Want Peace in Syria? Put Women at the Negotiating Table

U.S. Secretary of State John Kerry, left, and Russian Foreign Minister Sergey Lavrov walk to their seats for a meeting about Syria, in Zurich, Switzerland, on Wednesday, Jan. 20, 2016.

Jacquelyn Martin/AP

AA Font size + Print

U.S. Secretary of State John Kerry, left, and Russian Foreign Minister Sergey Lavrov walk to their seats for a meeting about Syria, in Zurich, Switzerland, on Wednesday, Jan. 20, 2016.

That’s what the Balkan experience tells us, say current and former British and US ambassadors.

With a fresh diplomatic push under way to restart Syrian peace talks this month, we should absorb a critical lesson from the Bosnia conflict as we grapple for a way out of the Syria deadlock: To create sustainable peace, women must have a seat at the negotiating table.

Women suffer disproportionately in modern war, but they are also often leading actors in building security. A recent study of 182 agreements showed that peace accords are 35 percent more likely to last at least 15 years if women are at the table.

As diplomats in the Balkans two decades ago, we watched as the failure to include women in peace negotiations contributed to a divisive, paralyzing political settlement. Now governments in the region are recognizing women as a critical resource for stabilization.

As examples, Bosnia’s strong national strategy to advance women as decision makers has increased female recruitment in police and military forces. And women are in the vanguard of officials and non-governmental organizations from Serbia, Bosnia, and other Balkan states, devising strategies to tackle challenges as intractable as the migrant crisis.

We should apply these lessons to Syria, where civil war has killed a quarter-million people and strewn refugees and extremist violence across the Middle East and beyond. As a new round of peace talks approaches, what if we insisted on gender parity at the negotiating tables, or at least a critical mass say, 30 percent women? Drawing from the pool of female civil society leaders already bridging divides would surely boost the chances for success.

Women are often best placed to spot signs of radicalization and to counter it, given their central role in the family and the community.

Here’s what our experience tells us: By including groups of women, all parties will be more likely to address practical issues that matter to ordinary people, and buy-in to the agreement will be broader-based and more durable. 

Tackling violence against women is an urgent priority, but that in no way obscures the crucial point: women aren’t merely “recipients” of security—they are providers as well. They know first-hand the dangers—and the solutions. Our responsibility is to ensure they have opportunities to lead.

To grasp the kind of commitment we’re missing, we’ve only to look to the women of Zabadani near the Syria-Lebanon border. Nearly 500 of them have put their lives on the line for months by publicly pressuring all parties for a ceasefire, which has largely held since September. 

As we look for ways to root out terrorism, it is wise to recognize that women are often best placed to spot signs of radicalization and to counter it, given their central role in the family and the community.

The U.N. Security Council has at last come together to support a peace plan, and the world cannot afford to let this moment slip away. We must make 2016 the year that violence and suffering in Syria finally end. The Council has embraced an inclusive approach. In December, Resolution 2254 endorsed a peace process for Syria; the measure insists on the meaningful participation of women.

We commend U.N. Special Envoy Staffan de Mistura for involving women’s groups in his outreach. This must lead to their involvement as decision-makers at the table. Making that a reality—capitalizing on their talent and knowledge—will at least enable a negotiating climate where the interests of ordinary Syrians and their communities will finally be taken seriously. That’s the path to peace.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.