Hybrid Security Institutions

Article

From the understanding of security in the past, which focused only on military threats from the Cold War period, which prioritized the security of states; in addition to the state actor, there is a transformation towards a new security understanding that deepens and expands in the political, economic, social and technological fields, in which individuals, groups and non-state organizations are now participating as a security threat....

From the understanding of security in the past, which focused only on military threats from the Cold War period, which prioritized the security of states; in addition to the state actor, there is a transformation towards a new security understanding that deepens and expands in the political, economic, social and technological fields, in which individuals, groups and non-state organizations are now participating as a security threat.

In an extremely sophisticated, uncertain and unpredictable security environment, the old methods and conventional solutions that are known to fight new threats are no longer sufficient, and how to detect, diagnose and prevent risks and threats are now the most critical questions. In particular, technologies such as quantum and space technologies, artificial intelligence, internet of things, autonomous systems, "big data" analytics, biotechnology, blockchain, 3D printers, crypto money and assets, which we call innovative and disruptive technology that can radically change the security paradigm, It seriously affects and transforms the working styles of the actors operating in the field.

These innovative, disruptive technologies take the different kinds of power that machines, individuals, ideas, and all of humanity possess to levels never before reached. Innovative disruptive technologies also massively amplify and accelerate the power of flows. Especially digital flows, flows of ideas, energy and services are carried all over the world and circulated rapidly. Anyone in this world can be swept away by this flow, ultimately increasing the power and authority of a single person tremendously. What a single person can do constructively and destructively with this power has reached a whole new level. In addition, the power of the majority is increasing thanks to these new technologies.

Human beings have collectively become a part of nature, and have become an important force of nature to affect climate change and the ecosystem. These forces, created by innovative disruptive technologies, add new dimensions and perspectives, providing a force multiplier than ever before. In addition, the multi-layered structure of the cyber environment, the ability to carry out simultaneous digital attacks on many physically distant targets, offered new opportunities and capabilities to criminals and terrorist organizations. In particular, the part of the internet called the "dark web" outside of control and surveillance and crypto money systems provide the ability of malicious actors to act easily outside the influence and interest of security units. For this reason, it has become a necessity for the actors operating in the field of security to work with public institutions, private sector, academia and civil society and create a new synergy in order to develop and adopt these new technologies, strengthen their industrial base and ensure technological superiority.

Increasingly widespread use of social media, interactive games and mobile device technologies creates a new cognitive conflict area in the conflict environment. The battleground of this cognitive conflict area is the human brain. Its aim is not only what people think, but also how they think, how they act, and even what kind of behavior change is required.

From this point of view, the center of gravity and focus of the new security environment is to shape the human dimension. That's why, as Sun Tzu puts it, "the best strategy is to win without fighting" in the fight against the threats and risks in the new security environment. The most important point to be considered here is the preservation of the fine line between security and freedom and the continuation of the legitimacy. The main pillars of this approach are; respecting the rule of law, listening to the voices of the people, transparency, fairness and having a good place in the eyes of the people. In this context, the main purpose of security services should be an approach philosophy that focuses on people and liberates their living space. The real ingenuity is the unique ability to establish security without interfering with the daily life of citizens.

To summarize briefly; the security forces will be nowhere but actually everywhere. As you know, "terrorism", one of the most important instruments of the security environment, is an important problem that our country has had to struggle with for many years. The speed and acceleration gained in cooperation, coordination and information sharing among all institutions, especially after the treacherous coup attempt of 15 July, contributed to the terrorism and struggle in the field very seriously. By combining the capacities and competencies of our institutions, syneptic management functions have been created in the fight against terrorism and other security issues. Our country's fight against terrorism and its practices have also been reshaped in a more proactive and scientific approach in accordance with the requirements and spirit of the time.

The basic principles on which the new security strategy is based are to identify, to diagnose and acquire the danger and threat at their source. Again, besides the fight against terrorists; other basic principles are to continue the fight against terrorism with a holistic approach, including all its dimensions, to minimize foreign dependency on weapons, ammunition, vehicles and technologies used in the fight against terrorism, and to integrate our domestic and national manned and unmanned aerial vehicles and other defense industry products into this fight. In the meantime, I would like to commemorate Özdemir BAYRAKTAR, who we lost recently, who broke new ground in our country, especially in the field of unmanned aerial vehicles, with mercy.

Today, the “fight against terrorism“ is not only a struggle carried out by the security forces using kinetic force; In the fight against terrorism, a broad perspective approach is adopted, including third-party actors who see terrorism as a multidimensional problem and try to implement scientific solutions for the causes that create, enable and attract it. This approach; while focusing on the removal of terrorists from the mountains, reuniting them with their families, rehabilitating them and reintegrating them into society through persuasion processes; on the other hand, activities that will eliminate the factors that pave the way for the recruitment of personnel by terrorist organizations are trying to prevent children and youth from being involved in crime and terrorism.

In the light of all this, the need for human-centered leaders, managers and personnel who have a high level of awareness about the risks and threats that may arise in this uncertain and unpredictable security environment, can take the right decisions quickly, can think creatively - analytically - critically, produce innovative solutions and who can work jointly with both national and international security units, is at the highest level these days compared to past times.

As the Gendarmerie Coast Guard Academy, we have focused all our efforts and endeavors on training personnel who will manage the security environment of the future. We have activated our associate, undergraduate and graduate education institutions in order to train managers and leaders who will manage and shape the security environment of today and the future in our Academy.

We have established the "Terrorism Research Center" and the "Security Research Center" in order to transfer our experience and knowledge that we have gained with great sacrifice, cost and effort in the field of security to both the scientific world and future generations. In these centers, security-related research and projects have been started and are being carried out, especially by participating in our experience and knowledge in the field and together with field researches.

We also regularly hold security congresses in our Academy. We held our second congress with the theme of "Security and Intelligence" under the auspices of our President, between 23-25 September last year. I would like to express our happiness to see you esteemed participants and scientists among us in our thematic panels and projects in our congresses to be held in the upcoming periods, and to receive your contributions.

One last point I would like to emphasize before concluding my words is that in this sophisticated and uncertain security environment, the need for hybrid security institutions that can combat hybrid and asymmetric risks and threats from all directions and layers, manage conflict environments at all levels in the most effective way and shape the human dimension is increasing day by day. In this context, forces such as the gendarmerie come to the fore as the most vital actor to meet this hybrid need, with their multi-faceted possibilities and capabilities, as well as their constant interaction with the public and human-centered equipment. It is foreseen that the role and authority of the gendarmerie-type forces will be indispensable in the construction and shaping of the future security environment.

( Brigadier Murat BULUT, Commander of Gendarmerie and Coast Guard Academy | Opening Speech, 7th Istanbul Security Conference, 04 November 2021 )

This content is protected by Copyright under the Trademark Certificate. It may be partially quoted, provided that the source is cited, its link is given and the name and title of the editor/author (if any) is mentioned exactly the same. When these conditions are fulfilled, there is no need for additional permission. However, if the content is to be used entirely, it is absolutely necessary to obtain written permission from TASAM.

Areas

Continents ( 5 Fields )
Action
 Contents ( 471 ) Actiivities ( 219 )
Areas
TASAM Africa 0 149
TASAM Asia 0 236
TASAM Europe 0 43
TASAM Latin America & Carribea... 0 34
TASAM North America 0 9
Regions ( 4 Fields )
Action
 Contents ( 177 ) Actiivities ( 54 )
Areas
TASAM Balkans 0 93
TASAM Middle East 0 61
TASAM Black Sea and Caucasus 0 16
TASAM Mediterranean 0 7
Identity Fields ( 2 Fields )
Action
 Contents ( 176 ) Actiivities ( 75 )
Areas
TASAM Islamic World 0 147
TASAM Turkic World 0 29
TASAM Türkiye ( 1 Fields )
Action
 Contents ( 223 ) Actiivities ( 59 )
Areas
TASAM Türkiye 0 223

Although during the Russian war in Ukraine, Belarus may be qualified as a Russian proxy, paradoxically, it can be as well perceived as a country struggling to save the rest of its independence from Moscow. ;

Artificial intelligence has become an important turning point of technological developments. Especially with the use of this technology a transformation process has begun in our lives. Systems developed and under development together with artificial intelligence technology: for example, the developm...;

After the military coup, Niger's future hangs in uncertainty driven by terrorism, necessitating the presence of Western allies in the Sahel region.;

After the end of the Cold War, relations between the People's Republic of China (PRC) and the Russian Federation (RF) have developed dynamically, albeit seemingly unevenly. The possibility of a genuine strategic partnership between Russia and China seemed to be downplayed.;

Wars have been going on since the first humanity and gained new dimensions in the last century fed by different objects. As the aerospace and space race increased in the bipolar world, whose tensions increased during the Cold War period, it has become clear that the unpredictable works on rocket tec...;

One of the economic and foreign policy objectives of Turkiye is the development of the Middle Corridor on the New Silk Road route and thus becoming a logistics base in the terrestrial East-West trade via Eurasia and being a center in the supply chain.;

Turkish stance towards the ongoing Russian aggression in Ukraine is based on the national interest that implies avoiding risks and profiting from opportunities created by the conflict. The ultimate aim is to make its own place in the post-war international system more optimal than it was in the pre-...;

From the understanding of security in the past, which focused only on military threats from the Cold War period, which prioritized the security of states; in addition to the state actor, there is a transformation towards a new security understanding that deepens and expands in the political, economi...;

East Mediterranean Program 2023-2025

  • 17 Jul 2023 - 19 Jul 2023
  • Sheraton Istanbul City Center -
  • İstanbul - Türkiye

5th Marine and Maritime Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

2nd Istanbul Cyber-Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

7th Türkiye - Gulf Defence and Security Forum

  • 23 Nov 2023 - 24 Nov 2023
  • İstanbul - Türkiye

Istanbul Cyber-Security Forum

The rapid development of information technologies has brought security problems of the same magnitude. In the early years of the Internet, "accessibility" came to the fore among the three important components of information security, "accessibility, confidentiality, and integrity"; First, the development and operation of the Internet were considered, and "confidentiality and integrity" remained in the background.

  • 03 Nov 2022 - 03 Nov 2022
  • Ramada Hotel & Suites by Wyndham İstanbul Merter -
  • İstanbul - Turkey