Pub Date : 2018-11-02DOI: 10.1080/14799855.2019.1539818
S. Raghavan
ABSTRACT This article examines whether the concept of a security dilemma is useful in understanding the trajectory of India–China relations over the past seven decades. It considers several phases through which this relationship has passed and it argues that the security dilemma has never been at work. The relationship is characterized not by a security dilemma but by fundamental conflicts of interests. These have been exacerbated or ameliorated by changes in domestic politics and the wider strategic context. Going forward, too, these factors are likely to influence relationship.
{"title":"The Security Dilemma and India–China Relations","authors":"S. Raghavan","doi":"10.1080/14799855.2019.1539818","DOIUrl":"https://doi.org/10.1080/14799855.2019.1539818","url":null,"abstract":"ABSTRACT This article examines whether the concept of a security dilemma is useful in understanding the trajectory of India–China relations over the past seven decades. It considers several phases through which this relationship has passed and it argues that the security dilemma has never been at work. The relationship is characterized not by a security dilemma but by fundamental conflicts of interests. These have been exacerbated or ameliorated by changes in domestic politics and the wider strategic context. Going forward, too, these factors are likely to influence relationship.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"11 1","pages":"60 - 72"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75509174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1080/14799855.2019.1539820
K. S. L. Collin
ABSTRACT The Sino-Indian rivalry features an increasingly prominent maritime dimension amidst the countries’ naval buildups and deployments in the Indian Ocean Region (IOR) and Western Pacific. This study finds that the patterns of naval buildup and nature of the seas as an ambiguous, international medium do not necessarily shape mutual perceptions between China and India as pure security seekers. India’s concerns about China’s IOR forays revolve around its expanding bluewater naval capabilities, especially submarines, and port access. Beijing is wary of New Delhi’s reach into the Western Pacific and role within a perceived US-led containment scheme that allows it to leverage on partners’ bluewater assets. While war remains a remote prospect, this Sino-Indian rivalry at sea – extending from unresolved terrestrial political problems – looks set to persist.
{"title":"China-India Rivalry at Sea: Capability, trends and challenges","authors":"K. S. L. Collin","doi":"10.1080/14799855.2019.1539820","DOIUrl":"https://doi.org/10.1080/14799855.2019.1539820","url":null,"abstract":"ABSTRACT The Sino-Indian rivalry features an increasingly prominent maritime dimension amidst the countries’ naval buildups and deployments in the Indian Ocean Region (IOR) and Western Pacific. This study finds that the patterns of naval buildup and nature of the seas as an ambiguous, international medium do not necessarily shape mutual perceptions between China and India as pure security seekers. India’s concerns about China’s IOR forays revolve around its expanding bluewater naval capabilities, especially submarines, and port access. Beijing is wary of New Delhi’s reach into the Western Pacific and role within a perceived US-led containment scheme that allows it to leverage on partners’ bluewater assets. While war remains a remote prospect, this Sino-Indian rivalry at sea – extending from unresolved terrestrial political problems – looks set to persist.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"149 1","pages":"24 - 5"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77988357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-26DOI: 10.1080/14799855.2018.1516639
Austin Wyatt, Jai C. Galliott
ABSTRACT The procurement of autonomous weapon systems is on the rise in Southeast Asia, where, as in other parts of the world, interest in the military applications of unmanned systems is outpacing fractured international regulation efforts. This article analyzes the diffusion of drone technology in Southeast Asia and argues that we are at an inflection point, representing an opportunity for The Association of Southeast Asian Nations (ASEAN) to control the diffusion of unmanned platforms and take a leadership role in developing a regionally appropriate framework for their development. Moreover, it contends that with a regional framework in place to reduce tensions/misadventure, unmanned aerial and maritime vehicles (UAVs & UMVs) could improve ASEAN’s ability to respond to traditional and non-traditional security threats, and thus increase regional security.
{"title":"Closing the Capability Gap: ASEAN Military Modernization during the Dawn of Autonomous Weapon Systems","authors":"Austin Wyatt, Jai C. Galliott","doi":"10.1080/14799855.2018.1516639","DOIUrl":"https://doi.org/10.1080/14799855.2018.1516639","url":null,"abstract":"ABSTRACT The procurement of autonomous weapon systems is on the rise in Southeast Asia, where, as in other parts of the world, interest in the military applications of unmanned systems is outpacing fractured international regulation efforts. This article analyzes the diffusion of drone technology in Southeast Asia and argues that we are at an inflection point, representing an opportunity for The Association of Southeast Asian Nations (ASEAN) to control the diffusion of unmanned platforms and take a leadership role in developing a regionally appropriate framework for their development. Moreover, it contends that with a regional framework in place to reduce tensions/misadventure, unmanned aerial and maritime vehicles (UAVs & UMVs) could improve ASEAN’s ability to respond to traditional and non-traditional security threats, and thus increase regional security.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"70 1","pages":"53 - 72"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86121881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-05-31DOI: 10.1080/14799855.2018.1470508
M. Osman, A. Arosoaie
ABSTRACT Malaysia has long been hailed as a beacon of moderate Islam. Yet, at present, there is considerable support for ISIS amongst Malaysians, and it represents a unique articulation of contemporary violent Islamist extremism. Malaysians who joined ISIS in Syria and its supporters at home are characterized by a sense of Islamic righteousness. Also, they share distinctive features that differentiate them from the old jihadi generation: a diverse occupational background, the lack of either formal or informal religious training, and the growing nexus of criminality-radicalization. Malaysian support for ISIS can be historically and politically contextualized in relation to the Islamization race between the main political parties, the presence of Salafi-jihadi discourse and ISIS’s discursive construction of authentic Islam.
{"title":"Jihad in the Bastion of “Moderation”: Understanding the Threat of ISIS in Malaysia","authors":"M. Osman, A. Arosoaie","doi":"10.1080/14799855.2018.1470508","DOIUrl":"https://doi.org/10.1080/14799855.2018.1470508","url":null,"abstract":"ABSTRACT Malaysia has long been hailed as a beacon of moderate Islam. Yet, at present, there is considerable support for ISIS amongst Malaysians, and it represents a unique articulation of contemporary violent Islamist extremism. Malaysians who joined ISIS in Syria and its supporters at home are characterized by a sense of Islamic righteousness. Also, they share distinctive features that differentiate them from the old jihadi generation: a diverse occupational background, the lack of either formal or informal religious training, and the growing nexus of criminality-radicalization. Malaysian support for ISIS can be historically and politically contextualized in relation to the Islamization race between the main political parties, the presence of Salafi-jihadi discourse and ISIS’s discursive construction of authentic Islam.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"31 1","pages":"1 - 14"},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81611132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-20DOI: 10.1080/14799855.2018.1437145
Christina Lai
ABSTRACT Since Ma Ying-Jeou assumed presidency in 2008, he promoted an Economic Cooperation Framework Agreement (ECFA) and Taiwan’s political rapprochement with China. However, the opposition party soon proposed a counter argument, claiming this agreement might produce severe negative consequences for Taiwan’s economy and sovereignty. This study presents a securitization framework to highlight both the KMT and DPP strategy in contesting the nature of ECFA despite the potential inflation of benefit. It investigates both the KMT and DPP securitization strategies under Taiwan’s political and economic contexts. A de-securitizing discourse, though might have been a convincing counterargument against ECFA, was underdeveloped by the DPP members. It also shows how the debate shapes the discourse in the Sunflower Student Movements in 2014, and led to the DPP’s subsequent change of securitization strategy.
{"title":"Dancing with the Wolf: Securitizing China–Taiwan Trade in the ECFA Debate and Beyond","authors":"Christina Lai","doi":"10.1080/14799855.2018.1437145","DOIUrl":"https://doi.org/10.1080/14799855.2018.1437145","url":null,"abstract":"ABSTRACT Since Ma Ying-Jeou assumed presidency in 2008, he promoted an Economic Cooperation Framework Agreement (ECFA) and Taiwan’s political rapprochement with China. However, the opposition party soon proposed a counter argument, claiming this agreement might produce severe negative consequences for Taiwan’s economy and sovereignty. This study presents a securitization framework to highlight both the KMT and DPP strategy in contesting the nature of ECFA despite the potential inflation of benefit. It investigates both the KMT and DPP securitization strategies under Taiwan’s political and economic contexts. A de-securitizing discourse, though might have been a convincing counterargument against ECFA, was underdeveloped by the DPP members. It also shows how the debate shapes the discourse in the Sunflower Student Movements in 2014, and led to the DPP’s subsequent change of securitization strategy.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"39 1","pages":"140 - 158"},"PeriodicalIF":0.0,"publicationDate":"2018-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79942296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-02-05DOI: 10.1080/14799855.2018.1424710
Kirsten E. Schulze, J. Liow
ABSTRACT This article examines the ISIS phenomenon in Indonesia and Malaysia. It aims to explain how, where, and why the transnational and local intersect as well as the role of religion, particularly in the ideological narratives and recruitment strategies of local jihadi groups. At the heart of this analysis is the question to what extent Indonesians and Malaysians were lured into joining ISIS as a result of its "universal" ideology and global recruitment strategy or whether they were instead propelled by local Indonesian and Malaysian dynamics into Syria and into "importing" and "indigenising" ISIS to advance their own agendas. The article argues that the potency and appeal of the extremist narrative of ISIS derives from how it animates and feeds off prevailing debates within Indonesia and Malaysia. These debates revolve around issues such as the nature of Muslim identity and what it means to be a "good Muslim", the place of Islamic law in society, relations within the ummah as well as with non-Muslims, and Islamic eschatology. While there is clearly a transnational dimension, the motivations for Southeast Asians to sympathize with or join the Syrian jihad and their engagement with ISIS are ultimately the product of local Indonesian and Malaysian dynamics rather than the "lure" of ISIS per se. This article thus contributes to the broader scholarly debate on how "global" the global jihad actually is and the phenomenon of "glocalisation".
{"title":"Making Jihadis, Waging Jihad: Transnational and Local Dimensions of the ISIS Phenomenon in Indonesia and Malaysia","authors":"Kirsten E. Schulze, J. Liow","doi":"10.1080/14799855.2018.1424710","DOIUrl":"https://doi.org/10.1080/14799855.2018.1424710","url":null,"abstract":"ABSTRACT This article examines the ISIS phenomenon in Indonesia and Malaysia. It aims to explain how, where, and why the transnational and local intersect as well as the role of religion, particularly in the ideological narratives and recruitment strategies of local jihadi groups. At the heart of this analysis is the question to what extent Indonesians and Malaysians were lured into joining ISIS as a result of its \"universal\" ideology and global recruitment strategy or whether they were instead propelled by local Indonesian and Malaysian dynamics into Syria and into \"importing\" and \"indigenising\" ISIS to advance their own agendas. The article argues that the potency and appeal of the extremist narrative of ISIS derives from how it animates and feeds off prevailing debates within Indonesia and Malaysia. These debates revolve around issues such as the nature of Muslim identity and what it means to be a \"good Muslim\", the place of Islamic law in society, relations within the ummah as well as with non-Muslims, and Islamic eschatology. While there is clearly a transnational dimension, the motivations for Southeast Asians to sympathize with or join the Syrian jihad and their engagement with ISIS are ultimately the product of local Indonesian and Malaysian dynamics rather than the \"lure\" of ISIS per se. This article thus contributes to the broader scholarly debate on how \"global\" the global jihad actually is and the phenomenon of \"glocalisation\".","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"60 1","pages":"122 - 139"},"PeriodicalIF":0.0,"publicationDate":"2018-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88230850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-01-25DOI: 10.1080/14799855.2017.1422089
David C. Logan
ABSTRACT This article applies a form of organizational analysis to the military institution responsible for China’s nuclear weapons, the PLA Rocket Force and its predecessor, the Second Artillery. Analyzing the ways in which this military institution manages and allocates its human capital can offer potential insights into both China’s operational practices and the institutional and strategic priorities of the country’s missile forces. Specifically, the article examines career paths of PLA officers in the Rocket Force, with a particular focus on those officers who eventually rise to the ranks of senior leadership. The analysis yields evidence that senior leaders are more likely to have served in the Rocket Force’s premier conventionally-armed missile base, that there is an informal institutional hierarchy among the missile bases, and that, at least at the personnel level, there is some separation between conventional and nuclear units. These findings have important implications for assessing potential escalation dynamics in a possible conflict between China and the United States and for forecasting the future development of China’s missile forces.
{"title":"Career Paths in the PLA Rocket Force: What They Tell Us","authors":"David C. Logan","doi":"10.1080/14799855.2017.1422089","DOIUrl":"https://doi.org/10.1080/14799855.2017.1422089","url":null,"abstract":"ABSTRACT This article applies a form of organizational analysis to the military institution responsible for China’s nuclear weapons, the PLA Rocket Force and its predecessor, the Second Artillery. Analyzing the ways in which this military institution manages and allocates its human capital can offer potential insights into both China’s operational practices and the institutional and strategic priorities of the country’s missile forces. Specifically, the article examines career paths of PLA officers in the Rocket Force, with a particular focus on those officers who eventually rise to the ranks of senior leadership. The analysis yields evidence that senior leaders are more likely to have served in the Rocket Force’s premier conventionally-armed missile base, that there is an informal institutional hierarchy among the missile bases, and that, at least at the personnel level, there is some separation between conventional and nuclear units. These findings have important implications for assessing potential escalation dynamics in a possible conflict between China and the United States and for forecasting the future development of China’s missile forces.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"28 1","pages":"103 - 121"},"PeriodicalIF":0.0,"publicationDate":"2018-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81485974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-28DOI: 10.1080/14799855.2017.1414045
Darren J. Lim, R. Mukherjee
ABSTRACT China’s growing trade, investment, and aid links are commonly believed to constitute a potent instrument of statecraft, generating important security externalities. Yet there is insufficient research tracing the precise mechanisms linking economic relationships between a “sender” and “target” state to actual influence in the security domain. We offer three contributions. First, we map out the theoretical mechanisms of influence in a sender–target relationship. Second, we empirically investigate these mechanisms through a case study of China’s economic influence in Sri Lanka since 2009. Third, we use our findings to generate new insights on the mechanisms of influence in the economic statecraft literature and the dynamics of great-power competition in South Asia. Beijing’s ability to convert its considerable economic resources into strategic influence in Sri Lanka is currently hampered by the poor planning and implementation of infrastructure projects, domestic politics, and Sri Lanka’s relationship with India, a regional competitor and rising power.
{"title":"What Money Can’t Buy: The Security Externalities of Chinese Economic Statecraft in Post-War Sri Lanka","authors":"Darren J. Lim, R. Mukherjee","doi":"10.1080/14799855.2017.1414045","DOIUrl":"https://doi.org/10.1080/14799855.2017.1414045","url":null,"abstract":"ABSTRACT China’s growing trade, investment, and aid links are commonly believed to constitute a potent instrument of statecraft, generating important security externalities. Yet there is insufficient research tracing the precise mechanisms linking economic relationships between a “sender” and “target” state to actual influence in the security domain. We offer three contributions. First, we map out the theoretical mechanisms of influence in a sender–target relationship. Second, we empirically investigate these mechanisms through a case study of China’s economic influence in Sri Lanka since 2009. Third, we use our findings to generate new insights on the mechanisms of influence in the economic statecraft literature and the dynamics of great-power competition in South Asia. Beijing’s ability to convert its considerable economic resources into strategic influence in Sri Lanka is currently hampered by the poor planning and implementation of infrastructure projects, domestic politics, and Sri Lanka’s relationship with India, a regional competitor and rising power.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"25 1","pages":"73 - 92"},"PeriodicalIF":0.0,"publicationDate":"2017-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73835349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-27DOI: 10.1080/14799855.2017.1414044
Erik Lin-Greenberg
ABSTRACT Can seemingly benign deployments of armed forces on military operations other than war (MOOTW) – such as humanitarian relief and anti-piracy missions – exacerbate security dilemmas? The security dilemma holds a central role in international relations theory, but existing analyses overlook whether non-traditional security operations drive security competition if perceived as threatening. Despite increased MOOTW participation throughout Asia, scant attention has been paid to the broader strategic implications of these operations. This article proposes a hypothesis in which MOOTW participation exacerbates security competition by revealing military capabilities and providing states with skills that make offensive action easier. The article tests this hypothesis by process tracing events surrounding Japan’s post-3/11 earthquake response. The findings suggest that MOOTW participation intensifies long-term security competition, especially when rising powers are involved.
{"title":"Non-Traditional Security Dilemmas: Can Military Operations other than War Intensify Security Competition in Asia?","authors":"Erik Lin-Greenberg","doi":"10.1080/14799855.2017.1414044","DOIUrl":"https://doi.org/10.1080/14799855.2017.1414044","url":null,"abstract":"ABSTRACT Can seemingly benign deployments of armed forces on military operations other than war (MOOTW) – such as humanitarian relief and anti-piracy missions – exacerbate security dilemmas? The security dilemma holds a central role in international relations theory, but existing analyses overlook whether non-traditional security operations drive security competition if perceived as threatening. Despite increased MOOTW participation throughout Asia, scant attention has been paid to the broader strategic implications of these operations. This article proposes a hypothesis in which MOOTW participation exacerbates security competition by revealing military capabilities and providing states with skills that make offensive action easier. The article tests this hypothesis by process tracing events surrounding Japan’s post-3/11 earthquake response. The findings suggest that MOOTW participation intensifies long-term security competition, especially when rising powers are involved.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"11 1","pages":"282 - 302"},"PeriodicalIF":0.0,"publicationDate":"2017-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82136275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-26DOI: 10.1080/14799855.2017.1414043
Mason Richey, Ohn Daewon, Jangho Kim, Jae-Jeok Park
ABSTRACT There is a lacuna in the literature analyzing the mid-term (6-24 months) period after a DPRK contingency that results in the Pyongyang regime’s relatively sudden and unmanaged fall. This article helps fill that gap, particularly with respect to security issues that would challenge Korean unification efforts during such a period. Following an Introduction, Section I first makes the case for a DPRK contingency being the most plausible end to the Pyongyang regime. Assuming the scenarios from Section I, Section II addresses the question of what critical issues a unifying Korea will face over the mid-term, and how dealing with these challenges will condition the type of end-state that a unified Korea will embody. In particular we examine three challenges: (a) mid-term security provision related to potential weapons proliferation, cyber-security, organized criminality, and human security; (b) the foundations of institution-building through measures dealing with issues of transitional justice, disputed land title claims, and generating broad domestic stakeholder buy-in in a unifying Korea; (c) the disposition of Korea’s strategic alignment in a Northeast Asia that will have undergone a major alteration of the regional system. Section III concludes with policy recommendations concerning what efforts should be made now to prepare for the situations described in Sections I and II.
{"title":"Be Careful What You Wish For: Security Challenges Facing the Korean Peninsula During a Potential Unification Process","authors":"Mason Richey, Ohn Daewon, Jangho Kim, Jae-Jeok Park","doi":"10.1080/14799855.2017.1414043","DOIUrl":"https://doi.org/10.1080/14799855.2017.1414043","url":null,"abstract":"ABSTRACT There is a lacuna in the literature analyzing the mid-term (6-24 months) period after a DPRK contingency that results in the Pyongyang regime’s relatively sudden and unmanaged fall. This article helps fill that gap, particularly with respect to security issues that would challenge Korean unification efforts during such a period. Following an Introduction, Section I first makes the case for a DPRK contingency being the most plausible end to the Pyongyang regime. Assuming the scenarios from Section I, Section II addresses the question of what critical issues a unifying Korea will face over the mid-term, and how dealing with these challenges will condition the type of end-state that a unified Korea will embody. In particular we examine three challenges: (a) mid-term security provision related to potential weapons proliferation, cyber-security, organized criminality, and human security; (b) the foundations of institution-building through measures dealing with issues of transitional justice, disputed land title claims, and generating broad domestic stakeholder buy-in in a unifying Korea; (c) the disposition of Korea’s strategic alignment in a Northeast Asia that will have undergone a major alteration of the regional system. Section III concludes with policy recommendations concerning what efforts should be made now to prepare for the situations described in Sections I and II.","PeriodicalId":35162,"journal":{"name":"Asian Security","volume":"29 1","pages":"263 - 281"},"PeriodicalIF":0.0,"publicationDate":"2017-12-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91281593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}