting and preventing security threats. Collaborative
efforts among intelligence agencies and international partners can enhance
situational awareness and enable timely response.
2. Need for Multilateral Cooperation: Addressing complex security challenges often
requires cooperation and coordination among multiple countries and international
organizations. Multilateral initiatives and partnerships can pool resources, expertise,
and capabilities to tackle common security threats more effectively.
3. Adaptability and Flexibility: Security challenges evolve over time, necessitating the
ability to adapt and respond to changing circumstances. Flexible strategies and
policies that can be adjusted based on emerging threats are crucial for maintaining
effective security measures.
4. Importance of Comprehensive Approaches: Addressing security challenges requires
a comprehensive approach that encompasses diplomatic, economic, legal, and
military components. Combining various tools and measures, such as diplomacy,
development assistance, law enforcement, and military operations, can yield more
sustainable and long-term solutions.
5. Focus on Addressing Root Causes: Addressing the underlying root causes of
security challenges is crucial for sustainable peace and stability. Efforts to address
socio-economic disparities, political instability, governance issues, and other
underlying factors can help prevent the emergence of security threats.
6. Public-Private Partnerships: Collaboration between the public and private sectors is
essential for addressing security challenges effectively. Private sector involvement,
particularly in areas such as cybersecurity and critical infrastructure protection, can
enhance resilience and response capabilities.
7. Continuous Evaluation and Learning: Regular evaluation, assessment, and learning
from past security challenges are vital for refining strategies and improving future
responses. Periodic reviews and lessons learned exercises can identify areas for
improvement and inform policy adjustments.
By incorporating these lessons learned into security policies and practices, decision-
makers can enhance their ability to prevent, mitigate, and respond to security challenges
effectively.
Page 13
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Page 14
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
intelligence. Big data analytics, artificial intelligence (AI), and machine learning
algorithms enhance the efficiency and accuracy of intelligence analysis, enabling
security agencies to identify patterns, detect anomalies, and anticipate emerging
threats.
3. Cybersecurity: With the increasing digitization of critical infrastructure and
communication networks, cybersecurity has become a paramount concern for
global security. Technology solutions such as firewalls, encryption, intrusion
detection systems, and security protocols help defend against cyber threats,
including hacking, malware, and data breaches.
4. Biometric Identification: Biometric technologies, including fingerprint recognition,
facial recognition, and iris scanning, enhance identity verification and
authentication processes in border control, law enforcement, and access control
applications. Biometric databases enable authorities to accurately identify
individuals of interest and track their movements across borders.
5. Remote Sensing and Disaster Management: Remote sensing technologies, such
as satellites and aerial imaging, provide valuable data for assessing and
responding to natural disasters, environmental threats, and humanitarian crises.
Remote sensing capabilities enable authorities to monitor disaster-affected
areas, assess damage, and coordinate rescue and relief operations more
effectively.
6. Communication and Coordination: Technology facilitates seamless
communication and coordination among security agencies, emergency
responders, and international partners during security incidents and crisis
situations. Secure communication networks, interoperable systems, and
collaboration platforms enable real-time information sharing and coordinated
response efforts across borders.
7. Counterterrorism and Law Enforcement: Technology aids in counterterrorism and
law enforcement efforts through the development of tools and systems for
surveillance, data analysis, and forensic investigation. Automated facial
recognition, predictive analytics, and social media monitoring help identify and
track individuals involved in terrorist activities and criminal behavior.
8. Defense and Military Applications: Advanced military technologies, including
drones, unmanned aerial vehicles (UAVs), missile defense systems, and cyber
weapons, enhance national defense capabilities and deterrence strategies.
Technological innovation in defense systems enables militaries to maintain
strategic superiority and respond effectively to evolving security threats.
SUMMARY
In summary, the report emphasizes the importance of global cooperation and
collaboration to address transnational threats and ensure public safety and security. It discusses
the role of international organizations, such as the United Nations and Interpol, in countering
these threats through collaboration, intelligence sharing, and capacity building. Treaties and
agreements are highlighted as essential tools for enhancing global security by promoting
cooperation and establishing binding obligations.
The need for proactive measures to address emerging trends in transnational threats,
including enhancing cybersecurity, promoting information sharing, and leveraging new
technologies were also highlighted. It emphasizes the importance of comprehensive
approaches that involve multilateral collaboration, improved civil-military relations, and
innovative strategies. Learning from past security challenges and strengthening data collection
and monitoring are also identified as important factors.
Overall, the significance of coordinated efforts, international cooperation, and the
implementation of best practices in ensuring global public safety and security were identified. By
Page 15
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
adopting the recommendations and lessons learned, the global community can strengthen
security cooperation, adapt to emerging threats, and effectively address transnational
challenges.
CONCLUSION
To sum up, global public safety and security require a collective effort to address threats
that extend beyond national borders. The interconnected nature of our world necessitates
coordinated efforts and international cooperation to effectively mitigate these risks. Failing to
address these threats can have severe consequences, including vulnerability, economic losses,
and humanitarian crises.
Collaborative efforts in global security, such as joint intelligence sharing, diplomatic
negotiations, capacity-building initiatives, and the development of international legal
frameworks, play a crucial role in addressing these challenges. While collaboration may present
challenges, overcoming these obstacles presents opportunities to strengthen the global security
architecture and build resilience against emerging threats. Thus, fostering collaboration and
cooperation in addressing transnational threats is essential for promoting global safety and
security in an interconnected world.
REFERENCES:
Baker, R.E., Mahmud, A.S., Miller, I.F. et al. Infectious disease in an era of global change. Nat
Rev Microbiol 20, 193–205 (2022). https://doi.org/10.1038/s41579-021-00639-z
Brown, K. E. (2022, March 28). Transnational Terrorism. E-International Relations.
https://www.e-ir.info/2022/03/28/transnational-terrorism-2/
Calléja, Lucie (2021). Transnational terrorism: a threat to global security. Janus.net, e-journal of
international relations. Vol12, Nº. 1, May-October 2021. Consulted [online] at date of last visit,
https://doi.org/10.26619/1647-7251.12.1.1
Cambone, Stephen A. (1998). A New Structure for National Security Policy Planning.
Washington, D.C.: CSIS, Significant Issues Series, XX:3.
Chavda, J. (2024, April 14). Key facts about recent trends in global migration. Pew Research
Center. https://www.pewresearch.org/short-reads/2022/12/16/key-facts-about-recent-trends-in-
global-migration/
Council on Foreign Relations. (2023, July 1). Six Essential International Organizations You
Need to Know. CFR Education. https://education.cfr.org/learn/reading/six-essential-
international-organizations-you-need-know
Council on Foreign Relations. (2016, June 29). John Brennan on Transnational Threats to
Global Security. https://www.cfr.org/event/john-brennan-transnational-threats-global-security
Dorn, W. & Scott, D. S. (2024). Compliance Mechanisms for Disarmament Treaties.
https://walterdorn.net/27-compliance-mechanisms-for-disarmament-treaties
Dunworth, T. (2019) Compliance and enforcement in WMD-related treaties. WMD Compliance
& Enforcement Series No. 1. United Nations Institute for Disarmament Research.
Felbab-Brown, V. (2009, October 1). Transnational Drug Enterprises: Threats to Global Stability
and U.S. National Security. Brookings. https://www.brookings.edu/articles/transnational-drug-
enterprises-threats-to-global-stability-and-u-s-national-security/
Hoffman, Bruce (2002). Inside Terrorism Revised and Expanded Edition. New York: Columbia
University Press.
Page 16
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Page 17
of 18 Topic:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
Telefax No.: (074) 442-3071 Website: www.ubaguio.edu E-mail Address: ub@ubaguio.edu
Wilson, J. (2020, September 8). Chapter 13 Transnational Crime. Human Security in World
Affairs: Problems and Opportunities (2nd Edition). Pressbooks.
https://opentextbc.ca/humansecurity/chapter/transnational-crime/
Page 18
of 18 Topic: