Threats to Sovereignty
This lesson examines the diverse and evolving threats to state sovereignty in the 21st century. Beyond migration and globalisation (covered in previous lessons), states face challenges from cyber warfare, transnational crime, terrorism, climate change, pandemics, economic dependencies and information warfare. Understanding these threats — and how states respond — is essential for the synoptic links that Edexcel examiners reward. This lesson addresses the Edexcel Enquiry Question: "What is the relationship between globalisation and sovereignty?"
Cyber Warfare and Sovereignty
Cyber warfare involves the use of digital attacks by state or state-sponsored actors to damage, disrupt or gain access to another state's critical systems. It represents a fundamentally new threat to sovereignty because it can bypass physical borders entirely.
Scale of the Threat
- The UK's National Cyber Security Centre (NCSC) handled over 2,000 significant cyber incidents in 2023, many attributed to state-sponsored actors.
- The global cost of cybercrime is estimated at 8trillion∗∗peryear(CybersecurityVentures,2023),projectedtoreach∗∗10.5 trillion by 2025.
- Critical infrastructure — power grids, water systems, hospitals, transport networks, financial systems — is increasingly networked and therefore vulnerable.
Case Studies
Russia-Ukraine cyber conflict:
- Russia launched major cyberattacks on Ukraine's power grid in December 2015 (the first confirmed cyberattack to cause a power outage, affecting 225,000 people) and again in 2016.
- In 2017, the NotPetya malware, attributed to Russia's GRU military intelligence, was launched against Ukraine but spread globally, causing an estimated **10billion∗∗indamage.MajorcompaniesaffectedincludedMaersk(300m loss), FedEx (400m),andMerck(870m).
- Russia has conducted sustained cyber operations against Ukrainian government systems, communications and infrastructure since the 2022 invasion.
China's cyber espionage:
- The USA has accused China of systematic cyber espionage targeting government agencies, defence contractors and technology companies. In 2015, the US Office of Personnel Management (OPM) was hacked, compromising the personal data of 22 million US government employees.
- The Hafnium attack (2021) exploited vulnerabilities in Microsoft Exchange servers, affecting an estimated 250,000 organisations worldwide.
North Korea:
- North Korea's Lazarus Group was attributed responsibility for the WannaCry ransomware attack (2017), which affected over 200,000 computers in 150 countries, including the UK's NHS (thousands of appointments cancelled).
- North Korean hackers have stolen an estimated $3 billion in cryptocurrency to fund the regime's nuclear weapons programme.
How Cyber Warfare Challenges Sovereignty
- Borders are irrelevant: Cyberattacks cross borders at the speed of light. Physical defences (walls, armies) are useless against them.
- Attribution is difficult: It is often hard to prove who launched an attack, making deterrence and retaliation difficult.
- Proportionality is unclear: What constitutes an "act of war" in cyberspace? How should states respond?
- No governance framework: There is no equivalent of the Geneva Conventions for cyberspace. Efforts to establish norms (the UN Group of Governmental Experts, the Tallinn Manual) remain non-binding.
Transnational Crime
Transnational organised crime — drug trafficking, people smuggling and trafficking, arms dealing, money laundering, cybercrime — operates across borders and undermines state sovereignty by corrupting institutions, financing violence and controlling territory.
Drug Trafficking
- The global illicit drug trade is estimated to be worth $500 billion per year (UNODC).
- Mexico's drug cartels (Sinaloa, Jalisco New Generation, Gulf Cartel) control large swathes of territory, field private armies, corrupt government officials and police, and are responsible for over 30,000 homicides per year. In some areas, the cartels exercise more effective authority than the Mexican state.
- Afghanistan produced approximately 80% of the world's opium until the Taliban ban in 2023 (production fell by an estimated 95%), but the trade has destabilised the country and its neighbours for decades.
- In Guinea-Bissau, West Africa, the country has been described as a "narco-state" — drug trafficking organisations from South America use it as a transit point for cocaine destined for Europe, and have effectively captured state institutions.
Money Laundering
- The UNODC estimates that 2–5% of global GDP (approximately 800billion–2 trillion) is laundered annually.
- Money laundering enables other crimes, corrupts financial systems, and undermines the rule of law. London has been criticised as a hub for laundering oligarch wealth (so-called "Londongrad"), while offshore financial centres (British Virgin Islands, Cayman Islands, Panama) facilitate the concealment of illicit funds.
graph LR
A["TRANSNATIONAL<br/>CRIME"] --> B["Drug trafficking<br/>($500bn/yr)"]
A --> C["People smuggling<br/>& trafficking<br/>($6bn+/yr)"]
A --> D["Arms trafficking"]
A --> E["Money laundering<br/>($800bn-$2tn/yr)"]
A --> F["Cybercrime<br/>($8tn/yr)"]
B --> G["SOVEREIGNTY<br/>UNDERMINED"]
C --> G
D --> G
E --> G
F --> G
G --> H["State institutions<br/>corrupted"]
G --> I["Territory controlled<br/>by criminal groups"]
G --> J["Rule of law<br/>eroded"]
style A fill:#c62828,color:#fff
style G fill:#1565c0,color:#fff
Terrorism
Terrorism — the use of violence against civilians for political purposes — directly challenges state sovereignty by demonstrating that the state cannot protect its citizens.
Global Terrorism
- Al-Qaeda's September 11 attacks (2001) killed 2,977 people and transformed global security. The USA invaded Afghanistan, created the Department of Homeland Security, and launched the "War on Terror".
- ISIS (Islamic State) at its peak (2014–2017) controlled territory across Iraq and Syria with an estimated 8 million people under its rule, effectively creating a proto-state that erased the Iraq-Syria border.
- Lone-actor terrorism has become an increasing concern: the Manchester Arena bombing (2017, 22 killed), the Christchurch mosque shootings (New Zealand, 2019, 51 killed), and numerous vehicle and knife attacks in European cities.
State Responses and Sovereignty Trade-Offs
Counterterrorism measures often involve trade-offs between security and civil liberties — both of which are aspects of sovereignty:
| Measure | Rationale | Sovereignty Concern |
|---|
| Mass surveillance (e.g. NSA, GCHQ) | Detect and prevent plots | Violates privacy rights; challenged by Edward Snowden revelations (2013) |
| Pre-emptive military strikes | Destroy terrorist infrastructure | Violates sovereignty of states where strikes occur (Pakistan, Yemen, Somalia) |
| Detention without trial (e.g. Guantánamo Bay) | Hold suspected terrorists | Violates habeas corpus and international human rights law |
| Border controls and travel bans | Prevent terrorist movement | Restrict freedom of movement; discriminatory profiling |
| Deradicalisation programmes | Address root causes of extremism | Effective or counterproductive? Prevent strategy in UK has been controversial |
Climate Change and Sovereignty
Climate change poses a unique and existential threat to sovereignty because it can physically destroy the territory on which sovereignty is based.
Loss of Territory