Professional Documents
Culture Documents
ROLE OF INTERNET
Volume 39
Number 2
2018
I
Contacts
Designation Telephone (Office) E-mail
Chairman, Board of Governors 88-02-9347914 chairman@biiss.org
Director General 88-02-8312609 dgbiiss@biiss.org
Research Director-1 88-02-9331977 rd1@biiss.org
Research Director-2 88-02-8360198 shaheen@biiss.org
Research Director-3 88-02-9347984 mahfuz@biiss.org
VOLUME 39 NUMBER 2 APRIL 2018
Disclaimer
This is a double-blind peer reviewed journal. The views and opinions expressed in
this Journal are solely of the authors and do not reflect the official policy or position
of Bangladesh Institute of International and Strategic Studies (BIISS).
Editor
Mahfuz Kabir
Associate Editor
Shaheen Afroze
Assistant Editors
Mohammad Jasim Uddin
Mahbubur Rashid Bhuiyan
Shanjida Shahab Uddin
BIISS Journal (ISSN 1010-9536) is published quarterly by the Bangladesh Institute of
International and Strategic Studies (BIISS), Dhaka, in January, April, July and October.
The journal provides a forum for debate and discussion on international affairs, security
and development issues in national, regional and global perspectives.
Original contributions (along with an abstract of 200-300 words) not published
elsewhere may be submitted to the Chief Editor (Director General, BIISS)/Editor in
duplicate, typed double-spaced, normally within about 6000 words. Footnotes should
be placed at the bottom of the page following the styles given below:
Tk. 250.00 US$ 20.00
Tk. 1000.00 US$ 80.00
GraphNet Limited
95, Naya Paltan, 1st Floor, Dhaka-1000, Bangladesh
Phone : 9354142, 9354133, e-mail: graphnet@gmail.com
mannangnl@gmail.com, website: www.graphnet.com
VOLUME 39 NUMBER 2 APRIL 2018
Moutusi Islam
Lam-ya Mostaque
Abstract
1. Introduction
In the 21st century, the increased global population and the fast dwindling
of earth’s land-based resources have renewed interest in ocean’s economic potential.
However, with the growing need and increased capacity to industrialize the oceans,
there is a concern that oceanic resources will soon deplete if not handled properly.
Thus, a need to reinterpret how oceans can be measured, monitored and managed
more effectively has emerged. Against this reality, the concept of Blue Economy was
introduced to respond to the new economic demands, ecological needs and the
dynamics of global climate change.1 Contrary to previous practices which focused
on resource extraction and financial benefits, Blue Economy tries to strike a balance
Moutusi Islam is Research Officer at Bangladesh Institute of International and Strategic Studies (BIISS). Her
e-mail address is: moutusi.ir63@gmail.com; Lam-ya Mostaque is Research Officer at Bangladesh Institute of
International and Strategic Studies (BIISS). Her e-mail address is: lamya.mostaque@gmail.com
1
Mark J. Spalding, “The New Blue Economy: the Future of Sustainability”, Journal of Ocean and Coastal
Economics, Vol. 2, Issue 2, February 2016, pp. 1-21.
135
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Since its introduction after the United Nations (UN) Conference on Sustainable
Development or Rio+20 in 2012, Blue Economy is rapidly emerging as development
paradigm that provides solution to the limits of growth.3 Blue Economy is a broad
concept that encompasses wide variety of issues relating to ocean and coastal
economy. Study of numerous documents shows that there are over 25 sectors that
have been listed under the Blue Economy. Scholars from a variety of background
including natural science, economy, law, engineering and international relations,
etc., have dwelled on the issue, resulting significant variation in how the concept is
perceived. However, at its core, Blue Economy is based on principles of equity, well-
being, low carbon development, resources efficiency and social inclusion.
Countries all over the world are increasingly recognizing the importance of
the Blue Economy. Some of the world’s fastest growing economies such as China,
India, Australia and South Africa are already actively pursuing Blue Economy, while
supra-national authorities like European Union (EU) also has their own Blue Economy
strategy. It is not only the major actors; small countries are embracing the concept
wholeheartedly as well. The Small Island Developing States (SIDS) have been
pioneering number of innovative Blue Economy initiatives. Besides, global governing
bodies, e.g., the World Bank and the UN are promoting Blue Economy through
financial and policy support.
2
Gunter A. Pauli, The Blue Economy 10 Years, 100 Innovations, 100 Million Jobs, New Mexico: Paradigm
Publications, 2010, p. xxix.
3
Vishva Nath Attri and Narnia Bohler-Muller (eds.), The Blue Economy Handbook of the Indian Ocean Region,
Pretoria: Africa Institute of South Africa, 2018, p. 1.
4
Md Shahidul Hasan, “Maritime Verdicts and Resource Exploration for Bangladesh”, BIISS Journal, Vol. 35,
No. 3, July 2014, p. 227.
136
BLUE ECONOMY AND BANGLADESH
unlimited.”5 Experts believe that if Bangladesh utilizes her marine resources actively,
it is quite possible for her to be a middle-income country within short time.6 With
a view to achieving Blue Economy objectives, the GoB is hosting and joining high
level international dialogues. In fact, Bangladesh has been very proactive among
the Bay of Bengal littorals to develop Blue Economy. As Vijay Sakhuja observes,
“Bangladesh merits a leadership role for the development of Blue Economy in the Bay
of Bengal.”7 However, Bangladesh is still in the early stages of embracing the concept
and confronts a number of technological and financial constraints to realize the Blue
Economy aspirations. So, for Bangladesh, there is scope of learning from the practices
of other countries in developing its Blue Economy.
Against this backdrop, the paper seeks to understand, what are the major Blue
Economy initiatives around the world and what lessons can be learnt by Bangladesh
from those experiences? In order to answer the questions, the paper reviews existing
literatures on Blue Economy that include books, journal articles, government and
non-government policy papers and documents, newspaper and internet-based
articles, etc. Data and information used in the paper are based on secondary sources.
In addition, data and ideas have been collected through expert interviews.
The paper is divided into six sections including the introduction. The second
section provides a conceptual understanding of Blue Economy and its components.
The third section examines the state of Blue Economy in Bangladesh. The fourth
section evaluates major Blue Economy initiatives taken by different countries using
an analytical framework. The fifth section provides suggestions for Bangladesh based
on the Blue Economy experiences of other countries. The last section concludes the
paper with remarks.
Although the Blue Economy has entered the arena of regular international
debate and discourse for the past several years, no commonly accepted definition has
emerged so far.8 Diversity of views is noteworthy. Therefore, Blue Economy term can be
understood as buzzwords.9 In literature, Blue Economy has been used synonymously
to ‘marine economy’, ‘coastal economy’, ‘ocean economy’, ‘green economy’ and so
5
Sheikh Hasina, Prime Minister’s address at the International Workshop on Blue Economy in Dhaka,
Bangladesh, 31 August 2014.
6
Md. Monjur Hasan, B. M. Sajjad Hossain, Md. Jobaer Alam, K. M. Azam Chowdhury, Ahmad Al Karim,
Nuruddin Md. Khaled Chowdhury, “The Prospects of Blue Economy to Promote Bangladesh into a Middle-
Income Country”, Open Journal of Marine Science, Vol. 8, 2018, p. 355-369.
7
Vijay Sakhuja, “Harnessing the Blue Economy”, Indian Foreign Affairs Journal, Vol. 10, No. 1, 2015.
8
Federation of Indian Chambers of Commerce and Industry (FICCI), Blue Economy Vision 2025: Harnessing
Business Potential for India Inc and International Partners, New Delhi: Federation House, April 2017.
9
Young Rae Choi, “The Blue Economy as Governmentality and the Making of New Spatial Rationalities”,
Dialogues in Human Geography, Vol. 7, No. 1, 2017, pp. 37-41.
137
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
on. While the basic tenets and goals of these competing paradigms nearly similar,
there are basic differences in the approaches and treatment of various elements, e.g.,
resource management, growth objectives, sustainability and social equality.10
10
S.K. Mohanty, Priyadarshi Dash, Aastha Gupta and Pankhuri Gaur, Prospects of Blue Economy in the Indian
Ocean, New Delhi: Research and Information System for Developing Countries, 2015, p. 5.
11
United Nations Environment Programme (UNEP), Towards a Green Economy: Pathways to Sustainable
Development and Poverty Eradication, Nairobi: UNEP, 2011.
12
Jennifer J. Silver, Noella Gray, Lisa Campbell, Luke Fairbanks and Rebecca Gruby, “Blue Economy and
Competing Discourses in International Oceans Governance”, The Journal of Environment & Development,
Vol. 24, No. 2, 2015, pp. 135-160.
13
Gunter A. Pauli, op. cit.
14
Simon Smith-Godfrey, “Defining the Blue Economy”, Maritime Affairs, Vol. 12, No. 1, 2016, p. 2.
15
United Nations Conference on Trade and Development (UNCTAD), The Oceans Economy: Opportunities
and Challenges for Small Island Developing States, New York and Geneva: United Nations, 2014, p. 2.
16
The Commonwealth Secretariat, The Blue Economy and Small States, London: The Commonwealth
Secretariat, 2016.
17
“The Blue Economy: Growth, opportunity and a sustainable ocean economy”, The Economist Intelligence
Unit, 2015.
18
Oceans Policy Science Advisory Group (OPSAG), Marine Nation 2025: Marine Science to Support Australia’s
138
BLUE ECONOMY AND BANGLADESH
System for Developing Countries (RIS), a well-known think tank, defines the term as
follows:
139
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Source: Michelle Voyer et al., The Blue Economy in Australia, Canberra, Australia: Sea Power Centre, 2017, p. 20.
Blue Economy is a marine based economy that provides social and economic
benefits for current and future generations, by contributing to food security,
poverty eradication, livelihoods, income, employment, health, safety, equity, and
political stability. It restores, protects and maintains the diversity, productivity,
resilience, core functions, and intrinsic value of marine ecosystems — the natural
capital upon which its prosperity depends. It is based on clean technologies,
renewable energy and circular material flows to secure economic and social
stability over time, while keeping within the limits of one planet.24
22
United Nations Conference on Trade and Development (UNCTAD), op. cit., p. 2.
23
Meg R. Keen, Anne-Maree Schwarz and Lysa Wini-Simeon, “Towards Defining the Blue Economy: Practical
Lessons from Pacific Ocean Governance”, Marine Policy, Volume 88, 2018, p. 333-341.
24
World Wide Fund for Nature, Principles for a Sustainable Blue Economy, Gland: World Wide Fund for Nature,
2015.
140
BLUE ECONOMY AND BANGLADESH
25
P.G. Patil, J. Virdin, C.S. Colgan, M.G. Hussain, P. Failler, and T. Vegh, Toward a Blue Economy: A Pathway for
Bangladesh’s Sustainable Growth, Washington, D.C.: The World Bank Group, 2018.
26
General Economics Division (GED), Seventh Five Year Plan (FY2016 – 2020): Accelerating Growth, Empowering
Citizens, Dhaka, Bangladesh: Planning Commission, Government of the People’s Republic of Bangladesh,
2015.
27
P.G. Patil et al., op. cit., p. 27.
141
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
The Blue Economy is a vast topic that covers a wide range of industries and
activities. A review of the existing literature shows that the components of the Blue
Economy are very diverse in nature, ranging from the fisheries and aquaculture to oil
and gas mining and other sea related economic activities such as transportation and
Tourism. In addition to those, initiatives to protect of the ocean health have also been
included as components of Blue Economy. The next section provides a brief discussion
on various components of Blue Economy and current state of Bangladesh’s initiatives
regarding those. To make the discussion easier, the components of Blue Economy has
been categorized into four major groups based on the nature of the activity. These
groups are: Harvesting Living Resources, Extraction of Non-living Resources, Other
Economic Activities and Protection of the Sea. Components included in each group
are mentioned in Table 2.
The newly demarcated area of the Bay of Bengal has opened a new economic
frontier for Bangladesh. In order to utilize its unexplored marine resources, Bangladesh is
already taking initiatives to flourish its Blue Economy. Since 2015, the GoB has undertaken
a number of consultations and workshops on Blue Economy. Besides, Bangladesh’s
Seventh Five Year Plan has called for twelve actions to be undertaken for maintaining a
prosperous and sustainable Blue Economy, which include fisheries, renewable energy,
human resources, transshipment, tourism and climate change among others.28 In 2017,
the GoB has established the “Blue Economy Cell’ with the mandate to coordinate Blue
Economy initiatives across sectoral ministries. According to a World Bank report, the gross
value added to Bangladesh in 2014-15 from ocean economy was US$ 6,192.98 million
which was around 3.33 per cent of the Bangladesh economy.29 However, Blue Economy
has the prospect of contributing to Bangladesh’s economy on a much higher level. The
Ministry of Foreign Affairs (MoFA) has identified 26 potential Blue Economy sectors.30 This
paper focuses on components of Bangladesh’s Blue Economy like living and non-living
resources, economic activities and protection of the sea as mentioned in Table 2.
28
General Economics Division (GED), op. cit.
29
P.G. Patil et al., op. cit., p. 36.
30
“Blue Economy National Co-ordination Workshop”, Ministry of Foreign Affairs (MoFA), Bangladesh,
Official Website, 2018, available at https://mofa.gov.bd/site/press_release/bb5cd232-1529-46db-aa8c-
d0c8bc4c0e47, accessed on 10 January 2018.
31
Department of Fisheries Bangladesh, Yearbook of Fisheries Statistics of Bangladesh 2016-17, Dhaka:
Ministry of Fisheries and Livestock, 2017, p. Xiii.
142
BLUE ECONOMY AND BANGLADESH
catch comes from artisanal fisheries (out of 6.37 lakh Metric Ton (MT) of marine
fishery production in 2016-17, 5.29 lakh MT came from artisan fisheries).32 Compared
to inland and freshwater aquaculture, the amount of marine aquaculture is also
small and mostly based on tiger shrimp.33 Thus, Bangladesh can increase its fishery
production by industrializing its marine fisheries and exploring large pelagic fish
harvesting,long line fishing of tuna and tuna like fishes.34 Shellfish, seaweed and algae
are known to be great sources of protein, iodine and other vital minerals and there is
a huge demand for them in international market. The GoB is taking initiatives in this
regard. In 2016, it procured a modern survey vessel named Meen Sandhani,35 which
aims to do a stocktaking of available fishing sources in the Bay of Bengal.
Seabed mining and acquisition of minerals are highly valuable for economic
purposes. But currently, the data available for seabed minerals in Bangladesh are
outdated.37 In terms of sand and gravel, the coastal belt from Patenga to Teknaf has
been explored with the discovery of 17 deposits of potentially valuable minerals.38
These valuable minerals can contribute to various industries e.g., glass, paper, etc.
Bangladesh’s offshore energy exploration is still far away from reaching its optimal
level. According to the MoFA website, 19 exploratory wells were drilled in the Bay of
Bengal up until 2014 and it resulted in two gas discoveries, i.e., the Sangu and the
Kutubdia.39 Bangladesh is said to have great potential for ocean-based technology
such as wind, tidal and wave energy, but no feasibility study has been conducted on
the area so far.
32
Ibid., p. 14.
33
M. Gulam Hussain, Pierre Failler, A. Al Karim and M. Khurshed Alam, “Review on Opportunities, Constraints
and Challenges of Blue Economy Development in Bangladesh”, Journal of Fisheries and Life Sciences, Vol. 2,
No. 1, 2017, p. 38.
34
M. Gulam Hussain, Pierre Failler, A. Al Karim and M. Khurshed Alam, “Major Opportunities of Blue Economy
Development in Bangladesh”, Journal of the Indian Ocean Region, Vol. 14, No. 1, 2018, pp. 93-94.
35
Anwar Hussain, “Bay fish survey from November”, Dhaka Tribune, 07 August 2016.
36
Narsinh L Thakur and Archana N Thakur, “Marine Biotechnology: An Overview”, Indian Journal of
Biotechnology, Vol. 5, 2006, p. 264.
37
The last report on this issue was published in 1994 by Bangladesh Atomic Energy Commission (BAEC).
38
M. Khurshed Alam, Bangladesh’s Maritime Challenges in the 21st century, Dhaka: Pathak Shamabesh Book,
2004, p. 173.
39
“Ocean/Blue Economy for Bangladesh”, Ministry of Foreign Affairs, Bangladesh, Official Website, 2018,
available at https://mofa.gov.bd/, accessed on 10 January 2018.
143
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Sea salt generation using traditional methods has been around in Bangladesh
for a long time. The government patronized this industry by discouraging import of
salt through the National Salt Policy in 2011.40 However, Bangladesh’s salt production
predominantly comes from small scale farmers who do not use modern equipment,
thus are more vulnerable to unpredictable interruptions like natural disaster.
More than 90 per cent of Bangladesh’s external freight trade is seaborne,42 but
Bangladesh scores only 12.07 out of a possible 100 in The United Nations Conference
on Trade and Development (UNCTAD) Liner shipping connectivity index.43 Eighty
per cent of the US$ 78 billion annual overseas trade of Bangladesh is handled by
Chattogram Sea port alone.44 To reduce the burden, the GoB has already invested
in several seaport facilities, i.e., Sonadia, Matarbari (which has been reported to
be converted into a deep sea port)45 and Payra.46 In addition to upgrading the
infrastructure, improving the quality of port services is important. Most of Bangladesh’s
seaborne cargo is carried by foreign cargo ships.47 Moreover, the size of the national
fleet has gone down to 13.8 per cent in 2016.48 Thus, Bangladesh can benefit greatly if
local shipping companies are promoted.
40
Mohammad Ali Zinnat, “Good days for salt farmers”, The Daily Star, 03 February 2016.
41
“Water Desalination Market Size Worth USD 26.81 Billion By 2025”, Hexa Research, 10 August 2017,
available at https://www.hexaresearch.com/press-release/global-water-desalination-market, accessed on
17 January 2018.
42
M. Khurshed Alam, “Blue Economy”, ICE Business Times, 01 November 2015, available at http://ibtbd.net/
blue-economy/, accessed on 22 January 2018.
43
UNCTAD Stat, “Liner Shipping Connectivity Index, Annual”, available at http://unctadstat.unctad.org/, ac-
cessed on 28 October 2018.
44
Sohel Parvez, “15pc VAT on all port services to hurt businesses, consumers”, The Daily Star, 09 January
2018.
45
Dwaipayan Barua, “Matarbari port to be turned into a deep-sea port”, The Daily Star, 07 January, 2018.
46
“Infrastructure spending stimulates growth”, The Daily Star, 28 December 2018.
47
M. Gulam Hussain, Pierre Failler, A. Al Karim and M. Khurshed Alam, 2017, op. cit.
48
“Maritime Profile: Bangladesh”, UNCTAD, available at http://unctadstat.unctad.org/, accessed on 22
January 2018.
144
BLUE ECONOMY AND BANGLADESH
The environmental protection of the sea is a crucial part of the Blue Economy
concept. The Bay of Bengal is home to a vibrant and diverse fauna and flora. To protect
the health of the sea, it is important to have a good marine waste management
system. Bangladesh has undertaken a successful coastal green belt back in the
1990s.54 Recently, the government has initiated programme for greening the new
islands in the Bay of Bengal,55 which is a positive initiative. In addition, Bangladesh
needs to think about marine waste management to protect its sea. On the other hand,
ensuring the security of the Bay is crucial for expansion of ocean-based industries.
Therefore, Bangladesh needs to strengthen its maritime surveillance.
Blue carbon is another name for carbon sequestration, which refers to the
long-term storage of carbon in plants, soils, geologic formation and the ocean.56 In
49
“Ocean/Blue Economy for Bangladesh”, op. cit.
50
“Maritime Profile: Bangladesh”, op. cit.
51
Abdullah Bari and M. Rafiqul Islam, “Our Oceans and Blue Economy: Opportunities and Challenges”,
Procedia Engineering, Vol. 194, 2017, p. 9.
52
Aparup Chowdhury, “Rethinking Sustainable Coastal and Marine Tourism Development”, paper
presented in the PATA Way New Tourism Frontiers Forum, organized by Bangladesh Tourism Board, Cox’s
Bazar, Bangladesh on 23-25 November 2016.
53
Tarek Mahmud, “New prospects in Bangladesh Blue Economy”, Dhaka Tribune, 12 March 2017.
54
Banglapedia, “Coastal Greenbelt”, available at http://en.banglapedia.org/, accessed on 22 January 2018.
55
“New coastal islands to get green”, The Daily Star, 11 January 2018.
56
“What is Blue Carbon?”, National Ocean Service, available at https://oceanservice.noaa.gov/facts/bluecar-
145
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Bangladesh, Chowdhury et al. estimate that around 3 million tons of CO2 is stored in
the mangroves and salt marshes per year, but there is lack of data on seagrass beds,
river-estuary and coastal water.57 Even though blue carbon has not been integrated
into policy discussions for climate mitigation,58 having a measure of blue carbon may
help Bangladesh in future climate negotiations.
Just as the components of the Blue Economy are diverse, so is the number
of the actors involved in the process. Each of the industries and activity in the Blue
Economy framework has their own set of actors involved with them, including their
own line ministries, private sector investors and businessmen, and non-governmental
organizations working on that specific area. In many industries, there is also
involvement of small businesses and root level workers, especially in fisheries, sea-salt
generation and ship breaking. On the other hand, issues such as marine surveillance
and environmental protection have to be handled by the government as a whole.
In addition, because of the necessity of international cooperation in development of
the Blue Economy, many regional organizations and other cooperating states are also
important actors of Blue Economy.
Each of the group of components has their own set of challenges. While
harvesting the living resources, the concern is balancing between economic gain and
ecological sustainability. There is also need to explore ways to benefit from the existing
bio-diversity in the Bay of Bengal. In the extraction of the non-living resources, there
is need to find ways to attract private investment and develop effective regulatory
framework that allows Bangladesh to efficiently use its resources. In case of other sea
related economic activities, the challenge is to build large scale infrastructure necessary
for port and transportation services. On the other hand, in protecting the sea the
challenge lies in developing an effective monitoring and evaluation system that will
be able to effectively measure the ocean health. Having a strong marine surveillance
system is also included in this category, which is a requirement for all other Blue Economy
activities to go unhindered. In the following section, examples from other countries are
discussed in order to see how they are working on flourishing Blue Economy.
146
BLUE ECONOMY AND BANGLADESH
Economy. This section discusses various Blue Economy policies and initiatives pursued
by major powers as well as in countries where Blue Economy activities are prominent.
In addition, it analyzes the country-specific Blue Economy initiatives based on the four
dominant discourses (oceans as natural capital, oceans as livelihoods, oceans as good
business and oceans as driver of innovations) developed by Michelle Voyer et al.
4.1 Australia
59
S.K. Mohanty, Priyadarshi Dash, Aastha Gupta and Pankhuri Gaur, op. cit., p. 66.
60
Karen Evans, Nic Bax and David Smith, Australia State of the Environment Report 2016, Canberra:
Government of Australia, 2016.
61
S.K. Mohanty, Priyadarshi Dash, Aastha Gupta and Pankhuri Gaur, op. cit, p. 67.
62
Australian Institute of Marine Science (AIMS), The AIMS Index of Marine Industry, Townsville: Government
of Australia, 2016, p. 17.
63
Ibid.
64
“Australia’s Blue Economy: $100 billion in 2025”, Australian Fisheries Management Authority, 18 August
2015, available at http://www.afma.gov.au/australias-blue-economy-100-billion-2025/, accessed on 23 July
2018.
65
Commonwealth Scientific and Industrial Research Organisation (CSIRO), Innovation for the Blue Economy:
Workshop Summary, Canberra: CSIRO, 2015, p. iii.
147
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
4.2 China
China, the fastest growing economy in the world, is home to rich endowment
of blue resources, which could help sustain its high growth spell in the future. It has a
vast coastline of 32,000 km including continental shelves and EEZ which has marine oil
reserves of 24 billion tons and natural gas reserves of 1.6 billion cubic meters.71 During
2011-2015, China’s ocean economy grew at an annual average growth of 8.1 per cent.
In 2015, the marine economy was estimated to be US$ 989.3 billion, which was 7 per
cent higher than in 2014. This corresponded to about 9.6 per cent of the national GDP
for 2015. Besides, the marine industry employs an estimated 35.9 million people.72
66
Oceans Policy Science Advisory Group (OPSAG), op. cit.
67
National Marine Science Committee, National Marine Science Plan 2015-2025: Driving the Development of
Australia’s Blue Economy, Canberra: Government of Australia, 2015, p. 8.
68
Michelle Voyer et al., op. cit.
69
National Marine Science Committee, op. cit.
70
Australian Institute of Marine Science (AIMS), op. cit.
71
Rui Zhao, Stephen Hynes and Guang Shun He, “Blue Growth in the Middle Kingdom: An Analysis of China’s
Ocean Economy”, Center for the Blue Economy (CBE), No. 3, 2013, p. 5.
72
“China’s marine output up 7% in 2015”, Xinhua, 03 March 2016.
148
BLUE ECONOMY AND BANGLADESH
the marine economy and has noted: “A developed marine economy is an important
part of building maritime power.”73 For the first time, the Chinese government launched
the China Ocean Agenda 21 in 1996 with the objective to formulate a comprehensive
strategy for sustainable development of marine resources, safeguard state’s marine
rights and interests, and protect marine ecosystems.74 Adoption of this agenda was
the beginning of Blue Economy in China. In recent years, the Chinese government has
been increasingly supportive of the development of ocean economy, implementing
several national ocean-related strategies.75 At policy level, Blue Economy assumed
significance in the 12th Five-Year Plan for National and Social Development, 2011-15
which for the first time, devoted emphasis to the development of ocean economy. The
major objective of the Plan was to optimize the structure of Blue Economy through
the development of marine industries.76 In March 2016, the Chinese government
announced the 13th Five-Year Plan (2016-2020) which aims to achieve nearly 100
targets in the five-year period, e.g., develop smart ports, construct more ice-breaking
vessels, transform the ship equipment industry and engage in deep-sea activities,
etc.77 These initiatives will help China to promote the growth of Blue Economy.
73
Wang Qian and Zhang Yunbi, “President Xi vows to protect maritime interests”, China Daily, 01 August
2013.
74
Rui Zhao, Stephen Hynes and Guang Shun He, op. cit.
75
Rui Zhao, Stephen Hynes and Guang Shun He, “Defining and Quantifying China’s Ocean Economy”, Marine
Policy, Vol. 43, 2014, p. 164.
76
S.K. Mohanty, Priyadarshi Dash, Aastha Gupta and Pankhuri Gaur, op. cit., p. 75.
77
Federation of Indian Chambers of Commerce and Industry (FICCI), op. cit., p. 6.
78
Wen-Hai Lu, Jie Liu, Xian-Quan Xiang, Wei-Ling Song and Alistair Mcilgorm, “A Comparison of Marine
Spatial Planning Approaches in China: Marine Functional Zoning and the Marine Ecological Red Line”,
Marine Policy, Vol. 62, 2015, pp. 94-101.
79
Mohammad Aminul Karim, “China’s Proposed Maritime Silk Road: Challenges and Opportunities with
Special Reference to the Bay of Bengal Region”, Pacific Focus, Vol. 30, No. 3, 2015, pp. 297-319.
80
Clive H. Schofield, “A Landmark Decision in the South China Sea: The Scope and Implications of the
Arbitral Tribunal’s Award”, Contemporary Southeast Asia, Vol. 38, No. 3, 2016, pp. 339-347.
81
Alistair McIlgorm, “Ocean Economy Valuation Studies in the Asia-Pacific Region: Lessons for the Future
International Use of National Accounts in the Blue Economy”, Journal of Ocean and Coastal Economics, Vol.
2, No. 2, 2016, p. 10.
149
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
sectors to society, governments and the business sector in order to grow investment
and build social and political support.82
In the Chinese context, the Blue Economy is interpreted through the ‘ocean
as good business’ lens primarily. Michael Conathan and Scott Moore rightly point
out, “China’s Blue Economy policies have focused on growth of the ocean economy,
through a cross-sectoral and spatial planning process for economic development.
But China’s emphasis is not on environmental protection”.83 Although the Chinese
government has taken a few important steps to better protect marine ecosystems,
nevertheless its main focus has been on economic development.
Europe’s vast territory gives it access to a number of sea and oceans and its
maritime sector employs over 5.4 million jobs generating almost US$ 569.8 billion a
year.84 For the EU, the primary lens used to interpret the Blue Economy is the ‘oceans as
a driver of innovation’ lens. However, compared to other countries, significant amount
of emphasis is also put on ‘oceans as good business’ and ‘oceans as natural capital’
lenses. In fact, the EU is using innovation to foster jobs and protect the environment,
which is aimed at meeting its needs without causing damage to ocean health.
82
Charles S. Colgan, “Measurement of the Ocean Economy from National Income Accounts to the
Sustainable Blue Economy”, Journal of Ocean and Coastal Economies, Vol. 2, No. 2, 2016, pp. 1-42.
83
Michael Conathan and Scott Moore, “Developing a Blue Economy in China and the United States”, Centre
for American Progress, 2015, p. 5.
84
ECORYS, Blue Growth Study - Scenarios and Drivers for Sustainable Growth from the Oceans, Seas and Coasts,
Brussels: European Commission, 2012.
85
European Commission, Blue Growth: Opportunities for Marine and Maritime Sustainable Growth, Brussels:
European Commission, 2012.
86
European Commission, Report on the Blue Growth Strategy: Towards a More Sustainable Growth and Jobs in
the Blue Economy, Brussels: European Commission, 2017.
150
BLUE ECONOMY AND BANGLADESH
EU also has conducted study on specific seas (such as the western Mediterranean) to
see its Blue Economy potential. Besides, the EU Marine Strategy Framework Directive
(MSFD) has been put in place to protect the marine ecosystem and biodiversity.87 In
2018, the European Commission also funded an expert study on sustainable Blue
Economy which suggested pathways for development of Blue Economy in Europe
while conserving marine and coastal ecosystem.88
In order to highlight the results of its research and innovation in Blue Economy,
the EU published another report in 2017. The report demonstrated how EU-funded
research and innovation projects were helping in meeting the main challenges in
sustainable Blue Economy development. Moreover, the EU has been focusing on
sustainable marine energy and blue biotechnology; both of which require high
level of technological innovation.89 In a nutshell, it can be said that the EU’s efforts
to flourish its Blue Economy have been focused on generating more jobs through
innovation without harming the ocean’s health on which marine-related economic
and social activities are dependent.
4.4 India
India is the largest among South Asian countries, and endowed with 7,500
km long coastline and 2.019 million km2 of EEZ, which is a repository of huge wealth
of living and employment and contributes to the national economy.90 However, there
has not been any attempt to calculate how much the Blue Economy contributes to
the country’s GDP, which is understandable as the concept did not gain attention of
the government until very recently.
87
European Commission, “Environment”, 18 May 2017, available at http://ec.europa.eu/environment/
marine/eu-coast-and-marine-policy/marine-strategy-framework-directive/index_en.htm, accessed on 15
October 2018.
88
M. Pantzar and M. Kettunen, A Sustainable Blue Economy: Adopting the Concept of Ecosystem Services in EU
Marine Protected Area Management– A Study of Experts’ Views, Brussels: European Commission, 2018, pp.
11-22.
89
European Commission, Investing in the Blue Economy: Unlocking the Potential of the Ocean to Create Jobs
and Boost the Economy, Brussels: EU, 2017.
90
Vijay Sakhuja, op. cit.
91
Narendra Modi, Prime Minister’s Statement Made at the Commissioning of Offshore Patrol Vessel (OPV) in
Barracuda, Mauritius, on 12 March 2015.
151
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
and Growth for All in the Region (SAGAR). The centerpiece of India’s push for the Blue
Economy is the Sagarmala project that includes constructing ports, augmenting
coastal infrastructure, developing inland waterways, intensifying fishing, and creating
special economic zones and tourism promotion.92 The project envisages doubling the
current share of coastal shipping in India’s overall modal mix from 6 per cent to 12 per
cent by 2025.93
In addition, India has been actively pursuing oceanic outreach in the near
neighbourhood as well as the wider Indian Ocean Region (IOR), couched in terms of the
Blue Economy.94 It has launched Blue Economy initiatives with Seychelles, Mauritius,
Sri Lanka and Bangladesh among other countries of the IOR. Following Prime Minister
Modi’s visit to Mauritius, an India-Mauritius Dialogue on the Blue Economy has been
set up and as a follow-up, on 12 April 2016 the Mauritius Minister of Ocean Economy,
Marine Resources, Fisheries, Shipping and Outer Islands met with India’s Minister of
Science and Technology and Earth Sciences to explore areas of cooperation.95 The most
recent visit in 2017 resulted into the signing of Memorandum of Understanding (MoU)
on research and education in marine sciences and technology.96 Furthermore, MoUs
have been signed with Seychelles, Sri Lanka and Bangladesh on the Blue and Ocean
Economy. For instance, an agreement was signed between India and Bangladesh
on 15 November 2015 to commence coastal shipping between Bangladesh and the
eastern ports of India through River Sea Vessels.97
92
Pankaj Sekhsaria, “Many shades of a Blue Economy: Sagarmala project”, The Hindu, 11 November 2017,
available at https://www.thehindu.com/sci-tech/energy-and-environment/many-shades-of-a-blue-
economy-sagarmala-project/article20104312.ece, accessed on 20 November 2018.
93
“India’s Blue Economy Booming”, The Maritime Executive, 16 November 2017, available at https://www.
maritime-executive.com/article/indias-blue-economy-booming#gs, accessed on 17 June 2018.
94
Jivanta Schottli, “India’s Maritime Turn: A Blue Economy Strategy in the Making?”, ISAS, No. 332, May 2016,
p. 5.
95
“India-Mauritius Maritime Dialogue on Blue Economy”, Ministry of Earth Sciences, Government of India, 13
April 2016, available at http://www.moes.gov.in/content/india-mauritius, accessed on 17 June 2018.
96
“India and Mauritius sign deal on maritime security”, Indian Express, 28 May 2017, available at https://
indianexpress.com/article/india/india-and-mauritius-sign-deal-on-maritime-security-4677206/, accessed
on 20 November 2018.
97
“Deal signed to start coastal shipping soon”, The Daily Star, 16 November 2015.
98
Sonali Mittra, “Blue Economy: Beyond an Economic Proposition”, ORF Issue Brief, No. 173, March 2017, p. 2.
152
BLUE ECONOMY AND BANGLADESH
The US has thirty coastal states bordering the Atlantic, Pacific, Gulf of Mexico
and the Great Lakes.99 It is needless to say that ocean economy contributes to its
economy to a great extent. In 2015, the Ocean and Great Lakes economy contributed
US$ 320 billion to GDP and supported 3.2 million jobs.100 The growth of the US Ocean
and Great Lakes economy continues to outpace overall US economic growth, rising by
5.7 per cent in 2014-15 compared with the 2.7 per cent of overall economy.101 Instead
of Blue Economy, the National Ocean Service of the US terms the concept as the “Ocean
and Great Lakes economy” and states that it is comprised of six job sectors dependent
on natural resources: marine construction, marine transportation, offshore mineral
extraction, ship and boat building, and tourism and recreation.102 In the academic
world, the Middlebury Institute of International Studies, at the Middlebury college,
Vermont, US, has a center for the Blue Economy. The center conducts research on
how ocean and coastal resources can support economic development and enhance
healthy oceans and well-managed coastlines.103
The ‘oceans as good business’ lens has been the US’s centre of attention, as the
country focuses on job creation and economic activity in the sector. In 2010, the then
President Barack Obama issued a “National Policy for the Stewardship of the Ocean,
Our Coasts, and the Great Lakes” which included some elements of environmental
protection. Obama’s 2010 Executive Order also directed federal agencies to implement
the recommendations of the Interagency Ocean Policy Task Force (IOPTF) under the
guidance of a new National Ocean Council (NOC)104, but since then not much progress has
been made. In June 2018, President Donald Trump signed a new executive order detailing
a revised oceans policy. This has completely changed the theme from preservation to
resource use and extraction,105 further emphasizing the US’s ‘oceans as good business’ lens.
99
Judith T. Kildow, Charles S. Colgan and Pat Johnston, State of the U.S. Ocean and Coastal Economies, Cali-
fornia: MIIS, 2016, p. 7.
100
The White House, “President Donald J. Trump is Promoting America’s Ocean Economy”, 19 June 2018,
available at https://www.whitehouse.gov/briefings-statements/president-donald-j-trump-promoting-
americas-ocean-economy/, accessed on 29 July 2018.
101
National Oceanic and Atmospheric Association, NOAA Report on U.S. Ocean and Great Lakes Economy,
Charleston, SC: NOAA Office for Coastal Management, 2018.
102
Judith T. Kildow, Charles S. Colgan and Pat Johnston, op. cit.
103
“Center for the Blue Economy”, available at https://www.middlebury.edu/institute/academics/centers-
initiatives/center-blue-economy, accessed 16 October 2018.
104
“United States”, National Marine Spatial Planning Programme, available at http://msp.ioc-unesco.org/
world-applications/americas/us/national/, accessed on 16 October 2018.
105
Trump Just Remade Ocean Policy—Here’s What That Means”, National Geographic, 13 July, 2018, avail-
able at https://www.nationalgeographic.com/environment/2018/07/news-ocean-policy-indigenous-sus-
tainability-fisheries-industry-economy-marine/, accessed on 16 October 2018.
153
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Many SIDS have already formulated national policies on Blue Economy and
have designated special government units for it. The Government of Grenada, for
example, has developed a Coastal Blue Growth Master Plan and launched its own
Blue Innovation Institute. Furthermore, it has partnered with the Government of
Netherlands to establish a blue growth partnership named “the Blue Network”.108
Cape Verde, on the other hand, has formulated a government wide agenda called
“Blue Growth Charter”, which focuses governance and innovation and sustainable use
of its ocean resources. It also has a ‘Blue Growth Intelligence Unit” that supports the
Charter and provides policy advice.109
106
World Bank and United Nations Department of Economic and Social Affairs, The Potential of the Blue
Economy: Increasing Long-term Benefits of the Sustainable Use of Marine Resources for Small Island, Washing-
ton D.C.: The World Bank, 2017.
107
Food and Agricultural Organization (FAO), Global Blue Growth Initiative and Small Island Developing States
(SIDS), Rome: FAO, 2014.
108
“Adopting the Blue Economy: A Viable Path to Sustainable Development in Small Island Developing
States”, UN Ocean Conference, 2017.
109
Ibid.
110
“Blue Economy Movement Gaining Traction in Africa”, Financial Tribune, 17 July 2018.
111
P.G. Patil et al., op. cit., p. 93.
112
“Seychelles Blue Economy Strategic Roadmap and Implementation”, The Commonwealth, available at
http://thecommonwealth.org/project/seychelles-blue-economy-strategic-roadmap-and-implementation,
accessed on 17 October 2018.
113
The blue bond is a debt instrument issued by governments, development banks or others to raise capital
from impact investors to finance marine and ocean-based projects that have positive environmental,
154
BLUE ECONOMY AND BANGLADESH
Bank in September 2017, which will be used for fisheries and marine resources
management.114
From earlier discussions, it is evident that the Blue Economy priorities vary from
country to country, nevertheless, there are some common practices that Bangladesh
can follow in order to explore its Blue Economy potentials. Besides, Bangladesh may
take note of the innovative ideas initiated by other countries and apply them in viable
context. These are discussed subsequently.
economic and climate benefits. For details, see, The World Bank, “Sovereign Blue Bond Issuance: Frequently
Asked Questions”, available at https://www.worldbank.org/en/news/feature/2018/10/29/sovereign-blue-
bond-issuance-frequently-asked-questions, accessed on 10 January 2018.
114
Catherine Benson Wahlen, “First World Bank ‘Blue Bond’ Approved for Seychelles”, IISD, 29 September
2017, available at http://sdg.iisd.org/news/first-world-bank-blue-bond-approved-for-seychelles/, accessed
on 11 October 2018.
115
Raffaello Cervigni and Pasquale Lucio Scandizzo, The Ocean Economy in Mauritius: Making It Happen,
Making It Last, Washington, D.C.: World Bank, 2017.
116
“The Blue Economy and Climate Change in the Context of Sustainable Development: Reflections from
the Perspective of Belize, CARICOM and SIDS”, available at https://europa.eu/capacity4dev/file/32263/
download, accessed on 17 October 2018.
155
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
South Africa and EU have devised their own Blue Economy plan. For example, “The
2012 Harnessing Our Ocean Wealth (HOOW)” policy document of the Republic of
Ireland, “the Blue Economy Strategy Roadmap Implementation (BESRI)” of the Republic
of Seychelles, the Operation Phakisa policy document of the Republic of South Africa
and “Blue Growth Strategy” of the EU were initiated preparatory to the establishment
of Blue Economy regimes in the respective countries. Notably, purpose of the Blue
Economy plan should be to establish a framework that can guide the planning and
development of maritime activities in a rational and sustainable manner for social
and economic development of Bangladesh. Thus, for developing the Blue Economy
plan in Bangladesh, stakeholders in all potential Blue Economy sectors and coastal
communities need to be consulted. However, experts point out that Bangladesh
first needs to focus on human resource development and capacity building before
developing a well-articulated national maritime policy which will take time.117
117
Authors’ interview with Rear Admiral M. Khurshed Alam, Secretary, Maritime Affairs Unit, Ministry of
Foreign Affairs, on 24 October 2018.
118
Timothy Walker, Securing a Sustainable Oceans Economy: South Africa’s Approach, Pretoria: ISS, 2018.
119
Bangladesh’s Integrated Coastal and Ocean Management Policy (ICOMP) is currently under preparation.
It organizes amended laws, policies and institutions connected to twenty-seven “blue economic functions”
covering six broad areas: (i) maritime trade and shipping; (ii) food and livelihood; (iii) energy; (iv) tourism; (v)
coastal protection/artificial islands/greening coastal belts; and (vi) human resource development, maritime
surveillance and marine spatial planning.
120
Annex 1 shows the policies currently under review or development, related to the Blue Economy in
Bangladesh.
156
BLUE ECONOMY AND BANGLADESH
It is also important to ensure that the new initiatives do not damage the ability
of the natural world around us to thrive and continue to provide its critical services. The
World Bank says that the changing status of ocean ecosystems may pose a significant
threat to the future growth of ocean economy of Bangladesh. The three drivers of change,
viz., increasing fishing capacity, coastal development and pollution may have considerable
impact on these ecosystems.124According to Charles S. Clogan, two policy frameworks
are particularly important for resource and environmental management relevant to the
121
Abul Kalam Azad, “Delimitation of Maritime Boundaries and the Prospect of Blue Economy for
Bangladesh: A Critical Overview”, Journal of International Relations, Vol. VI, No. 6, 2015, p. 90.
122
Md. Jahan Shoieb and Md. Muhibbur Rahman, “Emerging Strategic Landscape in the Bay of Bengal and
Maritime Capability Building of Bangladesh”, BIISS Journal, Vol. 35, No. 1, January 2014, p. 41.
123
Md Shahidul Hasan, op. cit., p. 240.
124
P.G. Patil et al., op. cit.
157
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Blue Economy.125 One is integrated coastal zone management (ICZM) and the other, more
recent framework is MSP. These policies are all based on the setting of limits on human
activity and spatial arrangements of ecosystems. MSP is developing rapidly in many areas,
i.e., the EU and Australia. Small island states like Belize also have their own integrated
MSP, which prioritizes marine conservation. Unfortunately, Bangladesh is yet to establish
ocean governance at the centre of policymaking which is necessary to adopt MSP for
sustainable ocean governance in the Bay of Bengal. Therefore, Bangladesh is required to
push policies in cooperation with other countries to protect the ocean from the effects of
climate change, pollution and overfishing. Thus, development of environmental policies
and regulations geared towards conserving, managing, protecting and sustainable use
of aquatic and marine ecosystems is necessary. It is worth mentioning that Bangladesh
has some environmental laws covering seas (see Annex 1), which experts deem to be
inadequate.126
P.G. Patil et al. identified seven key elements of a Blue Economy policy
direction for Bangladesh.127 First, developing/strengthening national policies to
better integrate Blue Economy considerations, sub-national policy and governance
frameworks. Second, implementing policies for a healthy, resilient and productive
ocean spaces. Third, raising awareness to better educate stakeholders on what the
Blue Economy is and why it matters. Fourth, ensuring ocean wealth is kept national
and local. Fifth, constructing infrastructure to support a transition to a Blue Economy.
Sixth, transforming research and development and national knowledge or technical
centres via institutional links with emerging global experience and platforms to
better serve Bangladesh. Seventh, maximizing finance for development approach
which can unlock private capital. The study provides a comprehensive listing of
recommendations for developing Blue Economy.
125
Charles S. Clogan, “The Blue Economy: Theory and Strategy”, in Vishva Nath Attri and Narnia Bohler-
Muller (eds.), The Blue Economy Handbook of the Indian Ocean Region, Pretoria: Africa Institute of South
Africa, 2018, p. 47.
126
Authors’ interview with Syeda Rizwana Hasan, Executive Director, Bangladesh Environmental Lawyers
Association (BELA), on 17 September 2018.
127
P.G. Patil et al., 2018, op. cit., p. 69.
128
Charles S. Clogan, op. cit.; P.G. Patil, John Virdin, Sylvia Michele Diez, JulianRoberts and Asha Singh, To-
ward a Blue Economy: A Promise for Sustainable Growth in the Caribbean, Washington, D.C.: The World Bank,
2016; J.S. Golden, John Virdin, Douglas Nowacek, Patrick Halpin, Lori Bennear and Pawan G. Patil, “Making
Sure the Blue Economy is Green”, Nature Ecology and Evolution, 2017.
158
BLUE ECONOMY AND BANGLADESH
Second, manage the interaction between the ocean economy and ecosystems, and
among sectors. The ultimate success of a country in achieving Blue Economy policy
objectives for sustainable development of the ocean space and resources under its
jurisdiction will depend upon the management decisions of public agencies charged
with regulating ocean use. The essential task of these public agencies is to set and
enforce rules for the ocean economy that limit resource extraction and pollution
levels. Third, invest in the transition to the Blue Economy through clear principles and
processes that encourage sustainable growth in private investment. Fourth, monitor
the progress towards agreed targets for the country’s Blue Economy policy objective
is important.
6. Concluding Remarks
129
Abul Kalam Azad, op. cit., p. 83.
159
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
The Blue Economy experiences around the world are diverse and context
specific, but among them natural capital, livelihood, good business and driver of
innovation are major lenses. Blue Economy is regarded as a source of economic growth
by the EU, China, India and the US. The terms ‘Blue Economy’ and ‘ocean economy’ are
often used interchangeably by these countries. Mostly, their efforts to develop Blue
Economy are focused on growing ocean-based industries. Emerging Blue Economy
sectors, e.g., aquaculture, ocean-based renewables, deep sea mining and marine
biotechnology are given special attention. Ocean economy valuation, governance,
sector specific investments and growth strategies are prioritized. Besides, innovation
is central to developing Blue Economy in some cases, e.g., Australia and the EU. By
contrast, SIDS focus on human welfare and the protection of marine environment
as the central part in defining Blue Economy. The traditional sectors, e.g., fisheries,
aquaculture, tourism, etc. are emphasized in developing Blue Economy. In addition,
efforts to establish Blue Economy have included a policy framework incorporating MSP,
expansion of research institutes, development mechanism focusing diversification,
creating jobs and ensuring food security.
160
BLUE ECONOMY AND BANGLADESH
161
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Living National Ma- Fish Hatchery Act 2010 Ministry of Fisheries and Live-
Resources rine Fisheries Fish Hatchery Rules stock (MoFL)
Policy; 2011 Department of Fisheries
National Fish Feed and Animal Bangladesh Fisheries Develop-
Aquaculture Feed Act 2010 ment Corporations (BFDC)
Development Fish Feed Rules 2011
Strategy and Fisheries Research Insti-
Action Plan tute Ordinance 1984
(2013-2020)
National
Shrimp Policy,
2014
Tourism National Tour- Tourism Board Act, Ministry of Civil Aviation and
ism Policy, 2009 2010; Tourism
Bangladesh Tourism
Protected Areas and Bangladesh Parjatan Corpora-
Special Tourism Zone tion
Act, 2010;
Bangladesh Tourism
Protected Areas and
Special Tourism Zone
Rules, 2011
Shipping Maritime and Clean Air Act; Ministry of Power, Energy and
and Trans- Shipping Strat- Import Policy Orders, Mineral Resources (MoPEMR);
port egy of Bangla- 2012-2015; Infrastructure Financing Facility
desh Payra Port Authority Act, (BIFF);
2013; Inland Water Transport Authority
Chittagong Port Author-
ity Act, 1995;
Mongla Port Authority
Act, 1995
Navy Ordinance, 1961
Coast Guard Act, 1994
Ocean Comprehensive Inclusive Digital Finan- Ministry of Industries (MoI);
Based Credit Policy for cial Systems, 2015 Bangladesh Standards and Test-
Industry SMEs ing Institution (BSTI);
Bangladesh Small and Cottage
Industries Corporation (BSCIC);
Bangladesh Chemical Industries
Corporation (BCIC);
Central Bank
Source: Adapted from P.G. Patil, et al., Toward a Blue Economy: A Pathway for Bangladesh’s Sustainable Growth.
Washington, D.C., The World Bank Group, 2018.
162
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018: 163-185
Abstract
Sheikh Masud Ahmed, SPP, psc is Research Director at Bangladesh Institute of International and Strategic
Studies (BIISS). His e-mail address is: rd1@biiss.org
163
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
1. Introduction
In the 20th century, the world experienced earthshaking swings in the form
of two devastating world wars. Thereafter, it witnessed a balance of powers in effect
among global powers with the emergence of bipolar world order despite having
numerous proxy wars. With the end of the Cold War, the same century had to watch
and accept the emergence of the US as the lone superpower. In the following decades,
people of the world were obsessed with having a tension-free globe immersed in
peace and prosperity. Instead, there were more conflicts, although, of different nature,
more sufferings of the people and as a result, prospect for perpetual peace remains
elusive. For security analysts and scholars, these developments have once again
brought to the fore the debates about re-thinking and re-conceptualising security.1
The rise of NTS issues, therefore, presents new challenges that demand for
developing new security architecture to ensure the national security. Traditional
responses by nation-states are often ineffective against NTS threats, particularly threats
to a state that are posed by non-state actors and threats arising from non-human
sources.5 A common trend that has been observed by a number of security scholars
is the growing tendency to highlight and designate any security concern that is non-
1
Mely Caballero-Anthony, “Non-Traditional Security: Concept, Issues, and Implications on Security
Governance”, Georgetown Journal of Asian Affairs, Policy Forum, Vol. 3, No. 1, Fall 2016, p. 5.
2
Human Security Centre, Human Security Report 2005: War and Peace in the 21st Century, New York: Oxford
University Press, 2005.
3
Mely Caballero-Anthony, “Nontraditional Security and Multilateralism in Asia: Reshaping the Contours of
Regional Security Architecture?”, Stanley Foundation, Policy Analysis Brief, June 2007, p. 1.
4
Mely Caballero-Anthony, “Non-Traditional Security: Concept, Issues, and Implications on Security
Governance”, op. cit.
5
Rita Parker, “Resilience as a Policy Response to Non-Traditional Security Threats”, available at http://www.
ipedr.com/vol44/020-ICSHH2012-W00032, accessed on 14 December 2017.
164
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
6
Mely Caballero-Anthony, Ralf Emmers and Amitav Acharya (eds.), Non-Traditional Security in Asia:
Dilemmas in Securitisation, available at https://www.amazon.com/Non-Traditional-Security-Asia-Dilemmas-
Securitization/dp/ 0754647013#reader_0754647013, accessed on 12 December 2017.
7
J. Jackson Ewing and Mely Caballero-Anthony, “Non-Traditional Security 20 Years On: Assessing the Place
of the Field”, available at https://www.rsis.edu.sg/wp-content/uploads/2014/07/NTS, accessed on 09
November 2017.
8
John Bailey, “Nontraditional Security Threats in the U.S.-Mexico Bilateral Relationship: Overview and
Recommendations”, Washington D.C: Georgetown University, 25 January 2005, p. 5, available at https://
www.wilsoncenter.org/sites/default/files/Nontraditional%20Security%20Threats%20in%20the%20U.S.-
Mexico%20Bilateral%20Relationship.pdf, accessed on 11 January 2018.
9
Md Iftekhar Ahmed and M Ashique Rahman, “Non-Traditional Security Threats of Bangladesh: Scope of
Responses and Challenges for Its Land Forces”, in Chowdhury Hasan Sarwardy and A K M Abdur Rahman,
Exploring New Areas of Coopertion in the Asia Pacific Region, Dhaka: Pacific Armies Management Seminar
XXXVIII, Bangladesh Army and Bangladesh Institute of International and Strategic Studies (BIISS), 2015, p. 51.
10
Rita Parker, “Resilience as a Policy Response to Non-Traditional Security Threats”, op. cit.
165
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
not only inwards to execute internal socio-economic and political reforms but also
outwards, with an open outlook to cultivate international cooperation.11 Inexorably,
there are lacking and limitations in the capability of states to counter and/or contain
both traditional and non-traditional security alone, and thus, require cooperation
not only between governments but also with the private sector, non-governmental
and international organisations. For, they enable state actors to take advantages of
geographical, technological, and knowledge resources, which the states would be
unable to muster alone.12
11
Saurabh Chaudhuri, “Defining Non-Traditional Security Threats”, available at http://globalindiafoundation.
org/nontraditionalsecurity.html, accessed on 29 November 2017.
12
“Armed Non-State Actors: Current Trends & Future Challenges”, DCAF Horizon, Working Paper No. 5, 2015.
13
Walter Lippmann, US Foreign Policy: Shield for the Republic, Boston: Little Brown, 1943, p. 51.
14
Arnold Wolfers, “National Security as an Ambiguous Symbol”, in Arnold Wolfers (ed.), Discord and
Collaboration: Essays on International Politics, Baltimore, Maryland: Johns Hopkins University Press, 1962,
p. 150.
166
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
its survival.”15 In these definitions, terms, such as ‘core values’, ‘acquired values’ and ‘basic
values’, in the context of national security are essentially interpreted as the independence
and territorial integrity of a state that must be protected and preserved. Hence, the
meaning of security during the Cold War remained focused on the protection of the
state and its vital interests from attacks by other states.16 Traditional (or conventional)
security threats, therefore, refer to outbreak/potentiality of conventional war/battle/
engagement between two countries where armed forces, intelligence services or
proxy actors are employed to carry out offensive actions. In such conflicts, the targets
are typically another country’s important civil/military leadership, armed forces,
intelligence services, key government agencies, and key point installations (KPIs). It also
poses a threat to self-chosen mode of existence and moral stance of a state, of course,
with respect to the rest of the world.17 Traditional security threats may also endanger the
survival of states, unhindered development, pursuit of national goals, and protection
of basic national interests. The complexities of the Cold War witnessed the divide of
the global order into two geopolitical and ideological blocks in which the concept of
security remained strongly knit around the traditional model. State security remained
pre-eminent over security of individuals. This kept the discipline of security mainly
limited to conventional concept seen through a narrow prism of state facing external
military threats.18
However, since 1989, the majority of conflicts have been internal.19 The
changed nature of conflicts has influenced evolving theoretical approaches
and understandings of security, as well as practical responses.20 The conceptual
understanding of national security started reshaping itself focusing on individual
citizens and peoples’ way of life, with of course, emphasis on the integrity and interests
of the state. The difference between traditional and NTS, however, lies mainly in the
source of existential threats. Unlike traditional security, NTS emphasizes basically the
non-military character of security threats. It can also be distinguished in terms of the
security referent. Caballero-Anthony argues that NTS includes additional security
actors such as communities or individuals in addition to the state actors.21 However,
when non-traditional security challenges increase the likelihood of conflict or war, the
most important security referent remains the state.22
15
Joseph S. Nye Jr. and Sean M. Lynn-Jones, “International Security Studies: A Report of a Conference on the
State of the Field”, International Security, Vol. 12, No. 4, 1988, p. 5.
16
Mely Caballero-Anthony (ed.), Introduction to the Non-Traditional Security Studies. A Transnational
Approach, London: Sage Publications, 2016, pp. 3-19.
17
Katarzyna Marzęda-Młynarska, “Non-Traditional Security Challenges and Regional Governance: EU and
ASEAN Answers to the Migration Crisis”, paper presented in CEEISA-ISA Conference 2016, Ljubljana, 23-24
June 2016, p.3.
18
Ehsan Mehmood Khan, Human Security in Pakistan, Islamabad: Narratives Pvt. Ltd., 2013.
19
Ibid.
20
S. E. Sachs. “The Changing Definition of Security”, available at http://www.stevesachs.com/papers/paper
_security.html, accessed on 18 December 2017.
21
Caballero-Anthony (ed.), op. cit.
22
Marzęda-Młynarska, op .cit.
167
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Since the inception of humans on earth, NTS threats have existed all along.
But the issue has come to the forefront with the economic and social development
of the people and change in mindset where the possibility of total war against a
nation state has become bleak and unsustainable. Since the 1990s, there has been a
growing interest in the study of NTS, especially in the light of emerging challenges
brought on by a host of factors, including the effects of globalization.23 ‘Security-
framing’ appears to be an effective way to bring attention to these threats, convey
urgency and command governmental resources to address the complex challenges
that arise as one responds to them.24
“The battle of peace has to be fought on two fronts. The first is the security
front where victory spells freedom from fear. The second is the economic and social
front where victory means freedom from want. Only victory on both fronts can ensure
the world of an enduring peace…”27
Hence, the concepts of “freedom from fear” and “freedom from want” have
been there in mid-1940s, decades’ back, when in 1990s, we formally started to talk
about them. The human security concept highlights that everything should be subject
to the human’s benefits and needs.28 Therefore, it is important to counterbalance the
divergence of security understanding and bridge the gap with a view to bringing the
two concepts of traditional and non-traditional security at converging point. Only
then a comprehensive approach can be adopted to address the challenges of both
traditional security and NTS objectively.
23
Annegret Bendiek, “Regionalisation and the Taming of Globalisation? Economic, Political, Security, Social
and Governance Issues”, available at http://lib.znate.ru/docs/index-148167.html accessed on 30 October
2017.
24
Nirmala Joshi, “Responses to Non-Traditional Threats and Challenges”, available at https://silkroadstudies.
org/resources/pdf/Monographs/1004Joshi-VI-Responses, accessed on 30 0ctober 2017.
25
Mely Caballero-Anthony, Understanding Non-traditional Security, London: Sage Publications, 2016.
26
Human Security Centre, op. cit.
27
Okubo Shiro, “Freedom from Fear and Want’ and ‘the Right to Live in Peace’, and ‘Human Security’”, Kyoto:
Ritsumeikan University, Institute of International Relations and Area Studies, 2007.
28
Ibid.
168
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
NTS threats can originate from a variety of non-state human and natural
causes and they can affect both government institutions and civilian populations.32
Mely Caballero-Anthony argues that the NTS concept is based on five assumptions.
The first and most important one is: the non-traditional challenges or threats
could lead directly to conflict or war. Secondly, that the narrow state perspective is
insufficient for dealing effectively with NTS challenges. Third, that the states as well
as communities and individuals are actors responsible for ensuring security. Fourth,
29
Alan Collins in the introduction of his edited book has emphasized the crucial importance of different
approaches in establishing what constitutes security. See, Alan Collins, “Introduction: What is Security
Studies?”, in Alan Collins (ed.), Contemporary Security Studies, (3rd Edition), Oxford, UK: Oxford University
Press, 2013, p. 3
30
Daved Mutimer, “Critical Security Studies: A Schismatic History”, in Alan Collins (ed.), Contemporary
Security Studies, op. cit., pp. 67-86.
31
Alan Collins, “Introduction: What is Security Studies?”, op. cit., p. 6.
32
John Bailey, op. cit.
169
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
that threats, such as climate change or pandemics are transnational in nature and
require non-military responses. Fifth, because of the transnational character of these
challenges, international cooperation is essential.33 Moreover, she also highlighted six
distinctive characteristics of NTS threats. These are:
• They cause societal and political instability and become security threats;
NTS issues are, however, complex in nature and often debated by scholars and
academia. Through NTS, the very concept of ‘security’ has been extended to become
comprehensive that includes individual and personal needs. In this case personnel
security could be endless, hence, critical analysts argue that extending ‘security’ in
such a way may render security discourses out of context.35 There remains a growing
tendency to lengthen the list of NTS issues, and to put almost everything into the
basket. Indeed, all issues threatening human well being can be included under the
canopy of NTS, once they are considered serious enough. At the same time, it is
important to understand whether or not there is a certain limit to distinguish NTS from
traditional ones, because security always has special implications in the overall context
of a country. One may argue that some conditions can be identified as a security issue
at a certain geographical area whereas the opposite may be regarded as security issue
at particular time and place. For example, shortage of water in the desert countries
may be a security issue, but the flood water in monsoon may be regarded as security
issue in a deltaic country like Bangladesh due to crop damage, epidemics and loss
of food grains. Moreover, NTS threats are often interlocking, with the occurrence of
one NTS emergency leading to others. For example, Indonesia witnessed widespread
social unrest and instability following the Asian financial crisis.36 In western Africa,
many are concerned that the widespread transmission of Ebola has inflicted severe
33
Caballero-Anthony, op. cit.
34
Ibid.
35
O. Waever, “Securitization and Desecuritisation”, in Ronnie D. Lipschutz (ed.), On Security, New York:
Columbia University Press, 1995, pp. 46-86.
36
Brian Lucas, “Indonesian Financial Crisis (1997-1998)”, available at http://gsdrc.org/publications/
indonesian -financial-crisis-1997-1998/, accessed on 21 December 2017.
170
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
economic and social trauma, affecting the success of local peacebuilding efforts.37 It
is argued that time and place can have implications for considering the NTS threats.
Finally, it can conveniently be inferred with Frans-Paul van der Putten and
others41 that NTS is a comprehensive way of conceptualising security that include
economic security meaning the ability to function without disruption as an effective
and efficient economy; environmental security that is concerned with ensuring
a safe natural living environment; physical security encompassing the ability of
individuals and groups of individuals to function safely within society; and social
and political stability, which is about maintaining a social climate in which the core
values of democracy and the rule of law are observed. In a developing country like
Bangladesh, NTS issues involve all dimensions and varieties of NTS threats ranging
from environmental degradation, food insecurity, climate change to lack of social and
political instability and economic vulnerability.
37
Available at http://www.un.org/en/peacebuilding/ebola.shtml, accessed on 22 December 2017.
38
Barry Buzan, Ole Waever and Jaap de Wilde, Security: A New Framework for Analysis, Boulder, CO: Lynne
Rienner, 1998.
39
Saurabh Chaudhuri, “Defining Non-Traditional Security Threats”, accessed at http://globalindiafoundation.
org/nontraditionalsecurity.html, accessed on 11 December 2017.
40
Mely Caballero-Anthony, ‘An Introduction to Non-Traditional Security Studies: A Transnational Approach’,
op. cit.
41
Frans-Paul van der Putten, Minke Meijnders and Jan Rood, “Deterrence as a security concept against non-
traditional threats”, Clingendael Monitor, June 2015.
42
Sara Z. Kutchesfahani, “Preventing nuclear terrorism should remain a top U.S. priority”, available at http://
thehill.com/opinion/national-security/356439-preventing-nuclear-terrorism-should-remain-a-top-us-
priority, accessed on 25 November 2017.
171
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
about the lack of fixed income. Some people in the Middle East are concerned with
water resources while the forcibly displaced Palestinians are concerned with whether
they can return to their home land or not. Even for the same country, there will be
different NTS issues or different priorities at different stages of development. The NTS
threats may also vary geographically. And NTS issues are time sensitive as well, meaning
problem of today may appear differently tomorrow. All these factors are applicable in
case of Bangladesh. For example, with a large number of populations depending on
the agricultural contribution, Bangladesh may suffer from food insecurity and adverse
effect on ecological environment due to fast industrialization and urbanization.
Drying up of major rivers may further aggravate the situation and pose severe threats
leading to human insecurity, ecological imbalance, and demographic displacement.
In this respect, the water sharing of international rivers may be put on the top of the
list while dealing with various NTS issues of Bangladesh.
43
Barry Buzan, People, States and Fear: The National Security Problem in International Relations’, Brighton,
Sussex: Wheatsheaf Books Ltd, 1983.
44
Divya Srikanth, “Non-Traditional Security Threats in the 21st Century: A Review”, International Journal of
Development and Conflict, Vol. 4, 2014, pp. 60–68.
45
A United Nations report in December revealed that opium production in the Golden Triangle had tripled
since 2006, with the illegal drugs trade in the region worth $16.3 billion. The area produced 762 tonnes of
opium in 2014, making about 76 tonnes of heroin, the U.N. Office on Drugs and Crime said in its Southeast
Asia Opium Survey stated. See, https://www.independent.co.uk/news/world/asia/welcome-to-the-golden-
triangle-the-centre-of- the-worlds-drug-trafficking-10100420.html accessed on 13 January 2018.
46
The clandestine land routes of Iran, Afghanistan and Pakistan collectively constitute the Golden Crescent,
also called the silk route of drugs. Heroin, poppy husk, opium, and synthetic drugs are the four kind of drugs
entering India. See, https://www.indiatimes.com/news/india/golden-crescent-the-route-through-which-
drugs-are-making-thei r- way-into-punjab-256556.html accessed on 13 January 2018.
47
Ibid.
172
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
48
Divya Srikanth, op. cit.
173
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Political Security
Governance Issues; Democratic Deficit;
Confrontational Politics, etc.
Economic Security
Economic Development; Poverty;
Unemployment; Food Security, etc.
Societal Security
Gender Issues; Child Security; Drug Abuse
and Narcotics Control; Crime; Terrorism, etc.
Health Security
Epidemics; HIV/AIDS; Drug Administration,etc.
Environmental Security
Environmental Degradation; Industrial Waste;
Climate Change Impacts; Natural Disasters, etc.
Cross-border Security
Trafficking in Small Arms, Drugs and
Women and Children; Trans boundary
Water Issues; Cross-border Movements of -
Criminals, etc.
Energy Security
Scarcity/Availability of Energy
Resources; Optimum Utilisation, etc.
Source: Md Iftekhar Ahmed and M Ashique Rahman, “Non-Traditional Security Threats of Bangladesh:
Scope of Responses and Challenges for Its Land Forces”, in Chowdhury Hasan Sarwardy and A K M Abdur
Rahman, Exploring New Areas of Coopertion in the Asia Pacific Region, Dhaka: Pacific Armies Management
Seminar XXXVIII, Bangladesh Army and Bangladesh Institute of International and Strategic Studies (BIISS),
2015, p. 52.
174
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
Due to push factors like poverty, limited job prospects compared to large
population seeking jobs and the enticement for becoming wealthy quickly, a large
number of people in Bangladesh are still vulnerable and fall prey to human traffickers
and often end up in situation of forced and exploitative labour, and in case of female
workers sexual exploitation. The demand for cheap labour and the existence of
the informal sectors, including domestic work and prostitution in the countries of
destination, are also important pull factors of human trafficking. Although, there
is no reliable statistics of the actual number of men, women and children who are
being trafficked, it is, however, considered significant. Moreover, the large scale forced
migration of Rohingya people in the last two years especially, after August 2017, is
also proving to be a very difficult security problem to manage. The potentiality of
Rohingya radicalization and their integration with the local and transnational terrorist
groups are all becoming pressing security issues for government and communities to
tackle.
49
M. Pietraś, “Globalization as the Process of Changing the International Community”, in M. Pietraś (ed.), The
Faces of Globalization, Lublin: Wydawnictwo UMCS, pp. 35-64.
50
A K M Nazrul Islam, Neila Husain and Mahbubur Rashid Bhuiyan, “Small Arms Trafficking in Bangladesh:
Threat to National Security”, in Golam Mohammad (ed.), National Security Bangladesh 2009, Dhaka: The
University Press Limited, 2010, p. 214.
51
Ibid.
52
Mohammad Humayun Kabir, Neila Husain and Segufta Hossain, “Non-Traditional Security of Bangladesh”,
in Mufleh R Osmany (ed.), Whither National Security Bangladesh 2007, Dhaka: The University Press Limited,
2008, p. 255.
175
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Ecological crises have been responsible for killing and injuring substantially
larger numbers of people over time than conventional military threats, and therefore
represent a parallel and arguably more important source of insecurity.53 Due to Global
warming, the coastal areas of Bangladesh will be at great risk owing to flooding
and tidal upsurge; warming may force pests and pathogens to move beyond their
traditional regions with tropical diseases; and the disruption of ecological equilibrium
may increase conflict between societies especially along the long coastal belt of
Bangladesh. The pollution in the upstream across the border can cause ecological
damage to the downstream land mass of Bangladesh.
53
Dennis Pirages, “Ecological Security: A Framework for Analyzing Non-traditional Security Issues”, available at
http://www.nbr.org/publications/specialreport/pdf/Preview/SR28_EcoSecuritySouthAsia_preview, accessed
on 29 November 2017.
54
Shaheen Afroze, Sufia Khanom and Akand Muhammad Faisal Uddin, “Climate Change and National
Security of Bangladesh”, in Golam Mohammad (ed.), National Security Bangladesh 2009, op. cit., p. 158.
176
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
Hence, from NTS perspective, the water sharing of international rivers may
be put on the top of the list while dealing with various NTS issues of Bangladesh.
The Ganges and Teesta waters continue to be a thorny issue between Bangladesh
and India since long. This is a glowing example of not just a trans-boundary issue
with potentially serious ramifications, but also of how a shared resource can have
contending interests on two sides of an international border. Here from Indian
perspective, the importance of Farakka Barrage lies in serving the Northeast India as
a lifeline to its economic activities; the barrage is also crucial for preservation and
maintenance of the Kolkata Port by improving the water regime and navigability of
the Bhagirathi-Hooghly river system.55 However, from Bangladesh perspective the
concern is about ecological and agricultural impact. How this issue is finally resolved
will have serious consequences for both the countries and the millions of people who
depend on these important international rivers.
55
Priyadarshi Siddhanta, “Farraka Barrage: The tale of two countries and one river”, available at http://
indianexpress.com/article/india/india-others/farraka-barrage-the-tale-of-two-countries-and-one-
river/,aceeseed on 11 December 2017.
56
Mohammad Humayun Kabir et. al., “Non-Traditional Security of Bangladesh”, op. cit., p. 261.
57
Abbas Bhuiya, “Health Threats as Nontraditional Security Challenges for Bangladesh”, available at http://
nbr.org/publications/element.aspx?id=591, accessed on 23 December 2017.
177
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Until very recently, terrorism was considered to be political and military threat
to be addressed by the state alone. The fact that terrorism and human insecurity are
closely interlinked dawned much later in the minds of policymakers. Now, some may
believe that the threats of violent extremism and terrorism need special attention
and should be put on the top of the security agenda. The internal social, political and
economic dynamics of Bangladesh have given birth to this non-traditional security
issue in the form of violence, extremism, and terrorism. The main threat of terrorism
lies in its potential to cause wider social unrest, which can in turn lead to further
social polarization and radicalization of various population groups. These, in turn,
have profound implications on the nature of security cooperation among the various
security agencies, as well as between the policy makers and other stake holders.
The recent terrorist attacks during 2014-2016, in various parts of Bangladesh have
brought the debates about re-thinking and re-conceptualizing terrorism as the top
security agenda to the fore front. Especially, the 2016 Holey Bakery attack wrecked
havoc in the country killing 20 foreign nationals for the first time in the history of
Bangladesh. The incident rattled the whole nation and questioned the very moderate
fabric of the society of Bangladesh. However, the government has very successfully
tacked the post Holey Bakery situation. Due to various counterterrorism measures
and legal and institutional setups, the country has not witnessed any major terrorist
incident since 2016.
178
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
villages. The cyclone caused 3,363 deaths, injured 55,282, damaged or destroyed 1.5
million homes, and 2.5 million acres of cropland.58 On 25 May 2009, Aila hit 14 districts
on the south-west coast of Bangladesh. It was the second major natural disaster for the
region in less than two years while many of these areas were still recovering from the
effects of 2007’s cyclone Sidr. Cyclone Aila caused 190 instant deaths, injuries to 7,103
people, damage to 6,000 kilometres of roads, collapsed more than 1,700 kilometres
of embankments, leaving more than 500,000 people homeless. It is estimated that
about four million people have been affected during and after cyclone Aila.
On the other hand, the country has been victims of flood since the recorded
history due to its topography – basically a floodplain of three of the greatest rivers of
the world, the Ganges, the Brahmaputra and the Meghna (GBM). About 80 per cent of
its landmass is flood prone while about 20-30 per cent is inundated regularly which
sometimes reached up to 70 per cent in extreme years. The country has experienced
severe flooding in the years of 1974, 1987, 1988, 1998, 2004, 2007 and very recently
in 2017. Flood caused havocs in Bangladesh in terms of loss of life and property (see
Table 2).
58
Available at https://www.unicef.org/bangladesh/4926_4990.htm, accessed on 13 December 2017.
59
Sajid Karim and Mahbubur Rashid Bhuiyan, “Sustainable Flood Management in Bangladesh: Addressing
the Challenges”, BIISS Journal, Vol. 39, No. 1, January 2018, p. 1.
179
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
natural calamities due to environmental degradation and climate change are most
crucial NTS challenges that are persistent in Bangladesh.
For properly addressing the NTS threats, Bangladesh should learn to adopt
new approaches and positive outlook about dealing with its own NTS issues. It has to
realise that most of the NTS issues as Sebastian Biba noted, usually require mitigation
and adaptation strategies, instead of preventative measures.61 In the context of limited
resources and capabilities, the country needs to prioritize, in order of importance and
urgency, virtually endless list of non-traditional issues that Bangladesh is facing today
and likely to face in near future. Today, a nation’s security, international legitimacy,
and sovereignty rest not only on territorial control, but also on the integrity of its
services and its ability to fulfil the basic rights of its citizens.62 Therefore, it is suggested
60
Abul Kalam Azad, Mohd. Mahfuz Kabir and Benuka Ferdousi, “Global Economic Crisis and Its Impact on
Bangladesh”, in Golam Mohammad (ed.), National Security Bangladesh 2009, op. cit., p. 76.
61
Sebastian Biba, “New Concerns, More Cooperation? How Non-Traditional Security Issues Affect Sino–
Indian Relations”, Journal of Current Chinese Affairs, Vol. 45, No. 3, 2016, p. 4.
62
Mely Caballero-Anthony and Alistair Cook, “Non Traditional Security in Asia: Issues, Challenges and
180
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
in this paper that the national security stakeholders of Bangladesh should develop a
three-pronged policy – (a) devising a comprehensive security approach; (b) boasting
international cooperation; and (c) crafting a dynamic and adaptive security framework
– for addressing NTS threats more effectively. These are briefly elaborated below.
frameworks for Action”, Singapore: Institute of Southeast Asian Studies (ISAS), 2013.
63
Muthiah Alagappa, Asian Security Practices: Material and Ideational Influences, Stanford University Press,
1998.
64
Mely Caballero-Anthony, “Re-visioning Human Security in Southeast Asia”, Asian Perspectives, Vol. 28, No.
3, 2004, pp. 155-189.
181
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Bangladesh cannot deny the NTS issues that emanate from trans-boundary
phenomenon. For example, the trans-nationality of NTS challenges was illustrated by
the outbreak of Severe Acute Respiratory Syndrome (SARS) in 2002 and 2003, when
the epidemic was transmitted from Beijing to Hong Kong, and then to Southeast Asia
and rest of the world.65 The 2009 swine flu pandemic in northern India claimed many
lives as it moved to neighbouring Pakistan and Nepal. It was reported that the flu
impacted the daily lives of millions of people as well as the economies of the affected
regions.66 Bangladesh needs to develop the mechanism to oversee and constantly
monitor the peripheral and regional as well as global NTS issues that may affect the
country and remain prepared to respond timely if needed.
65
Melissa Curley and Nicholas Thomas, “Human Security and Public Health in Southeast Asia: The SARS
Outbreak”, Australian Journal of International Affairs, Vol. 58, No.1, 2004, pp. 17-32.
66
Zahir Janmohamed, “Deadly Outbreak of Swine Flu in India May Be Due to a Mutated Strain”, Al Jazeera,
23 March 2015.
67
Khaled Sarwar and Md. Saifullah, “Economic security in the context of Bangladesh”, available at http://
www.newstoday.com.bd/index.php?option=details&news_id=2377105&date=2014-05-04, accessed on
20 December 2017.
182
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
global community in fighting the menace of terrorism, and climate change in terms
of intelligence sharing regarding terrorist movements/plans and mobilizing the fund
to reduce the effect of climate change respectively.
Most of the NTS challenges faced by Bangladesh are not new and are not
unique as well. How these issues are framed, approached, addressed, and understood
will have significant bearing on how many will be affected by the menaces or how
few will have less suffering. The appreciation and acceptance of NTS as a national
security challenge with global implications will also guide Bangladesh to create
mechanisms to deal with such issues. The policy makers of Bangladesh should
be engaged regarding the importance of NTS in guiding political response to face
the crisis and developing strategies to lessen or eliminate the threat to its citizens.
Bangladesh government needs to develop the institutional competence to engage
the regional and international organizations to address these challenges. If viewed
from complicated and volatile context of global and peripheral security environment,
and the national perspective as well, all the issues should be placed in the big basket
of decision-making of the government policy makers targeting national consensus
and national unity.
183
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
rural people to emerging health threats can be diminished through renewed public
health efforts that involve social movements and collaborations on global health
promotion.68 Bangladesh may take initiative for creating regional food bank, storing
disaster management resources at calamity prone areas, and creating a regional pool
of physicians and pharmaceuticals to deal with diseases and medical matters in time
of crisis. Strong mechanism of acquiring early warning to mitigate or prevent the
effects of natural calamities that befall the nation will also assist in identifying and
preventing problems, thereby, ensuring enhanced preparedness. Incorporating such
adaptive framework in the policy process will definitely enhance the capability and
resilience of Bangladesh against diverse NTS threats.
To curb violent extremism and terrorist acts, drug, arms and human trafficking,
Bangladesh may engage regional stakeholders, and global communities and countries
for intelligence exchange and trans-boundary cooperation. Bangladesh government
may take the initiative to set up ‘Regional Intelligent Cell’ for acquiring and sharing
information on the movement, plans and strategy of the terrorist groups and outfits
within and beyond the region. To address other issues like Rohingya crisis, common
rivers’ water sharing, and environmental hazards, Bangladesh needs to intensify
and enhance bilateral and multilateral engagements and launch mass awareness
campaign targeting national unity. Moreover, appropriate responses to NTS issues
will require constant vigilance and instantaneous or even pre-emptive action in order
to protect and preserve the security, prosperity, and lives of people.
5. Concluding Remarks
In the post-Cold War era, the concept of ‘security’ has undergone tremendous
transformation. Although intense debate continues to persist among the scholars of
‘security studies’ regarding the boundaries and the range of issues of its subject matter,
meaning of security no longer confined within the traditional conceptualisation of
security i.e., protection of the state and its vital interests through military means is
the prime concern of ensuring security. Since 1989, the changed nature of conflicts
has influenced evolving theoretical approaches and understandings of security and
there has been a shift from traditional security. The difference between the two lies
mainly in the source of existential threat, as NTS unlike traditional security emphasises
basically on the non-military and non-state characters of security threats. Hence, an
exhaustive list of NTS might include but certainly not limited to climate change, food
and water scarcity, environmental degradation, natural disasters, pandemics, irregular
movements of people, human and drug trafficking, violent extremism, terrorism, and
transnational crimes, cyber security, etc.
68
Abbas Bhuiya, op. cit.
184
NON-TRADITIONAL SECURITY THREATS OF BANGLADESH
185
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
186
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018: 187-213
Abstract
1. Introduction
— John Ashton.1
Md. Riaz Uddin is Intern at Bangladesh Institute of International and Strategic Studies (BIISS). His email
address is: Mdriazuddin563@gmail.com; Hasan Mahmud is MSS degree pursuer at Department of
International Relations, University of Dhaka. His email address is: Hasandu1437@gmail.com
187
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
The above quotation alludes to the potential nexus of climate change with
the security paradigm. Climate change is already considered as a threat to the safety
and wellbeing of people all around the world. Throughout the globe, sea level rise,
rapid desertification, increased salinity and the growing frequency of natural disasters
are turning out to be common phenomena. Exactly when climate change started to
occur due to anthropogenic reasons is up to debate. According to a recent study
published in the Nature journal, greenhouse gases began warming the world’s oceans
in the early 1800s.2 Since 1901, earth’s surface has warmed by 0.7–0.9°C, but the rate
of warming has nearly doubled since 1975 to 1.5–1.8°C.3 By 2020, it is projected that
global surface temperature will be more than 0.5°C (0.9°F) warmer than the 1986-2005
average.4 Thus, it is undeniable that climate is changing more rapidly now compared
to the past.
Climate change can be linked with security concern of nation states in the
modern era. For Bangladesh, climate change is already a vital issue because the country
is in fear of losing more in the near future due to the changing climate. A research
reveals that “a sea-level rise of 0.5 meters over the last 100 years has already eroded
65% landmass of 250 square kilometers of Kutubdia, 227 square kilometers of Bhola
and 180 square kilometers of Sandwip islands”.5 According to the Intergovernmental
Panel on Climate Change (IPCC), a 45 cm sea-level rise will inundate almost 10.9 per
cent of the territory of Bangladesh.6 Moreover, the issue of climate change-induced
cross-border migration has already created tension with India.7 Against this backdrop,
the objective of this paper is to understand whether climate change can be considered
as a significant threat multiplier for Bangladesh. With this objective, this study looks
forward to answering some research questions: What are the prevailing impacts of
climate change in Bangladesh? Among these impacts, which ones can potentially
cause a significant level of insecurity in Bangladesh and how?
In order to address these research questions, there are six sections in this
paper. Section two examines the prevailing literature on the climate change-security
nexus. Section three highlights the analytical framework based on which this study
progresses. Section four discusses the cases of Darfur and Nigeria where the impacts
2
Roz Pidcock, “Scientists clarify starting point for human-caused climate change”, available at https://
www.carbonbrief.org/scientists-clarify-starting-point-for-human-caused-climate-change, accessed on 31
October 2018.
3
Gail Hartfield, Jessica Blunden and Derek S. Arndt, “State of the Climate in 2017”, Bulletin of the American
Meteorological Society, Vol. 99, No. 8, 2018.
4
Rebecca Lindsey and LuAnn Dahlman, “Climate Change: Global Temperature”, available at https://www.
climate.gov/news-features/understanding-climate/climate-change-global-temperature, accessed on 31
October 2018.
5
Bangladesh Institute of International and Strategic Studies (BIISS) and Saferworld, Climate Change and
Security in Bangladesh: A Case Study, Dhaka, 2009.
6
Intergovernmental Panel on Climate Change (IPCC), Climate Change 2007: Impacts, Adaptation and
Vulnerability, Cambridge: Cambridge University Press, 2007.
7
BIISS and Saferworld, op. cit.
188
EXPLORING THE ROLE OF CLIMATE CHANGE
of climate change have already led to crises resulting into instability and widespread
insecurity. Section five explores the threats associated with changing climate which
aggravate vulnerabilities of Bangladesh and can potentially challenge the security
and survival of the country in the long run. Section six summarizes the findings of this
study and concludes the paper.
2. Literature Review
The following discussion is the review of the existing literatures which directly
or indirectly address climate change and security within their scope. The existing
scholarly works on the role of climate change as a threat multiplier are insufficient,
and they are more hypothetical rather than empirical in nature. Hence, the primary
purpose of this discussion is to address the gaps in existing studies and to fill up
the prevailing literary vacuity. At first, the concepts of climate change and national
security are depicted and later, the climate change-security nexus in the existing
literature is analyzed.
8
“What is Climate Change?”, available at https://www.nasa.gov/audience/forstudents/k-4/stories/nasa-
knows/what-is-climate-change-k4.html, accessed on 01 November 2018.
9
“United Nations Framework Convention on Climate Change (UNFCCC)”, available at https://unfccc.int/
files/essential_background/background_publications_htmlpdf/application/pdf/conveng.pdf, accessed on
01 November 2018.
10
IPCC, op. cit.
189
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
The scientific basis for climate change is already well established and there is
continuous progress in the amount of research being undertaken on the biophysical
effects of climate change regarding the rising sea level, distorted rainfall patterns,
more recurrent and violent storms and the likely corollaries of all these phenomena
11
Walter Lippmann, U.S. Foreign Policy: Shield of the Republic, Boston: Little, 1943.
12
Harold Brown, Thinking About National Security: Defense and Foreign Policy in a Dangerous World, Boulder,
CO: Westview, 1983.
13
Mario Nobilo, “The Concept of Security in the Terminology of International Relations”, Political Thought,
October-December, 1988, pp. 72-73.
14
Bernard Brodie, “National Security Policy and Economic Stability”, available at https://books.google.
com.bd/books/about/National_Security_Policy_and_Economic_St.html?id=_borAAAAYAAJ&redir_esc=y,
accessed on 02 November 2018.
190
EXPLORING THE ROLE OF CLIMATE CHANGE
for human well-being.15 The following table summarizes the existing works on the
climate change-security nexus which will be discussed in details afterward:
15
Oli Brown, Anne Hammill and Robert McLeman, “Climate Change as the ‘New’ Security Threat: Implications
for Africa”, International Affairs, Vol. 83, No. 6, 2007, p. 1146.
191
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Mayowa A geographic in- The Sahel region recorded deficit rainfall over a period of
J Fasona formation system six-decade (1940-2000). There is a clear indication of loss
and AS (GIS) approach of prime arable lands resulting from climate change. This is
Omojola that permits the correlated with the pattern of communal clashes and con-
analysis of mul- flicts over land resources. The situation is a zero-sum game
tiple data layers where each participant’s gain is the others (and collective)
was used. loss. This is a situation where all will be losers at the end.
The The study was With climate change, a number of phenomena are likely
Center for focused on a col- to happen. Soft power and North-South tensions will
Strategic laboration which increase. Migration and immigration will rise, producing
and Inter- engaged climate a strong backlash. Public health problems will grow. Re-
national scientists and source conflicts and vulnerabilities will intensify. Nuclear
Studies national security activity will increase, with attendant risks. Domestic politi-
(CSIS) specialists in a cal repercussions and state failure will occur. The balance
and the lengthy dialogue of power will shift in unpredictable ways.
Center on the security
for a New implications of
American future climate
Security change.
(CNAS)
Jon Bar- Secondary ma- Climate change is a security problem for some states and
nett terials included people. National security has an internal dimension in that
books, journal it is partly a function of state legitimacy. Governments in
papers and news- states where the material well-being of people is highly
paper articles. variable to external forces or where material wellbeing is
declining, tend to be more prone to internal violent con-
flicts. The possibility of violent conflicts may lead to welfare
and livelihoods less secure. On the basis of existing envi-
ronment-conflict research there is simply insufficient evi-
dence and too much uncertainty to make anything other
than highly speculative claims about the effect of climate
change on violent conflict.
Source: Authors’ compilation.
Back in 2009, a study on climate change and human security in Bangladesh
was conducted by BIISS and Saferworld.16 According to that study, “The relationship
between climate change and security is not necessarily direct, but depends on
a chain of consequences. For example, climate change causes environmental
degradation. In areas where this phenomenon occurs, it undermines livelihoods,
reducing basic human security and creating increased tension as competition
for dwindling resources becomes more intense. This tension can lead to crime
and violence, increasing social instability. The deteriorating economic and social
situation also drives people to migrate from these areas to towns and cities in
search of a better life. However, this migration away from affected areas can have
16
BIISS and Saferworld, op. cit.
192
EXPLORING THE ROLE OF CLIMATE CHANGE
negative effects on the economic and social situation in destination areas, which
may again lead to increased tension, crime and violence and the risk of serious
social disturbances – leading in the worst-case scenario to violent conflict”.17
Although this study mentions that climate change can reduce human security and
possibly lead to violent conflict, it has not thoroughly assessed how such impacts may
affect the national security of Bangladesh through its repercussions.
Barnett and Adger argue that climate change undermines human security
and this may, in turn, increase the risk of violent conflict.18 They mention, “Climate
change undermines human security in the present day and will increasingly do
so in the future. It does this by reducing people’s access to natural resources
that are important to sustain their livelihoods. Climate change is also likely to
undermine the capacity of states to provide the opportunities and services that
help people to sustain their livelihoods and help to maintain and build peace.
In certain circumstances, these direct and indirect impacts of climate change on
human security and the state may in turn increase the risk of violent conflict”.19
While this study argues that impacts of climate change on state and human security
holds the potential for increasing conflicts, it does not provide ample evidence to
support the view.
The UNEP conducted a study in 2011 to assess the impacts of climate change
on the Sahel region.20 This study analyzed historical climate trends across this region
to explore the link between the impacts of climate change on livelihoods and
behavioural responses such as migration and conflict. The findings of this study are
as following:
(i) Climatic change trends can be observed over the last 40 years in the
Sahel in terms of temperature, rainfall and floods. In addition, the
recurrence of drought and the potentially severe impacts of sea-level
rise are increasing livelihood vulnerability.
17
Ibid.
18
Jon Barnett and W. Neil Adger, “Climate Change, Human Security and Violent Conflict”, Political Geography,
Vol. 26, No. 6, 2007.
19
Ibid, p. 651.
20
UNEP, Livelihood Security: Climate Change, Migration and Conflict in the Sahel, Geneva: UNEP, 2011.
193
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
growth, weak governance and land tenure challenges, has led to greater
competition over scant natural resources – most remarkably fertile
land and drinking water – and resulted in tensions and clashes among
different communities.
This study has found a strong link between the impacts of climate change on
livelihoods and behavioural responses. Migration and conflict can be great security
threats not only for individuals but also for the nation-states in the Sahel region.
However, this study has only considered the vulnerability of individuals and ignored
the vulnerability of the nation-states during the evaluation.
The CSIS and the CNAS jointly conducted a research on the foreign policy
and national security implications of global climate change. The study found that,
“the United States can expect that climate change will exacerbate already existing
north-south tensions, dramatically increase global migration both inside and
between nations (including into the United States), spur more serious public health
problems, heighten interstate tension and possibly conflict over resources, challenge
the institutions of global governance, cause potentially destabilizing domestic
political and social repercussions, and stir unpredictable shifts in the global balance
of power”.23 The study also expressed in its concluding remarks that some of the
challenges of climate change “have the potential to overwhelm national governments
and international institutions. It is difficult to anticipate how that will ultimately
21
Mayowa J Fasona and AS Omojola, “Climate Change, Human Security and Communal Clashes in Nigeria”,
paper presented in the International Workshop on Human Security and Climate Change, organized by
Centre for the Study of Civil War, International Peace Research Institute, Oslo (PRIO), Oslo, on 21-23 June
2005.
22
Ibid, p. 20.
23
“The Age of Consequences: The Foreign Policy and National Security Implications of Global Climate
Change”, available at https://csis-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/
pubs/071105_ageofconsequences.pdf, accessed on 01 November 2018.
194
EXPLORING THE ROLE OF CLIMATE CHANGE
unfold, but the prospects for destabilizing global effects are clearly on the horizon”.24
This research puts national security in perspective while exploring the implications of
climate change worldwide. Nevertheless, the study still remains an anticipatory work
rather than an exploratory one.
Some scholars hypothetically argue that sea-level rise, ice-free Arctic region
and climate change-induced migration may pose a significant threat to the survival
of nation-states. Barnett states, “Because sovereignty over delineated territory is the
material substrata of national security, then physical processes such as sea-level
rise may undermine national security in serious ways”.25 He also argues that climate
change may create legitimacy crisis for the government and destabilize the internal
harmony and thus undermine national security.26 Though he portrays climate change
as a national security issue in his study, he offers little evidence in this regard.
The literature review indicates that only a few scholars have considered the
impacts of climate change on national security so far. Nonetheless, their arguments
are not based on empirical data. Most scholars in the academic arena still put emphasis
on human security while discussing impacts of climate change and thus ignore the
insecurity of nation-states. The present and predicted climate trends, as illustrated in
the scientific reports, such as Fourth Assessment Report (AR4) and Fifth Assessment
Report (AR5) by IPCC, project that it is time for us to think out of the box. The scarcity
of theoretical and empirical studies in this issue, coupled with the alarming reports on
the tentative grim impacts of climate change on Bangladesh, infers new questions and
research areas to be explored. In this regard, this study proceeds with a determination
to unfold security implications of climate change in the context of Bangladesh.
3. Analytical Framework
24
Ibid.
25
Jon Barnett, “Security and Climate Change”, Global Environmental Change, Vol. 1, No. 1, 2003, p. 9.
26
Ibid.
195
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Impacts
Climate Change (temperature, rainfall, drought
flood, sea-level rise)
Threat multiplier
Non Climatic
Factors
Vulnerability
Economic Food security Natural resource
water security availability
Social health issues
Political
Depmgraphic
perssure Possible responses/outcome
Migration
Land degradation Resource competiton
Political destabilization
Conflict
Statelessness: There are repercussions for rights, security and sovereignty with
the loss of statehood due to disappearance of territory.
27
UNEP, op. cit., p. 14.
196
EXPLORING THE ROLE OF CLIMATE CHANGE
Increased tribal friction, deriving from clashes over resource control, led to
intertribal disputes.31
The disputes resulted in clashes among settled tribes, mostly African, and
nomadic tribes, mostly Arab, who were competing for resources for a long time after
a prolonged drought in 1983.32
28
Ibid, p. 14.
29
IPCC, Climate Change 2014: Synthesis Report, Geneva: Intergovernmental Panel on Climate Change, 2015.
30
Hamdy A Hassan, “Dimensions of the Darfur crisis and its consequences: An Arab perspective “, African
Security Review, Vol. 19, No. 1, 2010, p. 21.
31
Ibid.
32
Carin Zissis, “Darfur: Crisis Continues”, available at https://www.cfr.org/backgrounder/darfur-crisis-
continues, accessed on 03 November 2018.
197
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
In the meantime, the Muslim government of the north was busy with a civil
war with insurgents in the Christian and animist dominated south.33 The government
of Sudan backed Darfur’s Arab paramilitaries to keep the rebels cornered. This
deteriorated Arab-African friction even more and eventually, President Omar al-Bashir
transformed a competition over scarce resources into a far-reaching violent conflict
shaded with grave racial and ethnic connotations.34
A June 2007 report by UNEP suggests that the climate of Darfur has been changing
drastically since 1970s.36 Recurrent droughts and floods, desertification and scarcity of
rainfall have borne the testimony of the changing climate in this region. According to the
report of UNEP, the following events occurred as direct impacts of climate change:
33
Ibid.
34
Ibid.
35
Ban Ki Moon, “A Climate Culprit in Darfur”, The Washington Post, 16 June 2007.
36
UNEP, Sudan: Post-conflict Environmental Assessment, Nairobi: UNEP, 2007.
37
Ibid.
38
Ibid.
39
Ibid.
40
Ibid, p. 9.
198
EXPLORING THE ROLE OF CLIMATE CHANGE
rate of desertification has been increasing since 1980s due to the rapidly changing
climate in Sudan.
Flood: Though there is a serious water shortage in Darfur and in its adjacent
areas, flood is a common phenomenon around here. During the period of 1980-2006,
several floods took place in the region. The frequency of flood during this period was
quiet high. The UNEP report says, “The sequence of severe Nile floods – which were
recorded in 1878, 1946, 1988, 1994, 1998 and 2006 – clearly shows that the frequency
of flooding has increased dramatically over the last twenty years”.41
The Scarcity of Rainfall: The average annual rainfall during the period of 1946-
1975 was 564.20mm which significantly reduced during the period of 1976-2005 to
only 427.70mm.42 In other words, rainfall decreased in Darfur by 24 per cent during
the period of 1976-2005 compared to the period of 1946-1975.43
In the case of Darfur, climate change did not act as a single factor which led
to food insecurity, water insecurity or scarcity of natural resources. Rather there have
been several other political, social and economic factors. Non-climatic factors which
contributed to this crisis were:
Population Growth: Population growth has led to food shortage, water scarcity
and scarcity of other natural resources to a great extent. A census in 1973 counted 1.4
million people in Darfur; in 2003, it was almost 6.5 million, a nearly fivefold increase.44
This rapidly rising population has acted as a significant factor in this crisis.
Rainfed Agriculture: 75 per cent of the agriculture in this area is rain-fed.45 So,
the shortage of rainfall during the period of 1976-2005 has greatly contributed to the
demise in agricultural activities in Darfur and that ultimately led to food insecurity.
41
Ibid, p. 66.
42
Ibid.
43
Ibid.
44
Schuyler Null and Lauren Herzer Risi, “Navigating Complexity: Climate, Migration, and Conflict in
a Changing World”, available at https://www.wilsoncenter.org/sites/default/files/ecsp_navigating_
complexity_web_0.pdf, accessed on 11 October 2018.
45
Global Military Advisory Council on Climate Change, Climate Change & Security in Africa: Clear Risks,
Nuanced Impacts, Hague: Institute for Environmental Security, 2014.
199
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
The Fault Line Between Farmers and Herdsmen: There are broadly two groups
in Darfur – the African settled farmers and the Arabian nomadic herdsmen. These two
groups have been fighting against each other for more than seventy years, but the
severity of conflict increased after 1980s due to the impacts of climate change like soil
erosion, desertification, shortage of rainfall, floods and droughts.
4.1.3 Outcomes
Greater water and food insecurity coupled with shortage of natural resources
have ultimately led to the following outcomes in Darfur:
Resource Competition: Climate change has made natural resources much more
scarce which led to competition over water, agricultural land and other resources. A strong
link between resource competition and climate change is found by the UNEP report.
Migration: Food and water shortage, natural resource scarcity, local level
conflicts and several other economic, social and political factors have motivated
the people of Darfur to migrate to the adjacent places and in many cases, to the
neighbouring Chad and the Central African Republic.
200
EXPLORING THE ROLE OF CLIMATE CHANGE
Nigeria, where more than 150 million people reside within an area twice the
size of California, suffers from grave ethnic divisions, challenges towards development
and an incapable leadership.46 The state faces numerous impediments in fulfilling
its resource demand. Most of the violent conflicts that arise from failure to share
limited resources characterize the country’s social landscape — neighbour fighting
neighbour, Muslims fighting against Christians, patrons fighting against clients,
citizens fighting the state.47
The rising temperature and declining rainfall due to the changing climate
have led to frequent drought and desertification in Nigeria. The Sahara Desert is
annually expanding 1-10 km to all directions and trying to engulf the Sahelian region
of Africa.48 The shifting sand dunes have buried vast arable lands, thus reducing crop
production. This has instigated large-scale migration and relocation of people to areas
less vulnerable to desertification. Such migration has social effects like reduction of
social values and dignity. The most common outcome is communal clashes among
herdsmen and farmers and such conflicts resulted in the mortality of 186 people in
6 northern states of Nigeria between 1998 and 2006.49 Against this backdrop, the
security implications of climate change in the case of Nigeria are analyzed below.
The climate of Nigeria is changing rapidly and the following impacts are vivid
in the country:
Reduction in Rainfall: Parts of the country, especially the arid north, are
experiencing an intense combination of more heat and less rain. Some parts of the
northern Sahel region have witnessed less than 10 inches of rainfall on average in a
year in the past decade, 25 per cent less than that of thirty years back.50
46
United States Institute of Peace (USIP), Climate Change Adaptation and Conflict in Nigeria, Washington,
DC: USIP, 2011.
47
Ibid.
48
Peter AO Odjugo, “General Overview of Climate Change Impacts in Nigeria”, Journal of Human Ecology,
Vol. 29, No. 1, 2010, p. 50.
49
Ibid.
50
USIP, op. cit.
51
John Campbell, “National Security Implications of Climate Change”, available at https://www.cfr.org/blog/
national-security-implications-climate-change, accessed on 15 October 2018.
201
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
For this very reason, desertification was identified as one of the significant security
threats to the 11 northern states of Nigeria by the Federal government in 2002.
Flood: Though there is a scarcity of rainfall in the northern part of Nigeria, the
southern part has been experiencing much rainfall since 1970s. According to a study
conducted by Odjugo, in the past forty years, recorded volumes of torrential rains
increased 20 per cent across various southern states, some of which already witness
up to 160 inches of rainfall a year, with wet seasons persisting eight to ten months.52
For the increased rainfall, the southern part has experienced several numbers of
floods over the past forty years.
Climate change, along with several other social, political and economic
factors, has created food and water insecurity and scarcity of other natural resources in
Nigeria. The following non-climatic factors have contributed significantly in creating
an unstable scenario there:
Population Growth: Nigeria is populated with more than 200 million people
and it is already greater than that of the Russian Federation. This population is fastly
growing and it has augmented by 17.35 per cent over the last five years.54
Societal Fault Lines: There are more than 260 ethnic groups in Nigeria and
there are many differences among them which feed ethnic tension and strengthen
societal fault lines across the country. Moreover, the Nigerian government has hardly
taken any step to resolve this issue.
52
Peter AO Odjugo, “An Analysis of Rainfall Pattern in Nigeria”, Global Journal of Environmental Science, Vol.
4, No. 2, 2005, pp. 139–145.
53
Ibid
54
Campbell, op. cit.
55
USIP, op. cit.
202
EXPLORING THE ROLE OF CLIMATE CHANGE
4.2.3 Outcomes
Food and water insecurity, land loss and natural resource scarcity in Nigeria
have ultimately led to:
Conflict: Arable land loss due to climate change has been generating most
of the communal clashes since 1990s. According to Fasona and Omojola, 19 of the
37 cases during the period of 1991-2005 were basically crises/clashes triggered by
competition over land resources.56
Desertification, recurrent floods, droughts, acid rain, sea level rise, salinity
intrusion and reduction of rainfall along with various social, economic and political
factors have created food and water shortage, shortage of arable land and other
natural resources in Nigeria. Moreover, food and water insecurity and natural resource
scarcity have triggered communal clashes in the country. For such clashes, more than
10,000 people were killed within less than a decade.58 So, the outcomes of climate
change have had intense adverse effects on the security and stability of Nigeria.
Climate change has acted as a threat multiplier in the cases of Darfur and
Nigeria, and it has exacerbated the pre-existing vulnerabilities in those regions.
The analysis of these two cases will be helpful to understand the impacts of climate
change on security and stability of Bangladesh in the following discussion.
The following subsections analyze the impacts and role of climate change
as a threat multiplier in Bangladesh. The outcomes are evaluated in details later with
56
Fasona and Omojola, op. cit.
57
Center for American Progress, Climate Change, Migration, and Conflict in Northwest Africa: Rising Dangers
and Policy Options Across the Arc of Tension, Washington, DC: Center for American Progress, 2012.
58
Vivan Ezra Lekwot, Ali Andesikuteb Yakubu, Okafor Christian I. and Micheal Kingsley Balasom, “Climate
Change and Its Effect on National Security in Nigeria”, International Journal of Interdisciplinary Research and
Innovations, Vol. 2, No. 4, 2014, pp. 6-10.
203
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
relevant empirical data. Finally, the climate change-security nexus in the context of
Bangladesh is examined thoroughly.
Climate change impacts such as temperature rise, sea level rise, recurrent
droughts and cyclones, salinity intrusion, erratic rainfall, etc are already visible in
Bangladesh.
26.00
Temperature ( 0C)
25.60
25.20
24.80 Y= 10.480+0.008x
R-Square = 0.239
24.40
1948 1956 1964 1971 1979 1987 1995 2002 2010
59
IPCC, op. cit.
60
A. B. M. Shamim Ul Hasan and M. Zillurr Rahman, “Change in Temperature over Bangladesh Associated
with Degrees of Global Warming”, Asian Journal of Applied Science and Engineering, Vol. 2, No. 2, 2013, p. 162.
61
Ibid.
62
Hasan and Rahman, 2013, op. cit.
204
Figure 2.b: Trend of Monthly Mean Temperature Using Last 21 Years’ Data, 1990-201063
EXPLORING THE ROLE OF CLIMATE CHANGE
26.00
Temperature ( 0C)
25.75
25.50
25.25
Y=-15.563+0.021 x
R- Square = 0.246
25.00
1990 1993 1995 1998 2000 2003 2005 2008 2010
Year
The above mentioned figures clearly illustrate that the overall temperature
in Bangladesh has increased more rapidly in the recent years compared to the past.
Sea Level Rise: The AR5 of the IPCC confirms that Bangladesh is highly
vulnerable to rising sea level.64 A report of the Climate Change Cell reveals that the
range of sea level rise on Bangladesh’s coast over the past 30 years is 6-21mm/year.65
The rate of sea level rise in Bangladesh is much higher than the global average.
Moreover, about 10 per cent of its territory is below 1 meter sea level. The rapidly
rising sea level and the low elevation of its land make Bangladesh more vulnerable
compared to other countries.
Salinity Intrusion: Several studies have confirmed that climate change is one
of the main reasons behind salinity intrusion in the coastal area of Bangladesh. The
rate of soil and water salinity is increasing rapidly here. Out of about 1.689 million
hectares (30 per cent of the total cultivable land of Bangladesh) of coastal land, 1.056
million hectares are affected by soil salinity of varied degrees. In fact, during the
period of 1973-2009, about 0.223 million hectors of land (26.7 per cent of total land in
Bangladesh) was affected by varied degrees of salinity.66
Intense and Frequent Cyclones: Due to temperature rise and several other
factors, intensity and frequency of cyclones have increased significantly. 26 major
cyclones hit Bangladesh in the period of 1970-2015, with 18 of them occurring in the
63
Ibid.
64
IPCC, op. cit.
65
Ministry of Environment and Forests, Assessment of Sea Level Rise on Bangladesh Coast through Trend
Analysis, Dhaka: Ministry of Environment and Forests, 2016, p.53.
66
Soil Resource Development Institute (SRDI), Saline Soils of Bangladesh, Dhaka: SRDI, 2010, pp. 4-5.
205
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
last 20 years.67 Increased number of cyclones indicates that frequency has increased
rapidly. At the same time, intensity is also on the rise. The devastating cyclones of
1985, 1991, 1997, 2007 and 2009 indicate the validity of the previous statement.
30000
25000
20000
June
15000 July
August
10000 September
5000
0
2010 2011 2012 2013 2014 2015
67
Md. Selim Reza, “Climate Change Induced Migration: Future Challenges and Opportunities for Bangladesh”,
available at http://fairbd.net/climate-change-induced-migration-future-challenges-and-opportunities-
for-bangladesh/, accessed on 15 October 2018.
68
Sujit Sarker, “Unusual Rain: Climate Change to Blame”, available at https://www.thedailystar.net/country/
unusual-rain-climate-change-blame-136609, accessed on 15 October 2018.
69
Ibid.
70
Moinul Hoque Chowdhury, “Bangladesh Sees Highest Rainfall for 35 Years Recorded in April”, available at
https://bdnews24.com/bangladesh/2017/04/25/bangladesh-sees-highest-rainfall-for-35-years-recorded-
in-april, accessed on 15 October 2018.
71
Sarker, op. cit.
206
EXPLORING THE ROLE OF CLIMATE CHANGE
is a severe flood that may cover over 60 per cent of the country.72 The extent and
frequency of floods are likely to increase in the upcoming days due to sea level rise,
erratic rainfall and melting of Himalayan glaciers.73
Like the Darfur and Nigerian crises, impacts of climate change multiply
food shortage, water scarcity, health insecurity and natural resource scarcity in
Bangladesh. Although non-climatic factors, such as overpopulation, poverty and rain-
fed agriculture play a significant role in these regards as well, climate change plays the
most prominent part.
Food Insecurity: Erratic rainfall, recurrent floods, droughts, frequent cyclones, sea
level rise and salinity intrusion have already affected food production in Bangladesh due
to the fact that the agricultural sector here is heavily climate sensitive. Crop production
has declined significantly in many parts of Bangladesh due to the changing climate.
For instance, soil salinity decreases crop production about 0.13 million tons every year.
In future, increased frequency of extreme weather events, water scarcity, sea level rise
and salinity intrusion will certainly create greater food insecurity.75
72
Robert Glennon, “The Unfolding Tragedy of Climate Change in Bangladesh”, available at https://blogs.
scientificamerican.com/guest-blog/the-unfolding-tragedy-of-climate-change-in-bangladesh/, accessed
on 02 November 2018.
73
Ahsan Uddin Ahmed, Bangladesh Climate Change Impacts and Vulnerability: A Synthesis, Dhaka: Climate
Change Cell, 2006.
74
Abu Reza Md. Towfiqul Islam, Anjum Tasnuva, Subaran Chandra Sarker, Md. Masudar Rahman, Md. Sanaul
Haque Mondal and Md. Mujahid Ul Islam, “Drought in Northern Bangladesh: Social, Agroecological Impact
and Local Perception”, International Journal of Ecosystem, Vol. 4, No. 3, 2014, pp. 150-158.
75
Md. Mizanur Rahman and Amartya Kumar Bhattacharya, “Saline Water Intrusion in Coastal Aquifers: A
Case Study from Bangladesh”, IOSR Journal of Engineering (IOSRJEN), Vol. 4, No. 1, 2014, pp. 7-12.
76
Lia Sieghart and David Rogers, “Why Climate Change is an Existential Threat to the Bangladesh Delta”,
available at http://blogs.worldbank.org/endpovertyinsouthasia/why-climate-change-existential-threat-
bangladesh-delta, accessed on 15 October 2018.
207
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
valley glaciers resulting in the total loss of 10 per cent of glacier area.77 For the rapidly
melting glaciers, number of floods will increase in short-term, but it will ultimately
create greater water insecurity in Bangladesh in long run.
Land Loss: Land is one of the most important strategic resources for
Bangladesh. It is already scarce in this overpopulated country. Moreover, salinity
intrusion, sea level rise, coastal erosion and river erosion make land much more
insufficient. Due to sea level rise, more than half of Kutubdia, Bhola and Sandwip
islands have already submerged under water.78 On top of that, agricultural lands in
the coastal area of Bangladesh suffer from high salinity intrusion which prevents crop
production in the dry season and thus, reduces the usability of these lands.79
Health Issue: Climate change impacts like erratic rainfall, recurrent floods,
droughts, frequent cyclones, sea level rise and most importantly, salinity intrusion
create health insecurity for a number of individuals in Bangladesh. According to IPCC’s
AR5, Bangladesh is very vulnerable to climate-sensitive diseases like cholera, dengue,
diarrhea, hypertension, etc.80
5.3 Outcomes
77
“Recession of Himalayan Glaciers Alarming: ISRO”, available at https://indianexpress.com/article/
technology/science/recession-of-himalayan-glaciers-alarming-isro-scientists-4747260/, accessed on 15
October 2018.
78
BIISS and Saferworld, op. cit.
79
Mohammed Abdul Baten, Lubna Seal and Kazi Sunzida Lisa, “Salinity Intrusion in Interior Coast of
Bangladesh: Challenges to Agriculture in South-Central Coastal Zone”, American Journal of Climate Change,
Vol. 4, No. 3, 2015, p. 249.
80
IPCC, op. cit.
81
Reazul Ahsan, Jon Kellett and Sadasivam Karuppannan, “Climate Induced Migration: Lessons from Bangladesh”,
available at https://www.researchgate.net/profile/Dr_S_M_Reazul_Ahsan/publication/281549970_Climate_
Induced_Migration_Lessons_from_Bangladesh/links/55ed527a08ae3e121847ff82/Climate-Induced-Migration-
Lessons-from-Bangladesh.pdf, accessed on 04 November 2018.
82
Ibid, p. 7.
83
Ibid.
208
EXPLORING THE ROLE OF CLIMATE CHANGE
affected.84 Moreover, 8000 km of roads, 13 per cent of the total agricultural land and
2 major cities could be impacted.85 Most of the populace in these vulnerable coastal
districts will have no choice but to migrate to other parts of the country and find
alternative livelihood.86 It is obvious that seasonal migration has been a recognized
trend in Bangladesh for decades. But this seasonal migration is gradually turning into
permanent migration.87
Resource Competition: Water shortage, land loss and other resource scarcity lead to
resource competition in Bangladesh. Competition over arable land and water is already seen
in the coastal region. For example, although livestock do not suffer death during droughts
in Bangladesh, lack of drinking water multiplies their susceptibility to diseases.88 The density
of livestock in the coastal area is significantly lower than other parts of the country due to
high level of saline water.89 Rise in salinity has increased competition for freshwater resources
remarkably over time in the region.90 On top of that, shrimp farming became an adaptation
policy in the face of salinity intrusion in the coastal southwest.91 No matter how economically
sound such farming may look, the benefits are not shared among all members of the local
community equally.92 Majority of profits is earned by a small percentage of large absentee
landholders and by urban-based processing factory owners. The salinization of agricultural
lands via the intrusion of saline water used in shrimp ponds compromises the fertility of the
soil for current and future agricultural cultivation.93 Besides, the extremely low amount of
labour required for shrimp production relative to rice farming causes a labor surplus. It leads
to displacement from agricultural livelihoods, forcing many landless labourers to shift to
cities in search of work. As a result, there is significant opposition to shrimp farming among
local residents who perceive it as a threat to their continued habitation in this region.94
Competition over land usage now continues without any viable solution in the near future.
Any possibility that competition over resources, freshwater and land for example, will fade
out seems unrealistic in the face of increasing climate change impacts.
84
Ibid.
85
Ibid.
86
Authors’ interview with Mohammad Rashed Alam Bhuiyan, Assistant Professor, Department of Political
Science, University of Dhaka, 2017.
87
Bahauddin K.M, Marianne Joan Dutkiewicz and Mrinal K Nath, “Climate Change-induced Migration in
Bangladesh: Realizing the Migration Process, Human Security and Sustainable Development”, available
at https://sustainabledevelopment.un.org/content/documents/1014764_Bahauddin_Climate Change-
induced Migration in Bangladesh_Realizing the Migration Process_Human Security and Sustainable
Development.pdf, accessed on 15 October 2018.
88
Ahmed, op. cit.
89
Ibid.
90
Ibid.
91
Kasia Paprocki and Saleemul Huq, “Shrimp and Coastal Adaptation: on the Politics of Climate Justice”,
Climate and Development, Vol. 10, No. 1, 2017, p. 2.
92
Ibid.
93
Ibid.
94
Ibid.
209
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
95
“Hasina Highlights Unfortunate Plight of Climate Migrants”, The New Nation, 25 September 2010.
96
Authors’ interview with Ms. Monzima Haque, Lecturer, Department of International Relations, University
of Dhaka, 2017.
97
Sieghart and Rogers, op. cit.
98
“Bangladesh: Economics of Adaptation to Climate Change Study – Bangladesh”, available at https://
reliefweb.int/report/bangladesh/bangladesh-economics-adaptation-climate-change-study, accessed on
04 November 2018.
99
Ibid.
100
Md. Nurul Islam, “Climate Change and its impact on Bangladesh”, available at http://www.bmet.org.bd/
BMET/resources/Static%20PDF%20and%20DOC/publication/Brief%20on%20Climate%20Change-%20
Impact%20on%20Bangladesh.pdf, accessed on 04 November 2018.
101
Ibid.
210
EXPLORING THE ROLE OF CLIMATE CHANGE
Climate change, along with socio-economic and political factors, has the
potential to play a significant role in migration, resource competition, political
destabilization and economic underdevelopment in Bangladesh.
The above discussion reveals that climate change and national security can
be closely linked with each other in the case of Bangladesh. The possible linkages
between them are as following:
(i) Sea level rise already submerged more than half of three islands in
Bangladesh. As sea level is rising rapidly (6-21mm/year) compared to the
rest of the world, it is in fear of losing vast territory in future. According to
IPCC, a 45cm sea level rise will submerge 10.9 per cent of its territory and
force about 20 million people to relocate. Sea level rise has the potential
to adversely affect national security of Bangladesh.
(ii) Climate change impacts, such as temperature rise, sea level rise, recurrent
droughts and cyclones, salinity intrusion, erratic rainfall, etc act as threat
multipliers to create food and water shortage and resource scarcity.102
Human security is undermined by all of them significantly. Ensuring
human security through providing sufficient food, water and other
resources to its ever growing population is one of the biggest challenges
for the state apparatus of Bangladesh.103
102
Food and Agriculture Organization (FAO) of the United Nations, Climate Change, Water and Food
Security, Rome: FAO, 2011; “Climate change and resource scarcity”, available at https://www.pwc.co.uk/
issues/megatrends/climate-change-and-resource-scarcity.html, accessed on 31 October 2018.
103
James Michel, “Human Security and Social Development Comparative Research in Four Asian Countries”,
available at http://siteresources.worldbank.org/INTRANETSOCIALDEVELOPMENT/Resources/Michel.rev.
pdf, accessed on 31 October 2018.
104
Authors' interview with Dr. Niaz Ahmed Khan, Professor, Department of Development Studies, University
of Dhaka, 2017.
211
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Based on all the issues discussed so far, it is evident that several components of
national security are at stake to varying extents due to climate change in Bangladesh.
Sovereignty and territorial integrity of Bangladesh are likely to be jeopardized in the
cases of Kutubdia, Bhola, Sandwip and the Bay of Bengal. The safe and sound livelihood
of the population is challenged by competition over resources like freshwater and
arable lands. Political stability is estimated to get disturbed through climate change-
induced migration and economic underdevelopment. Last but not the least, social
development in Bangladesh can suffer from extreme-weather events.
The research questions put forward at the very beginning of this paper have been
answered throughout the study. To sum it up, unregulated migration, resource competition,
political instability and economic underdevelopment are the prevailing impacts of climate
change in Bangladesh, all of which can obliquely threaten the country’s national security by
instigating social tensions, local clashes, and adverse consequences to GDP.
Threat Multiplier
Food Insecurity
Water Seacity
Natural Resource Shortage
Land Loss
Resource Competiton
Underdevelopment
Migration
Political Destabilization
Social Unrest
Destabilization in Governmental Intitutions
National Insecurity
Source: Authors.
212
EXPLORING THE ROLE OF CLIMATE CHANGE
6. Concluding Remarks
213
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
214
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018: 215-234
Abstract
1. Introduction
Md. Jahan Shoieb is Research Fellow at Bangladesh Institute of International and Strategic Studies (BIISS).
His e-mail address is: jshoieb@gmail.com
© Bangladesh Institute of International and Strategic Studies (BIISS), 2018.
1
Bruce Klopfenstein, “Terrorism and the Exploitation of New Media”, in Anandam P. Kavoori and Todd Fraley
215
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
In the past, reliance on mass media for disseminating terrorist ideology to mass
people and terrorists’ sympathizers was one of the key features of global terrorism. In
fact, some people still believe that there is an intrinsic relationship between terrorism
and mass media. Apparently, without media’s involvement, the impact of terrorism is
wasted, remaining narrowly to the immediate victims rather than reaching a wider
target audience at whom the terrorist group’s violent act is aimed.5 Thus, most of
the terrorist groups previously used media as a part of their tactics. Terrorist groups
needed the help of the media, and media, on the contrary, had to rely heavily on
them to get sensational news for boosting up their Target Rating Point (TRP). Terrorist
groups sought publicity for their acts and they believed that mass media can quickly
spread their news and views to a wide range of audience, which they could not do
by themselves. However, heavy reliance on mass media started to decline with the
invention of the internet and more specifically with the wide expansion of internet-
based social networking websites.
(eds.), Media, Terrorism, and Theory, Maryland, USA: Rowman & Littlefield Publishers, Inc., 2006, p. 108.
2
Michael Kenny, “Beyond the Internet: Mtis, Techne, and the Limitations of Online Artifacts for Islamist
Terrorist”, Terrorism and Political Violence, Vol. 22, No.2, 2010, pp. 204-222.
3
Victor W. Pickard, In Todd M. Schaefer and Thomas A. Birkland (eds.), The Encyclopedia of Media and Politics,
Washington, DC: CQ Press, 2007, pp. 12-13.
4
Ibid.
5
Bruce Hoffman, Inside Terrorism, New York: Columbia University Press, 1998, p. 174.
216
ROLE OF INTERNET
Since 1980s, internet has become one of the most popular and effective
means of communications, reaching a larger group of audience worldwide. Internet
made it possible for an individual to transfer his or her messages with anonymity,
effectively and quickly to an almost huge and limitless audience. Nowadays, terrorist
groups can disseminate their activities bypassing mainstream media outlets by
using internet and different social networking websites. This has helped them reach
their audiences in a more clandestine, subtle and safer way. Thus, the volume of
recruitment of new terrorists as well as terrorist incidents have increased profoundly
in recent years. Although the total number of casualties from terrorism has decreased
in recent years, the impact of it remains omnipresent. In 2017, 67 countries witnessed
at least one death due to terrorism, which is the second highest number of countries
experiencing one death in the past twenty years. In the same year, 19 countries
experienced hundred deaths from terrorism and five countries recorded more than
a thousand.6 Online radicalization is a big threat for the countries as online platforms
amplified radical messages throughout Western Europe and North America containing
Islamophobia and xenophobic sentiments by 50 far-right organizations.7
The existing literature on global terrorism suggests that the goals and
motivations of terrorist groups vary widely from the particular aim of re-establishing
or reuniting a national homeland to the unification of a separated nation. The
rapid pace of globalization, the expansion of internet and other communication
technologies have helped overcome the time-space constraints for terrorists and
brought their war to the ‘virtual’ level. The current generation is massively influenced
by telecommunication technologies, such as internet, mobile phone, and computer.
Nowadays, internet and various social networking sites such as Facebook, Twitter
and YouTube have become the main sources of communication for terrorist groups.
6
Institute for Economics and Peace, Global Terrorism Index 2018: Measuring the Impact of Terrorism, Sydney,
November 2018, available at http://visionofhumanity.org/app/uploads/2018/12/Global-Terrorism-
Index-2018-1.pdf, accessed on 09 January 2019, p. 2.
7
Ibid, p. 47.
8
Raphael Perl, “Trends in Terrorism: 2006”, CRS Report for Congress, 12 March 2007, available at https://fas.
org/sgp/crs/terror/RL33555.pdf, accessed on 01 November 2018.
217
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Terrorists and insurgents can use such sites to reach their audience bypassing
mainstream media. Arguably, a website used by any terrorist group is organized quite
similar to any other organization’s virtual presence. For instance, website Al Hesba
Discussion Forum (www.alhesbah.org) or Syrian Islamic Forum works as platforms
from where viewers from around the world can receive breaking news from Iraq, get
links to videos of active extremist campaigns, watch motivational imagery of martyr
operatives in heaven, and also download subject-based discussions and speeches.9
Weimann identifies that today, almost all terrorist groups (more than 40) have their
own website and even many terrorist groups maintain more than one website and
use different languages.10 Moreover, terrorist groups nowadays find it difficult to
convey their messages through mainstream media channels because of governments’
constant vigilance. For example, in 2016, the Government of Singapore banned a
newspaper published by a media agency affiliated with the Islamic State (IS).11 This
type of incident may also work as a catalyst for terrorists’ resorting to the internet-
based alternative media.
On the contrary, the internet-based media also has the potential to work in the
global counterterrorism endeavour. For example, in May 2012, the Center for Strategic
Counterterrorism Communications of the United States (US) responded within a very
short time (48 hours) to counter advertisements promoting extremist violence posted
on various internet sites by Al-Qaeda in the Arabian Peninsula (AQAP). The center came
with counter-advertisements on the same websites featuring an opposite version of
that same message. It also uses various websites, such as Facebook and YouTube, for
disseminating counter-narrative messages.12
Given this context, the objective of this paper is to examine the role of
internet-based alternative media in global terrorism and counterterrorism. The key
research questions the paper addresses include: How terrorist groups use internet
as an alternative media to reach their audiences? Why terrorist groups resort to
the internet-based alternative media? Can internet also be used in countering
terrorism? To answer these questions, the paper is divided into five sections. After
the introduction, the second section discusses how terrorist groups use internet to
reach their audiences. The third section elaborates the causes behind terrorist groups
using internet-based alternative media. Section four focuses on the use of alternative
media in countering terrorism. The fifth and final section concludes the paper with
9
Jarret M. Brachman, “High-Tech Terror: Al-Qaeda’s Use of New Technology”, The Fletcher Forum of World
Affairs, Vol. 30, No. 2, Summer 2006, p. 151.
10
Gabriel Weimann, “Virtual Disputes: The Use of the Internet for Terrorist Debates”, Studies in Conflict &
Terrorism, Vol. 29, No. 7, 2006, p. 624.
11
Lim Yan Liang, “Government bans newspaper published by ISIS”, The Straits Times, 22 July 2016, available
at https://www.straitstimes.com/singapore/government-bans-newspaper-published-by-isis, accessed on
08 January 2019.
12
United Nations Office on Drugs and Crime (UNODC), The Use of the Internet for Terrorist Purposes, New York:
United Nations, 2012, p.13.
218
ROLE OF INTERNET
The first terrorist group to exploit the benefits of internet was the Zapatista
National Liberation Army (EZLN) which is popularly known as the Zapatistas. Notably,
the group is an insurgent movement. It first started using internet to convey its
messages in 1990s, and later other insurgent movements and terrorist groups
emulated the group’s tactics. Nowadays, almost without exception, all major terrorist
and insurgent groups have their own websites. A researcher of the US government’s
Foreign Broadcast and Information Service (FBIS), who works in the effectiveness
of internet, has observed, “These days, if you are not in the web, you don’t exist”.13
Gabriel Weimann mentioned that “the story of the presence of terrorist groups in
cyberspace has barely begun to be told”.14 He found that in 1998, less than half of the
thirty terrorist groups that the U.S. State Department designates as Foreign Terrorist
Organizations (FTO) had their own websites, but by the end of 1999, nearly all of them
have.15 In 1990s, some technological developments offered terrorist groups an ample
opportunity to break the monopoly of commercial and state-owned media. These
developments include the use of internet, different types of electronic cheap, video
production and editing system and private radio and television stations owned by
terrorist groups.16 Among these developments, the internet undoubtedly brought
a phenomenal change for the terrorist groups. The figure below illustrates various
usages of internet by terrorists and terrorist groups.
13
Bruce Hoffman, op. cit., p. 206.
14
Gabriel Weimann, Terror on the Internet: The New Arena, the New Challenges, Washington, D.C.: United
States Institute of Peace, 2006, p. 16.
15
Ibid.
16
Bruce Hoffman, op. cit., pp. 200-201.
219
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Propaganda
Communication Radicalization
Planning and
and Execution Recruitment
Terrorists’
Use of the
Internet
Financing Training
As can be seen in Figure 1, terrorists mainly use internet for five purposes.
These include spreading propaganda through different websites, radicalize potential
individuals and recruit them to the respective group, provide training to group
members, financing or fundraising and last but not the least communication, planning
and executing a particular attack.
Terrorists and insurgent groups utilize internet and use their own media in a
subtle way to fulfill their objectives. They use internet for different purposes ranging
from disseminating of propaganda to the recruitment, training, financing, planning
and execution. In today’s world, terrorists can easily broadcast their messages in a
simple way. For example, using simple video cameras, terrorists can easily articulate
their own messages and then can publish them on their own websites or social
media. Moreover, they have ample opportunities to publish whatever they want on
their internet sites. There are three major tasks terrorists are doing using the internet:
a) adoption of a violent extremist ideology or online radicalization, b) recruitment in
220
ROLE OF INTERNET
Despite the fact of diversity and multiplicity of terrorist websites, there are a number
of common characteristics among them. Usually, these websites have well-designed,
colourful, and visually attractive graphics content. These websites chart a particular group’s
name and its brief history as well as its aims and objectives. In many cases, these sites also
contain short biographies of its founders, leaders and key personnel. Terrorist websites
usually target three types of audiences: potential and current supporters, global public
opinion and enemies.19 Interestingly, despite comprehensive counterterrorism campaign
and the war on terror, the number of extremist websites has grown significantly. Next few
paragraphs will shed light on how terrorist groups use internet as an alternative medium
to convey messages to their audiences bypassing mainstream media outlets.
In fact, one of the most important and primary purposes of using internet by
terrorist groups is to disseminate their propaganda. Terrorist groups usually transform
different types of propaganda by providing justifications or promotion of terrorist
activities, disseminating ideological or practical instructions and explanations.21 Their
propaganda includes presentations, virtual messages, magazines, audio and video files,
treatises and video games prepared by terrorist organizations or their sympathizers. It
17
Maura Conway, Moign Khawaja, Suraj Lakhani,Jeremy Reffin, Andrew Robertson and David Weir,
“Disrupting Daesh: Measuring Takedown Of Online Terrorist Material And Its Impacts”, 2017, p. 8, available
at http://www.voxpol.eu/download/vox-pol_publication/DCUJ5528-Disrupting-DAESH-1706-WEB-v2.pdf,
accessed on 20 September 2018.
18
Jarret M. Brachman, op. cit.
19
Gabriel Weimann, “How Modern Terrorism Uses the Internet”, United States Institute of Peace, Special
Report 116, March 2004, p. 1.
20
Bruce Hoffman, op. cit., p. 198.
21
UNODC, op. cit., p. 3.
221
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
is crucial for any terrorist group to communicate its ultimate intentions behind terrorist
activities. In many cases, the mere threat of terrorist acts can serve the same purpose of an
actual incident if it can generate the similar fear in the psyche of a target audience. In fact,
without properly disseminating the terrorists’ causes, the corresponding impact would be
substantially reduced.22
Different terrorist groups use internet not only as a means of passing their
extremist rhetoric, ideologies and videos but also to develop a relationship with the
solicit support base for their targeted group. Usually, terrorists use platforms, such as
password-protected websites and restricted chat groups as a clandestine means of
personnel recruitment. Access to internet has helped the extremist and terrorist groups
recruit a new workforce from a global scope of potential recruits. Prior to the recruitment,
terrorist groups primarily target marginalized segment of a society and the process of
radicalization and recruitment generally capitalizes on individual sentiments of exclusion,
injustice or humiliation.
22
Bruce Klopfenstein, op. cit., p. 107.
23
Jasmine Jawhar, Terrorists Use of the Internet: The Case of Daesh, Ministry of Foreign Affairs: Malaysia, 2016,
p. 33.
24
Peter Chalk, “The Tigers Abroad: How the LTTE Diaspora Supports the Conflict in Sri Lanka”, Georgetown
Journal of International Affairs, Vol. 9, No. 2 (Summer/Fall), 2008, pp. 97-104.
222
ROLE OF INTERNET
It is also evident that online recruitment materials are often translated into
different languages including English and French. Terrorist groups usually do it to attract
supporters in western countries. This method used by Al Qaeda and other terrorist
groups has been proven much effective and terrorist groups have become successful in
transforming many ordinary people into obedient actors who carry out terrorist acts on
command.27
25
Michael Kenny, op. cit.
26
Dana Janbek and Valerie Williams, “The Role of the Internet Post-9/11 in Terrorism and Counterterrorism”,
The Brown Journal of World Affairs, Vol. XX, Issue 11, Spring/Summer 2014, p. 298.
27
Rosanna E. Guadagno, Adam Lankford, Nicole L. Muscanell, Bradley M. Okdie and Debra M. McCallum,
“Social Influence in the Online Recruitment of Terrorists and Terrorist Sympathizers: Implications for Social
Psychology Research”, Revue internationale de psychologie sociale, Vol. 23, No. 1, 2010, pp. 25-56, available
at https://www.cairn.info/revue-internationale-de-psychologie-sociale-2010-1-page-25.htm, accessed on
07 October 2018.
223
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
identity theft, credit card theft, stock fraud, wire fraud, auction fraud or intellectual
property crimes.28
To find out a potential donor, terrorists or terrorist groups take the assistance
of internet user demographics which allow them to identify users having sympathy
to a particular issue or cause. Then these people are asked to make donations, usually
through emails sent by a front group (an organization which supports the terrorists’
aims, but operates legally and publicly having no direct link with the terrorist
organization).29 Mentionably, financial support to some charity organizations are
also used for illicit purposes. Terrorist groups claim humanitarian support hiding their
identity while they use the fund for terrorist purposes. Some groups who use their
charitable organizations for terrorist funding include the Global Relief Foundation,
Benevolence International Foundation and the Holy Land Foundation for Relief and
Development. All of these groups use fraud method to finance terrorist groups in
the Middle East.30 Even for Irish Republican Army (IRA), visitors can make credit card
donations in the group’s own website.31 In a nutshell, internet offers a global reach
and a certain degree of security and anonymity for both donors and recipients.32
28
UNODC, op. cit., p. 7.
29
Gabriel Weimann, “How Modern Terrorism Uses the Internet”, op. cit., pp. 7-8.
30
UNODC, op. cit., p. 7.
31
Gabriel Weimann, “How Modern Terrorism Uses the Internet”, op. cit., p. 7.
32
Michael Jacobson, “Terrorist Financing on the Internet”, CTC Sentinel, Vol. 2, Issue 6, June 2009, p. 17.
33
Brynjar Lia, “Doctrines for Jihadi Terrorist Training”, Terrorism and Political Violence, Vol. 20, Issue 4, pp.
518-542.
34
Thomas Hegghammer, “Terrorist Recruitment and Radicalization in Saudi Arabia”, Middle East Policy, Vol.
XIII, No. 4, Winter 2006, pp. 39-60.
35
UNODC, op. cit., p.8.
224
ROLE OF INTERNET
Although terrorist groups like Al Qaeda and IS have no virtual training camps,
online training courses organized by the Jihobbyists provide an opportunity for
newcomers to learn more about the operational activities of global jihad. In these days,
the e-learning courses of Al Qaeda are more organized than the past, which contain
more audio-visual materials, as well as written learning materials. Previously, Al Qaeda
transmitted its ideology and training through direct contact but from the 1990s, the
terrorist group started documenting its training materials. The most notable work is the
Encyclopaedia of Jihad, which is the first collection of that type. This one is primarily a
collection of all written experience of the veterans of the Afghan-Soviet jihad to make sure
that their knowledge is not lost for the future jihadists.36 The Encyclopaedia of Preparation
probably is a comprehensive collection of internet-based training manual. The editor
of this encyclopedia is a person whose nickname is Ibn Turab, who was previously an
active member of Al Qaeda’s radical forum al-Ma’sada al-Jihadiyya.37 The editor of the
encyclopedia mentioned that the purpose of writing the encyclopedia is to improve
the military knowledge for mujahedeen to enable them to re-establish the Caliphate
(Encyclopedia of Preparation). The online training material provided in this encyclopedia
was not prepared for a specific region or group. The origin of the documents used in the
encyclopedia comes from diversified sources: manuals written mainly by the Afghan war
veterans and some other written by the Palestinian veterans and a couple of internet
activists with the least battle experience. However, there are many instructional videos
available online are mainly produced by another group, Hezbollah.38
The Islamic Media Centre (IMC) is another well-known media outlet to issue
training materials for terrorists. It has been working since the 1990s and broadcasting
training materials on CDs and later through internet. Oussama Kassir, one of the key
figures of the IMC has an allegation of taking training from Lebanon, Afghanistan and
Kashmir and fighting in Afghanistan against the Union of Soviet Socialist Republics
(USSR). He visited the US in 1999 with a view to setting up a training camp in the US, along
with some other key figures like Abu Hamza and others. Moreover, since 2002 he has
been operating various websites linked with the IMC.39 The IMC had wide network and
access to numerous materials written by experienced commanders. Moreover, for their
sympathizers, they translated a large number of US Army Field Manuals into the Arabic
language.
36
Ali H. Soufan, The Black Banners: The Inside Story of 9/11 and the War Against Al-Qaeda, New York: Norton,
2011.
37
Anne Stenersen, “The Internet: A Virtual Training Camp?”, Journal of Terrorism Research, Vol. 3, No. 2, p.
218.
38
Ibid.
39
Thomas Hegghammer, op. cit., p. 41.
225
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
tactics. Internet network helps terrorist groups build a sense of virtual community among
individuals from all over the world, encouraging the creation of new networks for the
distribution of instructional and inspirational materials.
The history of criminology suggests that nowadays almost every terrorist incident
involves the use of internet technology. Use of internet becomes crucial for terrorist groups
when planning of a terrorist incident involves remote communication among multiple
actors. In some cases, terrorist groups use internet to successfully identify a potential target
for a terrorist attack. The planning and execution process includes obtaining instructions
of attack to collect available information from different sources about the possible target.
Multiple uses of internet to bridge distances and scattered geographical areas and a vast
amount of public information on internet made it a key tool in planning and executing
terrorist activities.
Use of internet has also facilitated terrorist groups to execute different terrorist
activities with more accuracy. For instance, explicit threats of violence, including the threat
of using weapons may be transmitted through internet to generate fear or panic among
mass people. Internet technology also has facilitated the acquisition of weapons, explosives
or other materials necessary for the execution of an attack. Sometimes terrorists use
e-commerce service to purchase required materials. In some cases, terrorist organizations
undertake cyber attacks by deliberate exploitation of the computer networks.
Terrorists also use internet while communicating during the process of planning
a particular attack. An example can be provided in this regard. Najibullah Zazi, responsible
person for planning an attack on the New York subway system in 2009, communicated
with his contact in Pakistan using email to outline the attack. In addition to that, another
person involved in the incident from the UK exchanged messages regarding the making
of bombs and the progress of the plot using coded language. This example illustrates that
internet was used by terrorists to communicate details of planning and executing the
attack.40
Although in recent years, terrorist groups get most of the instructions and
training materials from online sources, till date there has been few numbers of empirical
criminology researches have been done on the topic. However, one key aspect is clear
that both terrorism and internet impact profoundly in contemporary terrorism studies
and they often shake our everyday life and the functioning of the micro and macro level
40
Dana Janbek and Valerie Williams, op. cit., p. 301.
226
ROLE OF INTERNET
economic, social and political systems.41 Previously, terrorist groups used three main
ways to conduct their communication process: a) clandestine or rebel radio stations b)
underground posters, newspapers, flyers and other publications, and c) commercial,
conventional or state-owned media (e.g., radio, television and newspaper).42 Gabriel
Weimann identifies some reasons which work as catalysts for terrorist groups in using
internet. These are:
41
Gary LaFree, “Terrorism and the Internet”, Criminology & Public Policy, Vol. 16, Issue 1, 2017, pp. 1-6.
42
Bruce Hoffman, op. cit., p. 199.
43
Gabriel Weimann, “Virtual Disputes: The Use of the Internet for Terrorist Debates”, op. cit., p. 624.
44
UNODC, op. cit., p. 8.
227
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Even before the 9/11 incident, Al Qaeda and other terrorist groups had a tendency
of exploiting the advantages of modern technologies. Al Qaeda leaders Osama Bin Laden
and Ayman al-Zawahiri recognized the importance of these developments. Especially,
Osama Bin Laden noted the satellite-based propaganda and rhetoric, both are equally
important as cruise missiles and unmanned bombers.45 Al Qaeda’s virtual dependency
even became more central to its strategy after losing its Afghan base. Peter Bergen,
therefore, labelled this strategy of Al Qaeda as “Al Qaeda 2.0.” 46
Internet has become one of the easiest and safest modes to spread terrorist
ideology. Nowadays, the battlefield is no longer the primary place for war. Rather the
net-based warfare is now the eminent battleground. Anyone using internet can connect
YouTube and other social networking websites from anywhere around the world to
upload as well as download videos to share an ideology with local communities, diaspora
and to the rest of the world. The online-based media provides a comparatively safe mode
45
Marc Lynch, “Al Qaeda’s Media Strategies”, The National Interest, No. 83, Spring 2006, pp. 50-56.
46
Ibid.
228
ROLE OF INTERNET
for the dissemination of radical ideas unlike conventional communication tools, such as
books, newspapers, leaflets or VCDs as it does not leave any kind of physical evidence and
is a more reliable mode to reach a much wider range of audience.47 Nowadays, internet
is flooded with contents pertinent to extremism and terrorism. Table 1 provides an idea
about the quantities of radical materials available online:
The table indicates that these days internet is flooded with terrorist contents
easily accessible to all. If terrorists have access to internet, they tend to get the advantage
of technology. By using online method they can reach a wide range of their audience,
which is quite impossible through the oral tradition developed over the years. For
example, terrorist groups in Iraq pass their messages through online that constantly goes
up and down. They try to convince the Iraqi population that their insurgency method is
doing better. This is how terrorist groups manipulate the advantages of internet.
47
Virginie Andre, “Neojihadism’ and YouTube: Patani Militant Propaganda Dissemination and Radicalization”,
Asian Security, Vol. 8, No. 1, 2012, pp. 27-53.
48
Christopher S. Stewart and Mark Maremont, “Twitter and Islamic State Deadlock on Social Media Battle-
field”, The Wall Street Journal, 13 April 2016, available at https://www.wsj.com/articles/twitter-and-islamic-
state-deadlock-on-social-media-battlefield-1460557045, accessed on 08 January 2019.
49
Hisham Melhem, “Keeping Up with the Caliphate: An Islamic State for the Internet Age”, Foreign Affairs,
November-December 2015.
229
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
In recent years, along with various terrorist groups, lone wolf terrorists50 are also
using internet to spread terrorism. Notably, lone-wolf terrorism has become one of the
fastest growing terrorist categories in recent years. Europol published a terrorism situation
and trend report in April 2012, which highlighted the propensity of using internet by
terrorists. The report narrated that for extremist groups, internet has become the ‘principal
means of communication’, therefore, their ‘substantial online presence’ is viewed. Besides
the use of propaganda, fundraising, planning and recruitment, terrorist groups use
internet for ‘cyber attacks’ on the operating systems of the European Union (EU) member
states.51
Terrorists and terrorist groups tend to harness the opportunities of the interactive
capabilities of internet, including instant messenger, blogs, chat rooms, video sharing
websites and other social networks. A statistic suggests that in these days about 90
per cent of the terrorist incidents occur using the social networking websites whether
it is Paltalk, independent bulletin boards or Yahoo.52 These social networking sites help
terrorists to hide their identities and create direct contact with perpetrators or mastermind
of a terrorist attack. The massive expansion of the lone-wolf terrorists in these days poses
a major challenge to the issue of counterterrorism steps. In fact, the lone-wolf terrorists
offer a nightmare for organizations who work for counterterrorism. According to Global
Terrorism Index 2017, terrorist groups exploit internet and social media, mainly to influence
public opinions, instigate communal tensions, radicalize young people and recruit cadres
and cyber warriors to carry out cyber espionage, cyber-attacks and hacking.53 A RAND
corporation research outcome suggests that internet enhances opportunities to make
people radicalized as it is easily accessible to many people. The second aspect it found
that internet acts as an ‘echo chamber’ for extremist beliefs.54
There are some other reasons for using internet by terrorist groups. Bilveer
Singh states that internet helps terrorists bypass national laws. Terrorists tend to
take advantage of the weak legal system to spread terrorism where internet works
as a unique platform for them.55 He gave an example of Indonesia and noted that
50
This type of terrorists are individuals or a small group of individuals who are radicalized through the
internet and are ready to plot the preparation for attacking in the dark. In recent years, the lone-wolf
terrorists are flourishing in many countries, including the US, France, Germany, Canada, Italy, Spain,
Denmark, Portugal, Great Britain, Sweden, Norway and Poland.
51
Gabriel Weimann, “Lone Wolves in Cyberspace”, Journal of Terrorism Research, Vol. 3, Issue 2, Autumn 2012,
p. 80.
52
Ibid., p. 84.
53
Institute for Economics and Peace, Global Terrorism Index 2017: Measuring and Understanding the
Impact of Terrorism, p. 100, available at https://reliefweb.int/sites/reliefweb.int/files/resources/Global%20
Terrorism%20Index%202017%20%284%29.pdf, accessed on 01 November 2018.
54
Ines von Behr, Anaïs Reding, Charlie Edwards and Luke Gribbon, Radicalisation in the Digital Era: The Use
of the Internet in 15 Cases of Terrorism and Extremism, 2013, available at https://www.rand.org/content/dam/
rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf, accessed on 14 November 2018.
55
Bilveer Singh, “Countering Online Extremism – A Perspective on the Indonesian
Case”, Lecture given at the Workshop on Extremism and Terrorism Online: A Multidisciplinary Examination
230
ROLE OF INTERNET
the country’s legal system is relatively weak to deal online radicalization which
led to terrorists taking advantage of the situation.56 According to Jasmine Jawhar,
many reasons why terrorist groups use internet including: easy access to internet
with little technical knowledge of making a website, anonymity of communication,
communicating with like-minded people, an easy source of revenue where donations
can be obtained bypassing national law, etc.57
Despite the fact that terrorist groups have developed many routes to use internet
as an alternative media, it also provides an ample opportunity for gathering intelligence
and other activities to prevent and counter the threats of terrorism. Internet helps gather
evidence for bringing terrorists under jurisdiction. Moreover, frequent use of internet by
potential terrorists unintentionally makes themselves visible in front of the national and
international counterterrorism community.58
The EU model can be a good example for countries using internet as a tool in
combating terrorism. The EU Internet Forum was launched in 2015 with a view to stopping
the use of internet by terrorists. Notably, the EU Internet Forum was comprised of EU Home
Affairs Ministries, the internet industry and all other related stakeholders with a view to
working in a partnership to address the complex problem and protect the citizens of the
EU. The forum started its journey with two main objectives: to restrain accessibility to
terrorist content online and to enable the civil society that it can help increase the volume
of effective counter-narratives online. On December 2016, at the EU Internet Forum,
internet companies announced the creation of a shared ‘Database of Hashes’ to detect
more proficiently terrorist elements on social media. On the same occasion, the EU Civil
Society Empowerment Programme was initiated to develop effective counter-narrative
campaigns. To that end, the EU allocated €6 million in support of those campaigns.59
The US also deployed its law enforcement, intelligence and different security
agencies in countering terrorism by increasing surveillance on communications
and online activity. Particularly the Joint Terrorism Task Force (JTTF) has increased
partnerships from 35 to over 100. According to the Federal Bureau of Investigation
(FBI), “JTTFs have been instrumental in breaking up cells…[and] they’ve foiled attacks
on the Fort Dix Army base of New Jersey, on the JFK International Airport in New
of Current Trends and Challenges, 14 October 2014, Singapore, cited in Jasmine Jawhar, op. cit, p. 19.
56
Ibid.
57
Jasmine Jawhar, op. cit.
58
Dana Janbek and Valerie Williams, op. cit.
59
European Commission, “Fighting Terrorism Online: Internet Forum Pushes for Automatic Detection of
Terrorist Propaganda”, 06 December 2017, available at http://europa.eu/rapid/press-release_IP-17-5105_
en.htm, accessed on 01 October 2018.
231
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
York, and on various military and civilian targets in Los Angeles.”60 Moreover, the FBI
has taken its investigative approach to more intelligence-led strategies and proactive
nature to combat terrorist attack prior to the real incident. It implements a number
of undercover tactics on internet. For example, it creates parallel terrorist recruiting
websites which are convincing enough to attract potential terrorists. A testimony of
the US’ proactive role can be found from Abdella Ahmad Tounisi’s case. When the 18-
year old young man was searching internet for terrorist group Jabhat al-Nusra, an
Al Qaeda branch in Syria, he found a site which was created and maintained by the
FBI. When Tounisi communicated the website’s recruiter, who was originally an FBI
agent, both of them exchanged email messages and the teen revealed his plan to
engage in jihad in Syria. In the end, the FBI became able to arrest Tounisi in 2013 at
Chicago O’Hare International Airport just before his departure to Syria.61 However,
online surveillance has become a concern for citizens and civil society organizations
in the US. The National Security Agency (NSA) of the country was accused of engaging
in online surveillance without any specific allegation or merely based on individual
suspicion and spying on the country’s citizens despite its commitment to monitoring
only specific foreign citizens.62
60
Federal Bureau of Investigation (FBI), “Joint Terrorism Task Forces”, available at https://www.fbi.gov/
investigate/terrorism/joint-terrorism-task-forces, accessed on 02 October 2018.
61
Dana Janbek and Valerie Williams, op. cit., pp. 302-303.
62
Alex Adbo and Jameel Jaffer, “How the NSA’s Surveillance Procedures Threaten Americans’ Privacy,”
Free Future, 21 June 2013, available at https://www.aclu.org/blog/national-security/secrecy/how-nsas-
surveillance-procedures-threaten-americans-privacy, accessed on 05 February 2019.
63
Federal Bureau of Investigation (FBI), “Director Addresses ‘Going Dark’ Problem at Cyber Conference,”
available at https://www.fbi.gov/audio-repository/ftw-podcast-wray-going-dark-iccs-011118.mp3/view,
accessed on 18 November 2018.
64
Md Sazzad Hossain, “Social Media and Terrorism: Threats and Challenges to the Modern Era”, South Asian
232
ROLE OF INTERNET
The global initiative is also reflected in the activities of the UN Security Council.
The Security Council Counter-Terrorism Committee is working to address various
problems emanated from the abuse of Information and Communication Technologies
(ICT) by terrorists and terrorist groups. To that end, the committee is guided by several
Security Council Resolutions. Among the resolutions, probably the most important
one is the Security Council Resolution 1373 (2001) which calls on all members of the
UN to find ways to enhance and accelerate the exchange of information regarding
the use of ICT by terrorist groups and to suppress terrorist recruitment. Microsoft
also informed the committee that it had made provisions to prohibit the posting
of terrorist contents by organizations included in the Consolidated United Nations
Security Council (UNSC) Sanctions List.67
233
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
5. Concluding Remarks
Use of internet-based alternative media for terrorist purposes is one of the key
features of contemporary terrorism studies. This study reveals that in these days terrorist
groups are more dependent on internet for spreading their terrorist ideology than the
mass media to disseminate their causes. Especially, the ‘lone-wolf’ terrorists are motivated
and trained by the social media to conduct terrorist incidents on a larger scale. Terrorist
organizations use their own media for several purposes, which include spreading
terrorist propaganda, radicalization, recruit and train a new workforce, fund mobilization,
communication, planning and executing terrorist operations. It is also evident that most of
the online materials are produced by sympathizers rather than the key leaders of Al Qaeda,
IS or other terrorist groups. Particularly, in recent years, due to extensive counterterrorism
initiatives and drone strikes, terrorist groups are using internet to train their sympathizers
on bomb-making and other operational activities. To that end, Al Qaeda, IS and other
terrorist groups are using their own websites as well as various social networking sites to
reach their audiences independently from mainstream media outlets.
Terrorism, in every aspect, affects the whole global community. The use of internet
by terrorist groups disregards national borders, amplifying the potential impact on the
sufferers. However, there is no scope to deny the fact that the terrorist sympathizers are
using internet and social networking sites to attract the young generation. Therefore, to
prevent the dissemination of terrorist and violent extremist ideology, international actors
along with industry and law enforcement agencies need to work together to make the
cyberspace a hostile environment for the terrorists. And it is also evident from empirical
evidence that internet-based alternative media also can help in counterterrorism
endeavours.
234
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018: 235-241
BOOK REVIEW
Analysing China’s Soft Power Strategy and Comparative Indian
Initiatives by Parama Sinha Palit, published by SAGE Publications, India Pvt Ltd,
New Delhi, 2017, XXIV+368 pages.
235
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
illustrates the regional variations of China’s soft power strategies. Part three
‘Soft Power, China-India Engagement and Comparative Dimensions’ focuses on
various India’s soft power initiatives and compare them with China's initiatives. It
also analyses Sino-Indian relations from the perspective of soft power.
To set the context of the analysis of China’s soft power, the author
devotes a significant concentration on the concept of soft power. It argues that
although the term soft power was first coined by Joseph Nye Jr., it can hardly be
described as a product of contemporary western thinking. In this respect, on the
one hand, it provides ample evidences of the historical existence of soft power
in the foreign policy of China and India. It explains the root of soft power as
an idea in China’s foreign policy can be traced during spring and autumn era
771-476 BC, a period known as the ‘Hundred School of Thoughts’. Thinker of
that period like Kong Zi, Confucius and Mencius denounced war and preferred
diplomatic maneuvering over military confrontation in achieving state interests.
In ancient Chinese literatures, ideas such as ‘culture winning over an enemy’ and
‘winning a battle before it is fought’ are rampant. Similar to Chinese literatures,
ancient Indian literatures, e.g., Mahabharata, Manu Smriti and Arthashastra
provide a peek into ancient Indian cultural tradition and practice of diplomacy
for conducting international relations. Noted scholars of the time like Kautilya
and Kamandak have also referred to soft diplomacy for achieving progress.
On the other hand, little illustration is provided on the concept of western
influential thinkers, such as E.H. Carr, Foucault, Bourdieu, Gramsci, Habermas and
particularly Nye who have variously articulated soft power, albeit in implicit and
contextual fashions. As the author tries to de-Americanize the concept of soft
power, greater exemplification on both western and non-western concept of
soft power is crucial. Thus, extensive discussion on western soft power concept
by identifying similarities and dissimilarities between the two discourses could
enrich the conceptual part of the book further.
The book is mostly dedicated to trace several tools of China’s soft power
to gain foreign policy objectives. It identifies several tools of China’s soft power,
e.g., economic engagement (investment, aid, loan and grant); cultural diplomacy;
public diplomacy; education and media, etc. It argues culture as the core of soft
power finds increasing resonance in China’s conduct of external engagement.
Culture has been inseparable from politics in China and also considered as
third pillar of Chinese diplomacy after economics and politics. Thus, the book
highlights the prominent role of culture in China’s approach to soft power. Apart
from culture, by posing as the locomotive for regional growth and prosperity,
China has effectively employed economic tools as one of its major soft power
instruments. It further explains the unique approach of China’s soft power strategy
in combining the ‘traditional’ and ‘modern’ tools for connecting to people. China
has imparted the typical Chinese flavour to soft power by combining cultural
236
BOOK REVIEW
In order to compare China’s soft power strategies with India, the book
reflects on India too. It highlights India’s rich endowment of captive soft power
stemming from ancient history, civilization, assimilative and cosmopolitan
culture, democratic institutions and religious plurality. Although India’s soft
power efforts have been limited and less conspicuous compared to its larger
eastern neighbour, under Modi government Indian foreign policy is increasingly
adopting soft power tools. Under two sub-heading ‘State-driven Initiatives’
and ‘Non-state-driven Initiatives’ chapter nine goes on to explain different soft
237
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
power tools, e.g., cultural initiatives; Buddhism; public diplomacy (viz. social
media, Bollywood; TV channels; food; cricket; connecting to diaspora and high
level visits) and economic initiatives (viz. regional connectivity, offering aid for
infrastructure building and humanitarian assistance). Of these tools, culture
has been employed as an important tool of soft power. The author, however,
emphasizes on India’s foreign policy, particularly the thrust on highlighting
cultural virtues in articulating soft power can be somewhat a risky approach
to adopt, given that aggressive emphasis on culture and civilization might give
birth to fear of cultural colonization among the recipients. It also brings to the
fore an explanation on the core strategic objectives, e.g., maintaining a benign
external environment; facilitating peaceful conditions for economic growth;
advancing its ambition of being a major global or regional power and correcting
negative impression of Indian state ability to effectively govern and deliver a
decent quality of life to its people that Indian soft power is meant to achieve.
Though Parama highlights India’s soft power across various regions, India’s soft
power initiatives in different regions could be broadly explained as the latter part
of the book’s title implies "Comparative Indian Initiatives”.
238
BOOK REVIEW
to each other and the growing pattern of constructive engagement between the
two through the application of various soft power tools. But a brief analysis on
whether the sense of pragmatic collaboration and the emphasis on constructive
engagement through greater use of soft power creates more benign impressions
on both sides by denting the trust deficient could enrich the book.
In order to compare China’s soft power strategies with India, the author
argues India’s soft power efforts have been limited and less conspicuous
compared to China. To establish this argument author gives two structural
differences between India and China’s soft power. Firstly, whether it is culture or
economic engagement, China is engaging with the rest of the world through soft
power on a much bigger scale and faster pace than India. In this regard, author
gives an example of India and China’s efforts to capitalize soft power through
education. Among major Asian countries, India has only nine universities figuring
among Asian top one hundred compared with twenty-one from China. Secondly,
the difference in scale, pace and intensity between soft power strategies of
China and India are also attributable to the degree of involvement of the state
in exercising soft power. India has been happy to allow its non-state actors to
be more proactive in advancing its soft power. In contrast, China’s soft power
initiatives are state-driven.
In line with the former argument the author also argues that India’s
soft power will continue to encounter formidable challenges than China. To
strengthen this argument, author identifies several challenges of India’s soft
power, e.g., religious pluralism; multilingual and multiethnic features; resource
constraints; adverse impression over Indian’s state inability to provide better
quality of lives to its majorities; ineffective communication with the rest of the
world and incoherent coercive diplomacy with neighbours like Pakistan. In
contrast with India, author also identifies some challenges of China’s soft power,
e.g., local resentment in Africa, Asia and Latin America, hard postures in the South
China Sea and ambiguous postures in the Middle East. It argues, unlike India,
China’s soft power will not encounter such challenges. In this respect, it also
gives an interesting comparison of India’s soft power challenges with respect to
China’s soft power, such as, due to the multilingual and multiethnic feature of
India no language of India has attracted as much global attention and inclination
to learn as Mandarin has. As China’s soft power analysis is the main objective of
the book, thus more emphasis on the challenges of China rather than India might
enrich it more.
The book also attempts to assess the strategic dividends of China’s soft
power. It mentioned about different opinion surveys that point to its increasing
recognition by the global community. But these opinion surveys might not reveal
the true picture, given that positive perceptions do coexist with negative ones.
239
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
240
BOOK REVIEW
in contrast with the western academic discourse on soft power, this book
conceptualizes soft power from non-western and Asian perspective. The book,
by de-Americanizing the concept of soft power, is a significant contribution to
the contemporary discourse of soft power in international relations discipline.
Likewise, it also adds value to the study of China’s soft power as there is lack of
focused attention on modern China’s extensive deployment of soft power.
Reviewed by
Syeda Tanzia Sultana
Research Officer
Bangladesh Institute of International and Strategic Studies (BIISS)
241
• BIISS Journal (Quarterly)
• Bangladesh Foreign Policy Survey (Quarterly)
• BIISS Papers (Monograph series)
The Assam Tangle : Outlook for the Future (1984)
The Crisis in Lebanon: Multi-dimensional Aspects and Outlook for the Future (1985)
India's Policy Fundamentals, Neighbours and Post-Indira Developments (1985)
Strategic Aspects of Indo-Sri Lanka Relations (1986)
Indo-Bangladesh Common Rivers and Water Diplomacy (1986)
Gulf War : The Issues Revisited (1987)
The SAARC in Progress : A Hesitant Course of South Asian Transition (1988)
Post-Brezhnev Soviet Policy Towards the Third World (1988)
Changing Faces of Socialism (1989)
Sino-Indian Quest for Rapprochement: Implications for South Asia (1989)
Intifada : The New Dimension to Palestinian Struggle (1990)
Bangladesh : Towards National Consensus (in Bangla, 1990)
Environmental Challenges to Bangladesh (1991)
The Gulf War and the New World Order : Implication for the Third World (1992)
Challenges of Governance in India : Fundamentals under Threat (1995)
Bangladesh in United Nations Peacekeeping Operations (1998)
Nuclearisation of South Asia : Challenges and Options for Bangladesh (1998)
The Middle East Peace Process and the Palestinian Statehood (2000)
Pakistan and Bangladesh : From Conflict to Cooperation (2003)
Integrated Coastal Zone Management in Bangladesh : A Case for People's Management (2003)
WTO Dispute Settlement System and Developing Countries: A Neorealist Critique (2004)
State Sovereignty and Humanitarian Intervention : Does One Negate the Other? (2006)
Unipolarity and Weak States: The Case of Bangladesh (2009)
Japan's Strategic Rise (2010)
The Fallacy of Fragile States Indices: Is There a 'Fragility Trap'? (2017)
• BIISS Seminar Proceedings
Contemporary Development Debate: Bangladesh in the Global Context
Moving from MDGs to SDGs: Bangladesh Experience and Expectation
SAARC at 30: Achievements, Potentials and Challenges
Bangladesh’s Relations with Latin American Countries: Unlocking Potentials
Civil-Military Relations in Democracy: An Effective Framework
Recent Extremist Violence in Bangladesh: Response Options
25 March – Gonohottya Dibosh (Genocide Day)
Reconciling Divided Societies, Building Democracy and Good Governance: Lessons from Sri Lanka
Promoting Cultural Diversity of Small Ethnic Groups in Bangladesh
Upcoming 45th Session of the Council of Foreign Ministers of OIC, Dhaka: Revisiting A Shared Journey
‡ivwn½v msKUt evsjv‡`k KZ©K
… M„nxZ c`‡¶c I ch©v‡jvPbv
(Rohingya Crisis: Measures Taken by Bangladesh and An Appraisal)
Bangladesh Delta Plan 2100
• BIISS Country Lecture Series
BIISS Country Lecture Series: Part- 1
BIISS Country Lecture Series: Part- 2
Energy Security in South Asia Plus: Relevance of Japanese Experience
Changing Global Dynamics: Bangladesh Foreign Policy
BIISS JOURNAL, VOL. 39, NO. 2, APRIL 2018
Mailing Address
1/46, Old Elephant Road (West of Ramna Police Station), Dhaka-1000, Bangladesh.
Fax: 88-02-48312625, info@biiss.org, website: www.biiss.org
244