scispace - formally typeset
Search or ask a question

Showing papers on "National security published in 2020"


Journal ArticleDOI
14 Aug 2020-Science
TL;DR: Before coronavirus disease 2019 (COVID-19) struck, cooperation on global health—especially for pandemic preparedness and response—would enhance national security, support economic wealth, protect human rights, and facilitate humanitarian assistance around the world.
Abstract: Before coronavirus disease 2019 (COVID-19) struck, cooperation on global health—especially for pandemic preparedness and response—would, we told ourselves, enhance national security, support economic wealth, protect human rights, and facilitate humanitarian assistance around the world. However, the politics of the coronavirus catastrophe do not reflect such national interests or international solidarity. “Vaccine nationalism” is more evidence that efforts to elevate health cooperation—and the sciences that inform it—have produced more rhetoric than political roots within countries and the international community. Concerns about vaccine nationalism were escalating even before the United States announced on 31 July its largest deal to date with pharmaceutical companies to secure COVID-19 vaccines. Other countries—including China, India, the United Kingdom, and members of the European Union—are pursuing similar strategies. To critics, this scramble to secure vaccine supplies is one of many decisions by governments that have failed to control spread of the virus, destroyed economic activity, and damaged international cooperation. Ineffective nationalistic policies appear to create a gap between science and politics that makes the pandemic worse and undermines what science and health diplomacy could achieve. In fact, vaccine nationalism reflects “business as usual” in global health. Historically, health diplomacy has struggled with global, equitable access to drugs and vaccines during serious disease events. Countries did not achieve this goal, for example, during the 2009 H1N1 influenza pandemic. International access typically happened only after developed countries secured pharmaceuticals for use at home, as happened with vaccines for smallpox and polio and drugs for HIV/AIDS. Developing countries, such as China and India, tried to break out of this pattern by building their own pharmaceutical innovation and production capabilities. More recently, developing countries have asserted sovereignty over pathogenic samples. This approach conditions access to samples on the source country receiving benefits from research and development, including drugs and vaccines. This “viral sovereignty” strategy produced the virus-and-benefit sharing regime in the World Health Organization's Pandemic Influenza Preparedness Framework in 2011. With COVID-19, history is repeating itself. Countries with the resources to obtain vaccines have not subordinated their needs and capacities to the objective of global, equitable access. And the worldwide spread of the coronavirus eliminates leverage that viral sovereignty might have provided countries without such means. International and nongovernmental organizations launched an ad hoc effort—the COVID-19 Vaccines Global Access (COVAX) Facility—to achieve equitable access. But with no serious participation by major states so far, COVAX lacks game-changing support. In keeping with the longstanding pattern of political behavior during pandemics, vaccines will eventually reach most populations, but only after powerful countries have protected themselves. Further, changes in domestic and global politics have made matters worse. Domestically, the extent to which governments have ignored science, denigrated health experts, supported quack remedies and policies, peddled disinformation, and botched social distancing and other nonpharmaceutical interventions has been astonishing. This travesty flows from the traction that populist, nationalist, antiglobalist, and authoritarian attitudes have gained around the world. Globally, balance-of-power politics has returned to world affairs. Geopolitical calculations have shaped national responses to COVID-19, with the United States and China treating the pandemic as another front in their rivalry for power and influence. National access to coronavirus vaccines has become a priority in power politics, especially as a means to recover from the economic damage at home, in export markets, and within regions of strategic importance in the balance of power. These changes in politics have generated ferocious headwinds against global, equitable vaccine access—an objective only approached with great difficulty when political waters were less turbulent. Reorienting health policy and diplomacy will require root-and-branch reconstruction of political interests on infectious diseases. Perhaps the mounting desperation for scientists to deliver a vaccine against COVID-19 will provide an incentive for leaders to rebuild health policies sufficiently so that, when the next pandemic hits, politicians and citizens will be less likely to drink the hydroxychloroquine.

54 citations


Posted Content
TL;DR: The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics, and the fundamental research challenges are addressed.
Abstract: The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust: Under the current "open internet" regulation, the telco cloud can be used for trust services only equally for all users. 6G network must support embedded trust for increased level of information security in 6G. Trust modeling, trust policies and trust mechanisms need to be defined. 6G interlinks physical and digital worlds making safety dependent on information security. Therefore, we need trustworthy 6G. Security: In 6G era, the dependence of the economy and societies on IT and the networks will deepen. The role of IT and the networks in national security keeps rising - a continuation of what we see in 5G. The development towards cloud and edge native infrastructures is expected to continue in 6G networks, and we need holistic 6G network security architecture planning. Security automation opens new questions: machine learning can be used to make safer systems, but also more dangerous attacks. Physical layer security techniques can also represent efficient solutions for securing less investigated network segments as first line of defense. Privacy: There is currently no way to unambiguously determine when linked, deidentified datasets cross the threshold to become personally identifiable. Courts in different parts of the world are making decisions about whether privacy is being infringed, while companies are seeking new ways to exploit private data to create new business revenues. As solution alternatives, we may consider blockchain, distributed ledger technologies and differential privacy approaches.

52 citations


BookDOI
10 Sep 2020
TL;DR: In this paper, a conceptual framework for analysis of energy technologies (standard and alternative) in terms of their respective dollar costs, environmental costs, and national security costs is presented. And the authors examine the issues and problems associated with implementation of U.S. energy policies in the context of major social goals, with treatment of conflicts and trade-offs between energy development and other social values (such as health and safety, cultural, historical, and aesthetic values).
Abstract: Presented in nontechnical terms, this book offers a unique and powerful conceptual framework for analysis of energy technologies (standard and alternative) in terms of their respective dollar costs, environmental costs, and national security costs. This three-point framework allows examination of issues and problems associated with implementation of U.S. energy policies in the context of major social goals (such as growth and equity), with treatment of conflicts and trade-offs between energy development and other social values (such as health and safety, cultural, historical, and aesthetic values). These are the key political issues for policy makers formulating national energy policy and decisions makers implementing it.

49 citations


Journal ArticleDOI
TL;DR: The need and opportunities for strengthened federal nutrition research are clear, with specific identified options to help create the new leadership, strategic planning, coordination, and investment the nation requires to address the multiple nutrition-related challenges and grasp the opportunities before us.

45 citations


Journal ArticleDOI
TL;DR: This paper contributes to the understanding of how IT mitigates value-based tradeoffs in public organisations to achieve public value by identifying three mitigation strategies facilitated via IT-enabled organisational capabilities – bias, tunnelling and hybridisation.
Abstract: Governments today are striving to improve services in the public sector through digital transformation programs but face tremendous pressures from multiple fronts (economy, national security, healt...

42 citations



Book ChapterDOI
TL;DR: The role of states in the regulation of immigration and immigrants, especially in times of national crisis, deserves most serious attention as mentioned in this paper, where the authors analyze the nation's response to the horrific loss of life of September 11 and show how the centralization of immigration power in the hands of the federal government may exacerbate the civil rights impacts of the enforcement of the immigration laws.
Abstract: This article is part of a symposium on "Migration Regulation Goes Local: The Role of States in U.S. Immigration Policy." Although only time will tell, September 11, 2001 promises to be a watershed in the history of the United States. Not long after the tragedy, supporters and critics alike saw the federal government as "pushing the envelope" in restricting civil liberties in the name of national security. This article analyzes the nation's response to the horrific loss of life of September 11 and shows how the centralization of immigration power in the hands of the federal government, may exacerbate the civil rights impacts of the enforcement of the immigration laws. The federal government has acted more swiftly and uniformly than the states ever could, with severe consequences for the Arab and Muslim community in the United States. That the reaction was federal in nature - and thus national in scope as well as uniform in design and impact, and with precious few legal constraints - worsened the civil rights impacts. The civil rights deprivations resulting from federal action reveals that national regulation of immigration is a double-edged sword. Although federal law pre-empts state laws designed to regulate immigration or discriminate against aliens, it can also, with few legal constraints, strike out at immigrants across the nation if it sees fit. That in turn suggests that the role of states, as well as the federal government, in the regulation of immigration and immigrants, especially in times of national crisis, deserves most serious attention. The federal government's response to September 11 also demonstrates the close relationship between immigration law and civil rights in the United States. Noncitizens historically have been the most vulnerable to civil rights deprivations, in large part because the law permits, perhaps even encourages, extreme governmental conduct with minimal protections for the rights of noncitizens. Unfortunately, the current backlash against Arabs and Muslims in the United States fits comfortably into a long nativist history. In sum, a complex matrix of "otherness" based on race, national origin, religion, and political ideology contributes to the current attacks on the civil rights of Arabs and Muslims in the United States. As has occurred in the past, the ripple effects of national security measures in the end may adversely affect the legal rights of all noncitizens, not just Arabs and Muslims. Indeed, as we contend in this article, the civil rights deprivations resulting from the war on terrorism may have long term adverse impacts on the civil rights of citizens as well as noncitizens in the United States. To help us better understand the latest "war on terrorism," Part I of the Article analyzes the general demonization of Arabs and Muslims generally in the United States and how the law has been influenced by, and reinforced, the negative stereotypes. This section reviews the federal government's actions directed at Arabs and Muslims in the name of combating terrorism well before September 11. As Professor Edward Said has observed, terrorism in these times "has displaced Communism as public enemy number one." That has translated into a near exclusive focus on "foreign terrorists," particularly Arabs and Muslims. Part II studies the federal government's zealous investigatory methods after September 11 directed at Muslim and Arab noncitizens, with disregard for their civil rights, and the possible long term impacts of that response.

40 citations


Journal ArticleDOI
TL;DR: In this article, the authors argue that a rising China might challenge the power and security of a relatively declining United States, and they argue that China is apt to adopt an inc...
Abstract: When and why might a rising China challenge the power and security of a relatively declining United States? Conventional wisdom argues that China – like other rising states – is apt to adopt an inc...

38 citations


Journal ArticleDOI
TL;DR: Geopolitical competition increasingly takes place not on the battlefield but in a tightly networked global economy as mentioned in this paper, where distinctions between economic and national security collapse, and governments are increasingly divided into two groups.
Abstract: Geopolitical competition increasingly takes place not on the battlefield but in a tightly networked global economy. As distinctions between economic and national security collapse, governments are ...

37 citations


BookDOI
14 Jan 2020
TL;DR: In this article, the authors focused on those specific aspects of national security that relate to the protection of critical infrastructure, sectors and processes that are important for the sustainable functioning of [Dutch] society.
Abstract: The analysis of this report is focused on those specific aspects of national security that relate to the protection of critical infrastructure, sectors and processes that are important for the sustainable functioning of [Dutch] society. Critical infrastructure, sectors and processes are focal areas when it comes to national security policy, in the Netherlands and beyond. This report addresses five research questions:How can national security be defined and what does the international literature suggest about its main components?What can be learned from the (academic) literature about the relation between the economy of a country and the various aspects of national security? Which factors, mechanisms and underlying causal mechanisms can be identified?What is the impact of contextual, country-specific characteristics and factors on this relationship?What do the answers to research questions 2) and 3) tell us about the factors and characteristics that have an impact on the interlinkages between the Dutch economy and its national security?How does the Netherlands perform with regard to these economic factors, which trends or developments can we identify, and what do they mean for the national security of the Netherlands?

31 citations


Journal ArticleDOI
TL;DR: It is concluded that on the proportionality of contact tracing in the EU it is difficult to reconcile public health measures and individual rights, but guidance can be taken from understandings of proportionality in the context of security, particularly in the current COVID-19 emergency.
Abstract: When disease becomes a threat to security, the balance between the need to fight the disease and obligation to protect the rights of individuals often changes. The COVID-19 crisis shows that the need for surveillance poses challenges to the right of privacy. We focus on the European Union (EU), which has a strong data protection regime yet requires its member states to exchange personal data gathered through contact tracing. While public authorities may limit the right to privacy in case of public health threats, the EU provides little guidance when such limitations are proportionate. To define standards, we analyze existing EU case law regarding national security measures. We conclude that on the proportionality of contact tracing in the EU it is difficult to reconcile public health measures and individual rights, but guidance can be taken from understandings of proportionality in the context of security, particularly in the current COVID-19 emergency.

Journal ArticleDOI
TL;DR: Since the election of Donald Trump, MS-13, the Salvadoran street gang, has become a national security and foreign policy concern for his administration as discussed by the authors, due to the violence of street gangs like MS-...
Abstract: Since the election of Donald Trump, MS-13, the Salvadoran street gang, has become a national security and foreign policy concern for his administration. Due to the violence of street gangs like MS-...

Journal ArticleDOI
TL;DR: In this paper, the key factors explaining states' efforts to enhance their cyber capacity are discussed, and the authors suggest that a country's science and technical knowledge is the most robust explanation for states' cyber capacity levels.
Abstract: Connectivity infrastructure is constantly expanding, increasing internet access across countries, regions and socio-political contexts. Given the fast changing geography of the internet, there is a growing demand to strengthen cyber capacity beyond national frameworks, in order to develop a transnationally coherent and coordinated governance approach to cybersecurity. In this context, cyber capacity building initiatives are increasingly central in international debates, with the ambition to support countries in the global south in fostering their cybersecurity strategy from technical and policy perspectives. This article discusses the key factors explaining states’ efforts to enhance their cyber capacity. Based on a cross-national quantitative research approach, the findings contradict IR derived approaches to cybersecurity, which assume that countries develop their cyber capacity according to external security threats, domestic politics, or norms. In line with existing research on the role that science play in policymaking processes more broadly, our results suggest instead that a country’s science and technical knowledge is the most robust explanation for states’ cyber capacity levels. These findings emphasise the need for policymakers to support countries in the global south in developing their cyber capacity beyond national security paradigms by further strengthen education and technical skills in contexts lacking in this resource.

Journal ArticleDOI
TL;DR: Reznik, O., Olga Getmanets, Andrii Kovalchuk, A., Nastyuk, V., Andriichenko, N. as discussed by the authors, 2019.
Abstract: Financial security of the state / Oleg Reznik, Olga Getmanets, Andrii Kovalchuk and ot. // Journal of Security and Sustainability Issues. – 2020. – Vol. 9, № 3. – P. 843-852. – DOI: https://doi.org/10.9770/jssi.2020.9.3(10). Reznik, O., Olga Getmanets, O., Kovalchuk, A., Nastyuk, V., Andriichenko, N. 2020. Financial security of the state. Journal of Security and Sustainability Issues, 9(3), 843-852. https://doi.org/10.9770/jssi.2020.9.3(10)

Journal ArticleDOI
TL;DR: A critical and context‐based approach to understanding globalization and localization is offered by challenging the conceptualization of ‘value’ and ‘risk’ within the current global production networks framework as well as identifying key operational strategies in risk management and national security.
Abstract: The COVID-19 pandemic represents a major disturbance that has rippled across the world's population, states, economy, and central nervous system or global production networks transforming the traditional roles of states, firms, individuals/consumers, and geographies of production This paper offers a critical and context-based approach to understanding globalization and localization by challenging the conceptualization of 'value' and 'risk' within the current global production networks framework as well as identifying key operational strategies in risk management and national security An analysis of the adaptation strategies of the GPNs of 91 companies identifies the role played by four different forms of value in configuring production networks This is to balance 'economic value' with non-price-based sources of value and alternative values The analysis underscores the critical role of the state in ensuring national and human security as well as its increasing power as a key actor in GPNs and the global economy

Journal ArticleDOI
TL;DR: The authors adapted the literature on strategic hedging and adapted it to China's use of economic diplomacy in the service of comprehensive national security goals within the regionalised foreign policy apoach.
Abstract: Drawing on the literature on strategic hedging and adapting it to China’s use of economic diplomacy in the service of comprehensive national security goals within the regionalised foreign policy ap...

Journal ArticleDOI
TL;DR: In this paper, the authors analyzed the implications of the evolving investment screening landscape for the energy sector based on the comparative appraisal of regulatory and administrative developments primarily in the United States and the European Union.

Journal ArticleDOI
Frank L. Smith1
TL;DR: Rational and performative perspectives on technology hype as either a kind of exaggeration or expectant discourse are examined, and a middle-range theory about technology hype provides useful insight into security practice.
Abstract: Technology hype is an important concept in business, marketing, and science and technology studies, but it is rarely related to security studies. What is technology hype? How does it relate to nati...

Journal ArticleDOI
TL;DR: Humanitarian justifications provide a helpful substitute when US in... as mentioned in this paper The best way to mobilize public support for military action is through the lens of national security, and humanitarians have been shown to be a useful substitute for national security.
Abstract: Conventional wisdom assumes the best way to mobilize public support for military action is through the lens of national security. Humanitarian justifications provide a helpful substitute when US in...

Journal ArticleDOI
TL;DR: Focusing primarily on illegal, unreported and unregulated (IUU) fishing, this paper seeks to highlight the centrality of human security issues to national security by providing evidence of the cyclical relationship between the two.
Abstract: Analyzes of [maritime] security issues have long focused on threats to the nation-state, thereby promulgating traditional state-centric security policies and practices. The preceding claim is valid...

Book
12 Nov 2020
TL;DR: This book tests the theory that states use intervention into cross-border mergers and acquisitions as a tool of statecraft to internally balance the economic and military power of other states through non-military means using quantitative and qualitative analysis of transactions in the United States, Russia, China, and fifteen European Union states.
Abstract: Why do states block some foreign direct investment on national security grounds even when it originates from within their own security community? Government intervention into foreign takeovers of domestic companies is on the rise, and many observers find it surprising that states engage in such behaviour not only against their strategic and military competitors, but also against their closest allies. Ashley Lenihan argues that such puzzling behaviour can be explained by recognizing that states use intervention into cross-border mergers and acquisitions as a tool of statecraft to internally balance the economic and military power of other states through non-military means. This book tests this theory using quantitative and qualitative analysis of transactions in the United States, Russia, China, and fifteen European Union states. It deepens our understanding of why states intervene in foreign takeovers, the relationship between interdependence and conflict, the limits of globalization, and how states are balancing power in new ways. This title is also available as Open Access.

Journal ArticleDOI
TL;DR: How the use of the THz spectrum could both introduce and negate security and privacy risks is described and a set of technical and policy measures to mitigate such risks are presented.
Abstract: The THz spectrum, ranging from 95 GHz to 10 THz, can enable multiple benefits and applications for wireless communications, passive, spectroscopy, and imaging system. Although there are multiple technical and economic challenges associated with THz deployment, the rarely discussed challenge of security and privacy-related risks needs attention from researchers, manufacturers, and even policymakers. THz spectrum could represent either a boon or a bane (or both) for security, privacy, and even national security. These include concerns over an array of increased risks, such as failure of devices, failure of the system, unauthorized or covert access, compromise of data, data integrity, impact on other services (apps), impact on critical infrastructure, securing dense deployment, and exposure of sensitive information. In this paper, we describe how the use of the THz spectrum could both introduce and negate security and privacy risks. We then present a set of technical and policy measures to mitigate such risks. We note that standards bodies and possibly government interventions will have a role in mitigating security, privacy and even national security risks.

BookDOI
07 Apr 2020
TL;DR: In this paper, an approach to game design grounded in logics of inquiry from the social sciences is proposed, with a focus on game design for games with non-player characters.
Abstract: Proposes an approach to game design grounded in logics of inquiry from the social sciences.

Journal ArticleDOI
TL;DR: In this paper, the authors argue that the underlying rationale for such flagrant abuse of power stems from the dearth of a rights-based approach to police-public relations, indifference of political actors, and a grossly inadequate public health and social care infrastructures for undervalued and powerless groups.

Journal ArticleDOI
01 Sep 2020
TL;DR: This article argued that the United States has been able to exploit the international market dominance of US-based internet companies in order to internationalise state power through surveillance programs conducted by national security and law enforcement agencies.
Abstract: This article argues that the United States (US) has been able to exploit the international market dominance of US-based internet companies in order to internationalise state power through surveillance programmes conducted by national security and law enforcement agencies. The article also examines the emerging threat to the US from China, which is attempting to establish 'geo-economic space' for its own internet and technology companies. As Chinese companies become more competitive, they threaten both the commercial dominance of US companies as well as the geopolitical power of the US state. Furthermore, the US has concerns that the entrance of Chinese companies into its own market, specifically Huawei, could make it susceptible to the 'internationalised' power of China - such as Chinese state surveillance. In response, the US has sought to shrink the 'geo-economic space' available to Huawei by using its firms, such as Google, to disrupt Huawei's supply chains.

Dissertation
01 Jan 2020
TL;DR: In this paper, the authors explored the content and transformational shifts towards new management technologies that shape the risk management model and showed that a shift occurred in security contents by expanding and deepening the field and that a change in management technology involving risk management has been announced, but no fundamental change to the overall concept has occurred that would deviate significantly from the classic national security model.
Abstract: Security is one of the most complex areas of action for contemporary states. In different contextual conditions, states take different approaches to security policymaking and security management. With the end of the Cold War, the concept of security has been reconceptualized and a new paradigm established, which expands the concept of security beyond military-political responses since threats such as climate changes, migrations, epidemics of communicable diseases, terrorism, organized crime and drug trade, natural and technological disasters and accidents require different policies and response systems. In contemporary conditions, there is more uncertainty and unpredictability, thus contributing to security management difficulties. Management models are no longer organized solely on the capacities of the state and the national security system. Platforms of a partnership between the state, society, and individuals are being developed, whose purpose is to conduct preventive activities and give rise to societal resilience. Research on national security policies has been increasingly focused on identifying changes in the understanding of security in security policies and on the analysis of new security management models with a purpose of identifying transformational elements that would accompany changes in the security environment and the needs of the state, society, and individuals in the field of security. Taking into account environmental changes, new threats and risks, as well as the needs of the society, the Republic of Croatia drafted a new National Security Strategy, which the Croatian Parliament adopted in 2017. This study seeks to determine whether any changes occurred regarding the concept of security in comparison with the 2002 National Security Strategy, as well as the type of changes that may be expected in security management and practice. The study utilizes four levels of analysis, exploring the content and transformational shifts towards new management technologies that shape the risk management model. The research shows that a shift occurred in security contents by expanding and deepening the field and that a change in management technology involving risk management has been announced, but no fundamental change to the overall concept has occurred that would deviate significantly from the classic national security model. Those changes are a good foundation for further development of a system based on the realization that there are vulnerabilities in the society from the risks of an uncertain and unpredictable future, and that it is necessary to constantly and preventively develop the resilience of both the society and the individuals to future unknown risks.

Journal ArticleDOI
TL;DR: In this article, the authors shed light on contemporary questions and concerns involving national security and international trade, particularly questions involving the appropriate invocation of Article XXI GATT, through careful attention to the article's historical context.
Abstract: Today, there are an unprecedented number of disputes at the World Trade Organization (“WTO”) involving national security. The dramatic rise in trade disputes involving national security has resuscitated debate over the degree of discretion afforded to WTO Members as to when and how to invoke Article XXI, the Security Exception, of the General Agreement on Tariffs and Trade (“GATT”), with binding effect. The goal of this article is to shed light on contemporary questions and concerns involving national security and international trade, particularly questions involving the appropriate invocation of Article XXI GATT, through careful attention to the article’s historical context. The article elucidates the diverse strategic and economic considerations that shaped the meaning of U.S. national security interests at the time when national delegations were drafting the post-war multilateral trade system, the ITO. It demonstrates how these interests, in turn, created the language, phrasing, and placement of the security exception within the ITO Charter, and details when and how this was adopted in the GATT. This article argues that analyzing internal U.S. practice into the making of Article XXI is relevant for current and future efforts to interpret the exception, thereby contributing to existing literature on Article XXI GATT. It provides the internal deliberations of U.S. officials who served as key architects of the multilateral trade system and of the ITO Charter’s security exception. Additionally, the article captures a fascinating story as to how different U.S. agencies competed to define U.S. foreign and economic policies at the time and shows how the compromises struck help to explain the making of article XXI GATT.

Journal ArticleDOI
TL;DR: In this article, the United States Fish and Wildlife Service (USFWS) provided assistance to 4142 projects across 106 countries worth over USD $301 million from 2002 to 2018.

Journal ArticleDOI
TL;DR: A review of the general literature on internal and external whistleblowing can be found in this article, where the authors review parts of the national security whistleblowing literature and context, and discuss the...
Abstract: This article (a) reviews parts of the general literature on internal and external whistleblowing, (b) reviews parts of the national security whistleblowing literature and context, (c) discusses the...

Journal ArticleDOI
TL;DR: Since the nineteenth century, access to and the development of natural resources became an important element of national and international politics and gave rise to international tensions as well as to technological innovation and new modes of transnational cooperation.
Abstract: Since the nineteenth century, access to and the development of natural resources became an important element of national and international politics. Resource security emerged as an issue vital to national security; and resource competition and crises gave rise to international tensions as well as to technological innovation and new modes of transnational cooperation.