1

Introduction: Why Map Threats Now?

The institutions that maintain peace — constitutions, courts, international agreements, regulatory bodies — were largely designed for a slower, more bounded world. Many core governance frameworks date from the mid-20th century or earlier, built on assumptions about information flow, economic interconnection, and technological change that no longer hold.

Core Question

What happens when institutions designed for 1948, 1787, or 1945 encounter 2025's threat landscape? This series maps the gap between institutional design assumptions and operational reality.

This first document establishes a shared vocabulary and visual map of interconnected threats. Subsequent documents will diagnose failure modes, propose structural reforms, and outline implementation paths. The goal is not prediction but preparedness — understanding which pressure points exist so that intervention can happen before cascade failures begin.

Scope & Jurisdictional Lens

This series takes a global comparative approach, drawing examples primarily from:

  • Canada — parliamentary democracy with federal structure, Charter of Rights
  • European Union — supranational governance, multi-level sovereignty
  • United Nations system — international law, treaty mechanisms, peacekeeping operations

These examples were chosen for their institutional diversity and relevance to different scales of governance.

2

Threat Constellation

The visualization below maps twelve interconnected threat categories. Threats are not isolated — they form feedback loops where deterioration in one domain accelerates problems in others. Click any node to see details, connections, and intervention considerations.

Interactive Threat Network

Critical (Active)
High (Near-term)
Medium (Developing)
Emerging (10+ years)

Select a threat node

Click on any node in the constellation to see detailed information about that threat category.

3

What Has Changed Since Classic Peacekeeping?

Traditional peacekeeping doctrine emerged from the Cold War era and focused on inter-state conflicts with clear territorial boundaries and identifiable combatants. The 21st-century threat landscape differs fundamentally in six domains:

1. Information Environment

Then: Information moved slowly through official channels and mass media gatekeepers. Propaganda required state-level resources.

Now: Viral disinformation spreads in hours. Algorithmic amplification creates filter bubbles. Synthetic media (deepfakes) undermines evidentiary standards.

Governance implication: Legitimacy depends on shared facts; when epistemic commons collapse, consensus becomes structurally impossible.

2. AI & Autonomous Systems

Then: Weapons required human operators. Decision-making timelines allowed diplomatic intervention.

Now: Autonomous weapons, AI-assisted targeting, and algorithmic decision systems compress timelines. Accountability becomes diffuse when "the algorithm decided."

Governance implication: Legal frameworks assume identifiable human decision-makers. Speed of AI systems may outpace human oversight capacity.

3. Cyber & Infrastructure Vulnerability

Then: Critical infrastructure was physically isolated. Attacks required territorial presence.

Now: Power grids, water systems, hospitals, and financial networks are digitally connected. A cyberattack from anywhere can disable critical services. Attribution is difficult.

Governance implication: "Acts of war" become ambiguous. Non-state actors can inflict state-level damage.

4. Climate Migration & Resource Stress

Then: Migration was primarily economic or conflict-driven; environmental factors were secondary.

Now: Climate change is creating permanent uninhabitability in some regions. Sea-level rise, desertification, and extreme weather will displace hundreds of millions.

Governance implication: International law lacks "climate refugee" status. Resource conflicts have no clear aggressor to sanction.

5. Fragmentation of Authority

Then: Nation-states were primary actors. International bodies had clearer mandates.

Now: Multinational corporations exceed many states in economic power. Transnational networks operate across jurisdictions. Platform companies control information infrastructure without democratic accountability.

Governance implication: Sovereignty is functionally compromised by actors that don't recognize it.

6. Institutional Trust Collapse

Then: Despite cynicism, most populations accepted institutional legitimacy. Elections were trusted.

Now: Trust in democratic institutions has declined across developed nations. "The system is rigged" has become a mainstream belief.

Governance implication: Institutions that lack legitimacy cannot govern effectively. Enforcement depends on voluntary compliance by the majority.

The Interaction Problem

These six shifts don't operate independently. Disinformation accelerates trust collapse. Climate migration triggers resource conflicts. Cyber vulnerabilities compound with AI speed. The danger is not any single threat, but the cascading interaction effects that overwhelm institutional response capacity.

4

Institutional Failure Modes Under Stress

When governance systems encounter sustained pressure, they fail in predictable patterns. The following table maps common failure modes, their mechanisms, and historical examples.

Failure Mode Mechanism Warning Signs Historical Example Severity
Elite Capture Oversight bodies become staffed by those they regulate. Revolving door between regulators and industry. Regulatory decisions consistently favor concentrated interests. Whistleblowers face retaliation. US financial regulation pre-2008 Severe
Procedural Gridlock Veto points multiply until no action is possible. Minority obstruction normalized. Essential legislation stalls indefinitely. Executive expands through "emergency" powers. EU constitutional treaty ratification; US government shutdowns Significant
Legitimacy Collapse Population loses belief that institutions represent their interests or operate fairly. Declining voter participation. Protests normalized. Alternative authority structures emerge. Late Soviet Union; post-2019 trust decline Catastrophic
Violence Spiral Grievances escalate to confrontation. State response creates martyrs. Retaliation cycles self-sustain. Political violence normalized in rhetoric. Security forces viewed as partisan. Northern Ireland Troubles; Syrian civil war escalation Catastrophic
Constitutional Workaround Leaders achieve formally legal results through norm violations. Letter of law preserved, spirit gutted. Court-packing proposals. Electoral rule changes before elections. Emergency powers extended. Hungary's constitutional changes under Orbán Severe
Information Capture Control over what populations know enables manipulation without visible coercion. State or platform monopolies on information. Scientific consensus rejected as political. Russian media consolidation; algorithm-driven polarization Severe
Cascade Failure Failure in one system triggers failures in connected systems faster than response capacity. Crisis response consumes all institutional bandwidth. Secondary problems go unaddressed. 2008 financial crisis; COVID-19 multi-system strain Catastrophic
Succession Crisis Power transfer mechanisms fail or are contested. Competing claims create parallel structures. Unclear succession rules. Leaders extending terms. Military involvement in civilian transitions. Venezuelan presidential crisis 2019 Catastrophic
Failure Mode Interactions

Failure modes rarely occur in isolation. Elite capture reduces legitimacy. Legitimacy collapse creates pressure for constitutional workarounds. Document 04 (Institutional Autopsy) will analyze these interactions through case studies.

their current posture (allied, neutral, opposed, unaware).

Week 2-3

Connection Interviews

Conduct 5-10 informal conversations with people on adjacent issues. Ask: "What institutional vulnerabilities worry you most?" Listen for patterns.

Week 3

Failure Mode Analysis

Using the failure modes table, assess which are most likely in your context. For the top 3, draft a one-page "if-then" scenario.

Week 4

Quick-Win Identification

Identify 1-3 interventions implementable within 6 months with existing resources. Prioritize relationship-building and feedback loops.

Week 4

Document & Share

Write up findings. Share with at least two peer organizations. Establish a check-in schedule (quarterly?) to update assessments.

G

Glossary of Key Terms

Cascade Failure
When failure in one system triggers failures in connected systems, creating a chain reaction that overwhelms response capacity.
Elite Capture
When institutions designed to serve broad public interests become controlled by narrow groups who redirect them to serve private interests.
Epistemic Commons
The shared foundation of accepted facts and evidence standards that makes democratic deliberation possible.
Institutional Resilience
The capacity of governance systems to maintain core functions under stress and recover from disruptions.
Legitimacy
The widespread belief that an institution has the right to make decisions and that compliance is appropriate, beyond mere coercion.
Procedural Gridlock
When decision-making processes become so encumbered by veto points that necessary action becomes impossible.
Sovereignty
The supreme authority within a territory, including the power to make and enforce laws. Increasingly contested by transnational actors.
Veto Point
A stage in a decision-making process where a proposal can be blocked. Multiple veto points increase stability but can cause gridlock.