
















































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Traditional security studies implies a circum- scribed focus on war and the state and, conversely, adoption of a critical approach entails making allowance for ...
Typology: Study notes
1 / 88
This page cannot be seen from the preview
Don't miss anything!
Abstract 7KLV LQWURGXFWRU\ FKDSWHU VLWXDWHV WKH WH[W ZLWKLQ WKH H[LVWLQJ OLWHUDWXUH DQG ¿HOG RI LQWHUQD- WLRQDO VHFXULW\ DLPLQJ LQ SDUWLFXODU WR LGHQWLI\ WKH PHDQLQJ V RI WKH WHUP μFULWLFDO VHFXULW\ VWXGLHV¶:HEHJLQZLWKDQRYHUYLHZDQGHYDOXDWLRQRIWKUHHGRPLQDQWZD\VLQZKLFKWKH¿HOG RI VHFXULW\ VWXGLHV KDV SUHYLRXVO\ EHHQ PDSSHG DQG KRZ FULWLFDO VHFXULW\ VWXGLHV LV XVXDOO\ SODFHG ZLWKLQ WKHVH PDSSLQJV DQ LQWHOOHFWXDO PDS D WHPSRUDO PDS RU WLPHOLQH DQG D VSDWLDOPDS$VVHVVLQJWKHPHULWVDQGGLVDGYDQWDJHVRIHDFKPDSSLQJWKHLQWURGXFWLRQWKHQ RXWOLQHVWKHFKDSWHUVWUXFWXUHDQGSHGDJRJLFDOIHDWXUHVRIWKHERRNDVDZKROH
Readers are likely to be wondering what security is and what it means to adopt a critical VWDQFH LQ WKH VWXG\ RI LW 7KH IDFW WKDW WKHUH LV QR XQLYHUVDOO\ DJUHHG DQVZHU WR HDFK RI WKHVHTXHVWLRQVKRZHYHULPPHGLDWHO\ÀDJVERWKWKHFRPSOH[LW\DQGYLEUDQF\RIWKLVDUHD RIUHVHDUFK)RUDVWDUWWKHXVHRIWKHSUH¿[μFULWLFDO¶LVSDUWLFXODUO\YH[HG,WLVGLI¿FXOWWR LPDJLQH DQ\ DSSURDFK WR WKH VWXG\ RI VHFXULW\ RU DQ\ RWKHU DUHD RI LQWHOOHFWXDO LQTXLU\ WKDW ZRXOG FODLP WR EH μXQFULWLFDO¶ 5HIHUHQFH WR μFULWLFDO¶ ZRUN LV WKHUHIRUH D UKHWRULFDO GHYLFHWKDWPXVWEHUHFRJQLVHGXQGHUVWRRGDQGLQWHUURJDWHGDVVXFK7KHUHLVQRVLQJXODU GH¿QLWLRQRIZKDWLWPHDQVWREHFULWLFDOLQVHFXULW\VWXGLHV±DQGDQ\ULJLGGH¿QLWLRQRI WKHWHUPFULWLFDOVHFXULW\VWXGLHVZLOOWHOO\RXPRUHDERXWWKHSRVLWLRQIURPZKLFKWKDWGHI- LQLWLRQLVDWWHPSWHGWKDQDQ\WKLQJHOVH5DWKHUWKHUHLVDQDUUD\RIGLIIHUHQWSHUVSHFWLYHV WKDWKDVEHFRPHDVVRFLDWHGZLWKWKLVWHUP$PRQJWKHVHSHUVSHFWLYHVWKHUHDUHFULVVFURVV- LQJ OLQHV RI FRQYHUJHQFH DQG GLYHUJHQFH RYHU WKH REMHFW PHWKRG DQG LPSOLFDWLRQV RI EHLQJμFULWLFDO¶,QWKLVERRNZHGRQRWZLVKWRJHWWRRFDXJKWXSLQWKHWUDSRILPSRVLQJ what we think critical security studies is or ought WR EH 7KLV VHHPV WR XV WR EH QHLWKHU SRVVLEOHJLYHQWKHUDGLFDOO\GLIIHUHQWVWDUWLQJSRLQWVWDNHQE\YDULRXVFULWLFDODSSURDFKHV QRUQHFHVVDULO\GHVLUDEOHLQOLJKWRIWKHSOXUDOLW\RILQWHOOHFWXDODSSURDFKHVWKHVHGLIIHUHQW VWDUWLQJSRLQWVJLYHULVHWR,QVWHDGWKLVLQWURGXFWLRQLVGULYHQE\FODLPVPDGHLQWKHOLWHU- DWXUHWKDWZHVXUYH\DQGE\H[DPLQLQJWKHZD\GLIIHUHQWDSSURDFKHVFULWLFDOO\DVVHVVFRQ- WHPSRUDU\LVVXHV,QRWKHUZRUGVZHWDNHWKHERXQGDULHVRIμFULWLFDO¶VHFXULW\VWXGLHVWR EHGH¿QHGE\WKRVHZKRIUDPHWKHLUZRUNXVLQJWKLVODEHO%\FRQVHTXHQFHWKLVWH[WSUR- YLGHVDQRYHUYLHZRIPXOWLSOHFULWLFDOVWXGLHV RI security issues and practices rather than DQ DWWHPSW WR SUHVHQW D KRPRJHQHRXV RU PRQROLWKLF DUHD RI UHVHDUFK DQG LQ GRLQJ VR recognises that there are internal boundaries (and boundary disputes) between these YDULRXVDSSURDFKHVDVZHOO
2 Introduction
$VLQGLFDWHGDERYHWKHWHUPμFULWLFDO¶FDQEHXVHGLQYDULRXVZD\VDQGHYDGHVHDV\GH¿- QLWLRQ+RZHYHUWKHFRQFHSWRIVHFXULW\LVLQPDQ\ZD\VQROHVVFRQWHVWHG7KHRQFHGRPL- QDQWDVVRFLDWLRQRIWKHFRQFHSWRIVHFXULW\ZLWKPLOLWDU\WKUHDWVDQGZLWKWKHSURWHFWLRQRI WKHVWDWH±RUμQDWLRQDOVHFXULW\¶WKHVWXG\RIZKLFKKDVLQWXUQSURYLGHGWKHRULJLQDOIRXQ- GDWLRQ IRU GLVFLSOLQDU\ VHFXULW\ VWXGLHV ± LV QR ORQJHU XQTXHVWLRQHG ,QGHHG LW ZRXOG EH RYHUO\ VLPSOLVWLF WR WKLQN WKDW VXFK DQ XQGHUVWDQGLQJ RI WKH FRQFHSW RI VHFXULW\ ZDV HYHU FRPSOHWHO\ WDNHQ IRU JUDQWHG $UQROG :ROIHUV RQH RI WKH IRXQGLQJ IDWKHUV RI WKH 5HDOLVW DSSURDFK WR VHFXULW\ WKDW WHQGV WRZDUGV WKLV μWUDGLWLRQDO¶ GH¿QLWLRQ RI VHFXULW\ DFNQRZ- OHGJHG HDUO\ RQ WKDW QDWLRQDO VHFXULW\ LWVHOI LV DW EHVW μDQ DPELJXRXV V\PERO¶ :ROIHUV WKDWFDQEHGH¿QHGLQPXOWLSOHZD\V7KHSUHFLVHGH¿QLWLRQRIZKDWLWPHDQVWREH VHFXUHWKHFDXVHVRILQVHFXULW\DQGZKRRUZKDWWKHFRQFHSWRIVHFXULW\VKRXOGDSSO\WR KDYHORQJEHHQGHEDWHG6RPHKDYHHYHQEHHQOHGWRFRQFOXGHWKDWVHFXULW\LVDQμHVVHQ- WLDOO\FRQWHVWHGFRQFHSW¶ %DOGZLQ DFRQFHSWWKDWLVLGHQWL¿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¿QH RUDUHGH¿QHG DVμFULWLFDO¶LWLVZRUWKQRWLQJWKDWWKHGHULYDWLRQRIWKHWHUP IURPWKH*UHHN NULWLNRV UHIHUVWRDQμDELOLW\WRPDNHMXGJPHQWV¶IURP NULQHLQ , meaning to μVHSDUDWH¶μGLVFULPLQDWH¶μGHFLGH¶ :LOOLDPV± 7KLVLWFRXOGEHDUJXHGLVD PLQLPDOO\VKDUHGFRPPRQDOLW\EHWZHHQGLIIHUHQWFULWLFDODSSURDFKHVWRVHFXULW\WKH\DUH DOOFRQVWDQWO\LQYROYHGLQMXGJPHQWVDERXWZKDWVHFXULW\PHDQVDQGLQGHFLGLQJDQGGLV- FULPLQDWLQJZKDWWKHREMHFWVDQGREMHFWLYHVRI VHFXULW\VWXGLHV VKRXOG EH0RUHRYHU DQG crucially, critical approaches to security recognise these tasks as central to their intellectual DFWLYLW\7KH\DOOLQGLIIHUHQWZD\VUHIXWHWKHLGHDWKDWVHFXULW\KDVDFRQVWDQWRUGH¿QLW- LYHO\ VHWWOHG PHDQLQJ DQG FRQWHQW WKDW FDQ EH WDNHQ IRU JUDQWHG ,Q WKHLU ODQGPDUN edited volume, Critical Security Studies: Concepts and Cases , Keith Krause and Michael & :LOOLDPV SURSRVHG D EURDG DQG ÀH[LEOH XQGHUVWDQGLQJ RI WKH WHUP FULWLFDO VHFXULW\ VWXGLHVWKDWDOVRIROORZVIURPWKLVSRLQW
2XUDSSHQGLQJRIWKHWHUPFULWLFDOWRVHFXULW\VWXGLHVLVPHDQWWRLPSO\PRUHDQRULHQ- WDWLRQWRZDUGWKHGLVFLSOLQH>RIVHFXULW\VWXGLHV@WKDQDSUHFLVHWKHRUHWLFDOODEHO>@,I WKHREMHFWLYH RUDWOHDVWWKHRXWFRPH RIPXFKVFKRODUVKLSLQVHFXULW\VWXGLHVKDVEHHQ WR UHQGHU WKH TXHVWLRQ DQG SUREOHP RI VHFXULW\ DSROLWLFDO DQG ODUJHO\ VWDWLF FULWLFDO WKHRU\ WDNHV WKH TXHVWLRQ RI FKDQJH DV LWV IRXQGDWLRQ LQ ERWK DQ H[SODQDWRU\ DQG DQ HYDOXDWLYHVHQVH [LL
,WLVLQWKLVYHLQ±RQHWKDWUHDGVFULWLFDOVHFXULW\VWXGLHVDVDQμRULHQWDWLRQ¶UDWKHUWKDQLQ WHUPVRIDμSUHFLVHWKHRUHWLFDOODEHO¶±WKDWZHZDQWWRVLWXDWHWKLVLQWURGXFWRU\WH[W7KH .UDXVH±:LOOLDPV YROXPH UHPDLQV D SLRQHHULQJ FROOHFWLRQ RI LPSRUWDQW WKHRUHWLFDO DQG HPSLULFDOLQWHUYHQWLRQVWKDWKDYHKHOSHGVKDSHFULWLFDOVHFXULW\VWXGLHVDVDSOXUDOLVWLF¿HOG %\ QRZ KRZHYHU WKHUH KDYH EHHQ VHYHUDO PDMRU GHYHORSPHQWV VLQFH WKH SXEOLFDWLRQ RI WKDWWH[WWKDWGHPDQGFRQWHPSRUDU\FRYHUDJHDQGDVVHVVPHQW7KHSHULRGVLQFHIRU H[DPSOHKDVZLWQHVVHGWKHGHYHORSPHQWRIYDULRXVWKHRUHWLFDOLQQRYDWLRQVWKDWDUHFRYHUHG
Introduction
Box I.1 .H\FRQFHSWVLQ&ULWLFDO6HFXULW\6WXGLHV 5HIHUHQW REMHFW $Q HQWLW\ WKDW LV WDNHQ DV WKH IRFXV IRU DQDO\VLV LQ VHFXULW\ VWXGLHV HJ WKH VWDWHWKHKXPDQWKHHFRV\VWHP RUSXWGLIIHUHQWO\μWKDWZKLFKLVWREHVHFXUHG¶ Traditional approaches/Traditional Security Studies $ VKRUWKDQG PRVW FRPPRQO\ XVHG E\ ZULWHUV LQ RU V\PSDWKHWLF WR FULWLFDO VHFXULW\ VWXGLHV ZKLFK UHIHUV WR 5HDOLVW /LEHUDO 3HDFH 6WXGLHVDQG6WUDWHJLF6WXGLHVSHUVSHFWLYHVLQWKHVWXG\RIVHFXULW\WKDWSULRULWLVHWKHVWDWHDV WKH UHIHUHQW REMHFW RI VHFXULW\ DQG IRFXV SULPDULO\ RQ PLOLWDU\ WKUHDWV WR WKH VHFXULW\ RI WKH VWDWH VRPHWLPHVDOVRNQRZQDVDμVWDWHFHQWULF¶DSSURDFK Broadening 7KHEURDGHQLQJRIWKHVHFXULW\DJHQGDUHODWHVWRWKHPRYHDZD\IURPDQDUURZ IRFXV RQ WKH PLOLWDU\ VHFWRU WR DQDO\VLV RI LVVXHV LQ RWKHU VHFWRUV HJ HQYLURQPHQWDO HFR- QRPLFSROLWLFDODQGVRFLHWDOVSKHUHV Deepening 7KHGHHSHQLQJRIWKHRUHWLFDODSSURDFKHVUHODWHVWRWKHLGHDWKDWWKHVWDWHLVQRWWKH RQO\UHIHUHQWREMHFWRIVHFXULW\ Normative $QRUPDWLYHSRVLWLRQLVRQHWKDWH[SOLFLWO\WDNHVDVWDQFHRQZKDW should or ought WREHDQDO\VHGDFKLHYHGDQGRUVHFXUHG Positivism 5HIHUVWRDWKHRU\RINQRZOHGJHWKDWDUJXHVLWLVSRVVLEOHWRDSSO\VFLHQWL¿FSULQFL- SOHV RI REMHFWLYLW\ UHSOLFDWLRQ YHUL¿FDWLRQIDOVL¿FDWLRQ DQG JHQHUDOLVDWLRQ XVHG WR VWXG\ WKH QDWXUDOZRUOGWRWKHVWXG\RIVRFLHW\ DQGVHFXULW\ Post-positivism 5HIHUVWRDVHULHVRIDSSURDFKHVLQFOXGLQJPDQ\FULWLFDODSSURDFKHVWRVHFXU- LW\WKDWUHMHFWWKHLGHDWKDWLWLVSRVVLEOHWRDQDO\VHWKHQDWXUDODQGVRFLDOZRUOGLQWKHVDPH ZD\7KHVHDSSURDFKHVHPSKDVLVHWKHSRLQWWKDWWUXWKFODLPVFDQQHYHUEHJURXQGHGWKHUHLV QR REMHFWLYH YLHZ IURP QRZKHUH RXWVLGH KLVWRU\ DQG SROLWLFV IURP ZKLFK ZH PLJKW WDNH D QHXWUDOSRVLWLRQ Security as a derivative concept 7KHLGHDFRPPRQDPRQJFULWLFDODSSURDFKHVWRVHFXULW\WKDW WKHZD\ZHWKLQNDERXWVHFXULW\GHULYHVIURPWKHZD\ZHWKLQNWKHZRUOGZRUNVPRUHEURDGO\
From ‘traditional’ to ‘critical’
2QHRIWKHGRPLQDQWLQWHOOHFWXDOQDUUDWLYHVXVHGWRPDSWKHHPHUJHQFHRIFULWLFDOVHFXULW\ VWXGLHVLQYROYHVWKHLQYRFDWLRQRIμWUDGLWLRQDO¶DSSURDFKHVWRVHFXULW\DJDLQVWZKLFKPRUH μFULWLFDO¶ YDULDQWV DUH WKHQ GH¿QHG &RPPRQO\ WKH QRWLRQ RI WUDGLWLRQDO VHFXULW\ VWXGLHV UHIHUV WR ZRUN DVVRFLDWHG ZLWK WKH EURDGHU DSSURDFK WR LQWHUQDWLRQDO UHODWLRQV NQRZQ DV SROLWLFDO5HDOLVPLQERWKLWVμFODVVLFDO¶DQGμVWUXFWXUDO¶ RUμQHRUHDOLVW¶ YDULDQWV$VZLWK PRVWFDWHJRULVDWLRQVRIWKLVVRUWWKLVEODQNHWWHUPFRYHUVRYHUDGLYHUVHUDQJHRIWKLQNHUV and ideas, but at base political Realism is usually seen to emphasise the state as the main REMHFWRIVHFXULW\DQGZDUDVWKHPDLQWKUHDWWRLW,QWKHFODVVLFDOYHLQ:DOWHU/LSSPDQQ DUJXHGLQWKHHDUO\VWKDWμ$QDWLRQLVVHFXUHWRWKHH[WHQWWRZKLFKLWLVQRWLQGDQJHU RIKDYLQJWRVDFUL¿FHFRUHYDOXHVLILWZLVKHVWRDYRLGZDUDQGLVDEOHLIFKDOOHQJHGWR PDLQWDLQWKHPE\YLFWRU\LQVXFKDZDU¶ /LSSPDQQFLWHGLQ$\RRE 6LPLODUO\QHRUHDOLVW6WHSKHQ:DOWKDVGH¿QHGVHFXULW\VWXGLHVDVμWKHVWXG\RIWKHWKUHDW XVHDQGFRQWURORIPLOLWDU\IRUFH¶ZKLFKLVIUHTXHQWO\FLWHGDVDUHÀHFWLRQRIWKHRYHUDOO SRVLWLRQ$FFRUGLQJWR:DOW¶VSHUVSHFWLYHWKHHVVHQFHRILQWHUQDWLRQDOVHFXULW\LVFRPSHWL- WLRQIRUSRZHUDPRQJVWDWHVXQGHUVWRRGLQWHUPVRIFRHUFLYHFDSDELOLW\ PLOLWDU\VWUHQJWK 2QWKLVYLHZWKHUHIRUHVHFXULW\LVYLHZHGQDUURZO\LQWHUPVRIWKHVXUYLYDORIWKHVWDWH 7KHVWDWHLVWDNHQWREHWKHSULPDU\μUHIHUHQWREMHFW¶WKDWLVWREHVHFXUHGDQGDVWKHTXRWD- WLRQIURP:DOWLOOXVWUDWHVWKHIRFXVLVSUHGRPLQDQWO\RQWKHPLOLWDU\VHFWRUDQGRQRWKHU LVVXHV RQO\ WR WKH H[WHQW WKDW WKH\ μEHDU GLUHFWO\ RQ WKH OLNHOLKRRG DQG FKDUDFWHU RI ZDU¶
Introduction 5 :DOW± :RUNLQJIURPWKHEDVLVWKDWDOOVWDWHVVHHNLQFUHDVHGVHFXULW\DQG will consequently seek to augment their military strength where possible, Realist security VWXGLHVKDYHIRFXVHGSDUWLFXODUO\RQWKHFRQFHSWRIDμVHFXULW\GLOHPPD¶'HYHORSHGSULPD- ULO\ LQ WKH FRQWH[W RI WKH QXFOHDU WKUHDW LQ WKH &ROG :DU SHULRG WKH VHFXULW\ GLOHPPD GHQRWHVDVLWXDWLRQZKHUHE\WKHPRYHWRVHFXUHRQHVWDWHOHDGVWRWKHLQVHFXULW\RIDQRWKHU ±VLQFHWKHUHFDQDOZD\VEHDQDPELJXLW\RYHUZKHWKHUDQLQFUHDVHLQPLOLWDU\FDSDELOLW\LV IRUSURWHFWLRQRUIRUFRQTXHVW±DQGKHQFHWRDF\FOHRILQVHFXULW\EHWZHHQVWDWHV 3ROLWLFDO 5HDOLVP WKRXJK GRPLQDQW LQ WKH VWXG\ RI VHFXULW\ IRU PRVW RI WKH WZHQWLHWK FHQWXU\LVQRWWKHRQO\μWUDGLWLRQDO¶ LHμQRQFULWLFDO¶ SHUVSHFWLYHDJDLQVWZKLFKFULWLFDO VHFXULW\VWXGLHVKDVEHHQGH¿QHGKRZHYHU$QDVVRUWHGFRKRUWRISHDFHUHVHDUFKHUVZDU KLVWRULDQVDUPVFRQWUROOHUVDQGWKRVHZRUNLQJEURDGO\ZLWKLQOLEHUDOWUDGLWLRQVRILQWHUQD- WLRQDOSROLWLFVPLJKWDOVREHVDLGWRIDOOXQGHUWKHEDQQHURIWUDGLWLRQDODSSURDFKHV:KLOH WKHVHSHUVSHFWLYHVGLIIHUIURP5HDOLVPLQVRPHUHVSHFWV VXFKDVWKHSURVSHFWVIRUFRRSHUD- tion among states), they all share a common commitment to thinking security within the FRQWH[WRIDPLOLWDU\VHFXULW\DJHQGD5HYLHZLQJ/LEHUDODQG5HDOLVWDSSURDFKHVWRVHFXU- LW\3DWULFN00RUJDQFRQFOXGHVWKDWIRUERWKμ6HFXULW\KDVORQJEHHQDERXWWKHVXUYLYDO DQGSK\VLFDOVDIHW\RIWKHDFWRUVDQGWKHLUSHRSOHE\H[WHQVLRQLWFRQFHUQVWKH deliberate XVH RI IRUFH E\ VWDWHV DQG VRPH RWKHU DFWRUV IRU YDULRXV SXUSRVHV¶ 0RUJDQ HPSKDVLVLQRULJLQDO /LEHUDOVPD\PDNHPXFKJUHDWHUDOORZDQFHIRUSRWHQWLDOFRQVWUDLQW RIIRUFHWKDQ5HDOLVWVEXWWKHLUREMHFWRIFRQFHUQUHPDLQVIXQGDPHQWDOO\WKHVDPH,QDGGL- WLRQ WKHVH SHUVSHFWLYHV RFFXS\ VLPLODU JURXQG WKHRUHWLFDOO\ :LWK IHZ H[FHSWLRQV WKLV ZRUN LV W\SLFDOO\ FRPPLWWHG WR D SRVLWLYLVW SUREOHPVROYLQJ PRGH RI LQTXLU\ WKDW ODUJHO\ WDNHV μSUHYDLOLQJ VRFLDO DQG SRZHU UHODWLRQVKLSV DQG WKH LQVWLWXWLRQV LQWR ZKLFK WKH\ DUH RUJDQL]HG¶±QDPHO\VWDWHV±μDVWKHJLYHQIUDPHZRUNIRUDFWLRQ¶ &R[ ,Q WKLV LQWHOOHFWXDO QDUUDWLYH GLVFXVVHG LQ PRUH GHWDLO LQ &KDSWHU WKH HPHUJHQFH RI FULWLFDOVHFXULW\VWXGLHVDVDVXE¿HOGRIWKHGLVFLSOLQHRIVHFXULW\VWXGLHVLVERXQGXSZLWK YDULRXVPRYHVDZD\IURPWKHVWDWHFHQWULFPLOLWDULVPRIWKHWUDGLWLRQDORUWKRGR[\7KHVH PRYHVFDQEHVXPPDULVHGZLWKUHIHUHQFHWRWKHVRFDOOHGμEURDGHQLQJ¶DQGμGHHSHQLQJ¶RI WKH VHFXULW\ DJHQGD 7KH IRUPHU UHODWHV WR WKH H[SDQVLRQ RI WKH DQDO\WLFDO KRUL]RQ RI WKH VWXG\RIVHFXULW\EH\RQGWKHPLOLWDU\VHFWRUWRHQFRPSDVVHQYLURQPHQWDOHFRQRPLFSROLW- LFDODQGVRFLHWDOVSKHUHV %X]DQ 7KHODWWHULVDWHUPXVHGWRUHIHUWRH[WHQVLRQRIWKH UHIHUHQWREMHFWRIVHFXULW\EH\RQGVLPSO\WKHVWDWHWRLQFRUSRUDWHRWKHUDFWRUVVXFKDVLQVWL- WXWLRQV KXPDQ LQGLYLGXDOV DQG JURXSV DQG HYHQ WKH ELRVSKHUH ,Q VKRUW WKLV LQWHOOHFWXDO PDSSLQJIXQFWLRQVE\GH¿QLQJFULWLFDOVHFXULW\VWXGLHVLQWHUPVRIZKDWLWLVQRWQDPHO\ WUDGLWLRQDO RU VWDWHFHQWULF VHFXULW\ VWXGLHV 7UDGLWLRQDO VHFXULW\ VWXGLHV LPSOLHV D FLUFXP- VFULEHGIRFXVRQZDUDQGWKHVWDWHDQGFRQYHUVHO\DGRSWLRQRIDFULWLFDODSSURDFKHQWDLOV PDNLQJDOORZDQFHIRUDPRUHH[SDQVLYHDJHQGD $VDOZD\VWKHSUREOHPZLWKVXFKELSRODUFKDUDFWHULVDWLRQVLVWKDWWKH\WHQGWRREVFXUHWKH JUH\DUHDVWKDWRIWHQOLHEHWZHHQRSSRVHGSRVLWLRQV$WWKHKLQJHEHWZHHQWUDGLWLRQDODQGFULW- LFDODSSURDFKHVWRVHFXULW\ZH¿QGFRQVWUXFWLYLVPZKLFKKDVVHHQLWVRZQELIXUFDWLRQLQWR μPDLQVWUHDP¶DQGμFULWLFDO¶FDPSV:KHUHDV5HDOLVWVDUJXHWKDWVHFXULW\DQGLQVHFXULW\FDQEH FDOFXODWHGE\PHDVXULQJPLOLWDU\VUHQJWKPDLQVWUHDPVRFLDOFRQVWUXFWLYLVWVVXFKDV$OH[DQ- GHU :HQGW FODLP WKDW WKUHDWV WR VHFXULW\ DUH QRW DXWRPDWLFDOO\ JLYHQ EXW SURGXFHG WKURXJK LQWHUVXEMHFWLYH LQWHUDFWLRQ WKDW LV WKURXJK GLDORJXH DQG GLVFRXUVH EHWZHHQ LQGL- YLGXDOVDQGJURXSV,QJHQHUDOWHUPVWKHQDPDLQVWUHDPVRFLDOFRQVWUXFWLYLVWDSSURDFKDUJXHV WKDWμVHFXULW\¶LVDVRFLDOFRQVWUXFWLRQWKDWLVFRQWH[WVSHFL¿F7KUHDWVGRQRWVLPSO\μH[LVW¶ LQGHSHQGHQWO\RIRXUNQRZOHGJHDQGUHSUHVHQWDWLRQVRIWKHPWKH\DUHEURXJKWLQWREHLQJE\ SURFHVVHV FKDUDFWHULVDWLRQVRIWKHQDWXUHRIDμWKUHDW¶LQIRUH[DPSOHSROLWLFDOVSHHFKHVDQG
Introduction
VRFLDO FRQVWUXFWLRQ LV LQFRUSRUDWHG ZLWKLQ GLIIHUHQW FULWLFDO DSSURDFKHV 0RUH LPSRUWDQW WKDQVXFKERXQGDU\GLVSXWHVSHUKDSVLVWKHIDFWWKDWWKHUROHRIVRFLDOFRQVWUXFWLRQLVQRW WKHVROHSXUYLHZRIFRQVWUXFWLYLVWDSSURDFKHV,WLVWRGLIIHULQJGHJUHHVDOVRDFUXFLDOSRLQW RIDQDO\VLVIRUDOORIWKHFULWLFDODSSURDFKHVGLVFXVVHGLQWKLVWH[W
From Cold War to War on Terror
$QRWKHU FRPPRQ ZD\ RI PDSSLQJ VHFXULW\ VWXGLHV DQG WKH HPHUJHQFH RI FULWLFDO DSSURDFKHVZLWKLQLWLVYLDWKHXVHRIGLIIHUHQWWHPSRUDOQDUUDWLYHV%\μWHPSRUDOQDUUD- WLYHV¶ZHPHDQGLYHUVHUHIHUHQFHVWRYDULRXVWLPHIUDPHVKLVWRULFDOHYHQWVDQGWKHGHOLQH- DWLRQRIVXSSRVHGO\GLVWLQFWμHUDV¶LQRUGHUWRSORWGHYHORSPHQWVLQWKHZD\WKDWVHFXULW\LV VWXGLHG 7ZR SDUWLFXODU μUXSWXUHV¶ VWDQG RXW LQ QDUUDWLYHV XVHG LQ FRQWHPSRUDU\ VHFXULW\ VWXGLHV WKH HQG RI WKH &ROG :DU SHULRG DVVRFLDWHG ZLWK WKH IDOO RI WKH %HUOLQ :DOO DQG UHYROXWLRQV WKURXJKRXW (DVWHUQ (XURSH LQ DQG WKH FROODSVH RI WKH 6RYLHW 8QLRQ LQ DQG WKH HYHQWV RI 6HSWHPEHU ZKLFK VDZ WZR SODQHV ÀRZQ LQWR WKH WZLQ WRZHUVRIWKH:RUOG7UDGH&HQWHULQ1HZ<RUNDQGDWKLUGDLUFUDIWLQWRWKH3HQWDJRQLQ :DVKLQJWRQ'& 7KH&ROG:DUSHULRG XVXDOO\WDNHQWRGHQRWHWKHSHULRG± UHIHUVWRWKHVWUD- WHJLFHQYLURQPHQWWKDWHPHUJHGRXWRIWKH6HFRQG:RUOG:DUZKLFKVDZWKHULVHRIWKH 8665 DQG 86 DV WKH WZR JOREDO VXSHUSRZHUV :LWK WKH FROODSVH RI WKH ZDUWLPH DOOLDQFH EHWZHHQWKH8.WKH8665DQGWKH86WKHODWWHUWZRVWDWHVEHFDPHHPEURLOHGLQDQLGHR- ORJLFDO VWDQGRII EHWZHHQ FRPPXQLVP DQG FDSLWDOLVP )RU PRVW RI WKH WZHQWLHWK FHQWXU\ WKLVLGHRORJLFDOVSOLWOHGWRWKHJHRJUDSKLFDOGLYLVLRQRI(XURSHDQGDORQJVWDQGLQJPLOL- WDU\FRQIURQWDWLRQEHWZHHQWKHVXSHUSRZHUVDQGWKHLUDOOLHV7KLVFRQIURQWDWLRQZDVLQWHQ- VL¿HG ZLWK WKH GHYHORSPHQW RI QXFOHDU WHFKQRORJ\ 7KH DUULYDO RI WKH LQWHUFRQWLQHQWDO EDOOLVWLFPLVVLOHLQWKHVPHDQWWKDWWKH8665FRXOGEHUHDFKHGIURP86WHUULWRU\DQG YLFHYHUVDZLWKLQ±PLQXWHV:KLOHWKHUHZHUHVHYHUDOPRPHQWVZKHQDFODVKEHWZHHQ WKH VXSHUSRZHUV VHHPHG LPPLQHQW PRVW QRWDEO\ GXULQJ WKH μ&XEDQ PLVVLOH FULVLV¶ DQGLQZKHQWKH86GHSOR\HGPLVVLOHVLQ(XURSHLQUHVSRQVHWRWKHVKRRWLQJGRZQRI D6RXWK.RUHDQDLUOLQHULQ6RYLHWDLUVSDFHWKHFRQIURQWDWLRQQHYHUHVFDODWHGWRIXOOQXFOHDU ZDUIDUH ,QGHHG LW ZDV SUHFLVHO\ WKH DEVHQFH RI GLUHFW PLOLWDU\ DFWLRQ LQ WKH (XURSHDQ WKHDWUHDWOHDVWWKDWJDYHULVHWRWKHWHUPμ&ROG¶:DU :LWKLWVIRFXVRQWKHVHFXULW\GLOHPPDVWDWHV¶VXUYLYDODQGPLOLWDU\FDSDELOLW\SROLWLFDO 5HDOLVPZDVFRQVLGHUHGSDUWLFXODUO\DSSRVLWHWRWKHDQDO\VLVRIVWDWHEHKDYLRXUXQGHUWKH WKUHDW RI QXFOHDU ZDUIDUH GXULQJ WKH &ROG :DU SHULRG +RZHYHU WKH LQDELOLW\ RI 5HDOLVW VFKRODUVWRSUHGLFWWKHHQGRIWKLVSHULRGWRJHWKHUZLWKWKHFKDQJLQJUHDOLW\RIWKHVWUDWHJLF HQYLURQPHQWPHDQWWKDWDQXPEHURIVFKRODUVEHJDQWRTXHVWLRQWKHFRQWLQXLQJUHOHYDQFH RI5HDOLVPDQGWUDGLWLRQDOVHFXULW\VWXGLHVPRUHJHQHUDOO\$FFRUGLQJWRWKLVIDPLOLDUWHP- SRUDOQDUUDWLYHWKHHQGLQJRIWKH&ROG:DUHUDZHQWKDQGLQKDQGZLWKFKDOOHQJHVWRWKH KHJHPRQ\RIWKH5HDOLVWSRVLWLRQLQVHFXULW\VWXGLHVZKLFKLQWXUQSDYHGWKHZD\IRUWKH HPHUJHQFH RI PRUH FULWLFDO DSSURDFKHV VXUYH\HG LQ WKLV YROXPH ,W LV SUHFLVHO\ LQ WKLV FRQWH[WWKDWWKHGLVFRXUVHVRIμEURDGHQLQJ¶DQGμGHHSHQLQJ¶RIWKHVHFXULW\DJHQGDVHHQDV FKDUDFWHULVWLFRIPRYHVDZD\IURPVWDWHFHQWUHGPLOLWDULVPDUHW\SLFDOO\IUDPHG 7KHEURDGHQLQJDQGGHHSHQLQJRIVHFXULW\VWXGLHVLQDPRUHVHOIFRQVFLRXVO\μFULWLFDO¶ YHLQFDQEHUHDGDJDLQVWWKHEDFNGURSRIHYHQWVDQGFKDQJHVDVVRFLDWHGZLWKWKHHQGRIWKH &ROG :DU )RU H[DPSOH WKH GLVVROXWLRQ RI WKH 8665 LQ <XJRVODYLD LQ DQG &]HFKRVORYDNLDLQZKLFKOHGWRKHLJKWHQHGÀRZVRISHRSOHDQGWKHUHFODVVL¿FDWLRQRI IRUPHUO\μLQWHUQDO¶PLJUDQWVDVμLQWHUQDWLRQDO¶PLJUDQWVZDVWKHVSHFL¿FFRQWH[WLQZKLFK
Introduction
(XURSHDQ JRYHUQPHQW RI¿FLDOV PHGLD UHSRUWHUV DQG VHFXULW\ DQDO\VWV EHJDQ WR IUDPH PLJUDWLRQLQWHUPVRIVHFXULW\ IRUPRUHRQWKHVHFXULWL]DWLRQRIPLJUDWLRQVHH&KDSWHU 6LPLODUO\ WKH DGYHQW RI WKH 81 'HYHORSPHQW 5HSRUW LQ ZLWK LWV IRFXV RQ JOREDO DFFHVV WR KHDOWKFDUH HGXFDWLRQ DQG UHVRXUFHV DV FRPSRQHQWV RI μKXPDQ VHFXULW\¶ ZDV D NH\PLOHVWRQHLQWKHUHFRJQLWLRQRIWKHKXPDQDVDUHIHUHQWREMHFWRIVHFXULW\ IRUPRUHRQ KXPDQVHFXULW\VHH&KDSWHU 2QHZD\RIPDSSLQJFULWLFDOVHFXULW\VWXGLHVWKHUHIRUHLV LQWHUPVRIWKHUHODWLRQEHWZHHQWKHZD\WKDWVHFXULW\LVWKHRULVHGDQGWKHKLVWRULFDOFRQWH[W LQZKLFKWKDWWKHRULVDWLRQWDNHVSODFH 7KLVUHODWLRQLVRQFHPRUHDSSDUHQWLIZHFRQVLGHUKRZWKHHYHQWVRI6HSWHPEHU KDYH SURYLGHG D SRZHUIXO IUDPLQJ IRU WKH ZD\ LQ ZKLFK VHFXULW\ KDV EHHQ VWXGLHG LQ WKH HQVXLQJ μZDU RQ WHUURU¶ DQG KRZ FULWLFDO DSSURDFKHV KDYH GHYHORSHG ZLWKLQ WKLV FRQWH[W ,QGHHG FRPSDUDEOH WR WKH IDOO RI WKH %HUOLQ :DOO DQG WKH FROODSVH RI WKH 6RYLHW 8QLRQ μ¶KDVEHFRPHDQRWKHUNH\UHIHUHQFHSRLQWLQDQDUUD\RIWHPSRUDOQDUUDWLYHVIRXQGLQ WKHSUDFWLFHDQGWKHRU\RIVHFXULW\DOLNH3DUWRIWKHVLJQL¿FDQFHDWWULEXWHGWRLQVHFXU- LW\ VWXGLHV GHULYHV IURP WKH IDFW WKDW WKLV GDWH KDV EHHQ LQYRNHG IUHTXHQWO\ E\ WKH 86 DGPLQLVWUDWLRQDQGRWKHU:HVWHUQJRYHUQPHQWVLQIUDPLQJVRIGRPHVWLFDQGLQWHUQDWLRQDO SROLFLHV $ FRPPRQ WKUHDG UXQQLQJ WKURXJKRXW IRUPHU 86 3UHVLGHQW *HRUJH : %XVK¶V VSHHFKHVZDVSUHFLVHO\WKHLGHDRIWZRZRUOGVRQH EHIRUH and one DIWHU the attacks on the :RUOG7UDGH&HQWHUDQG3HQWDJRQ,QKLVVSHHFKFRPPHPRUDWLQJWKH¿IWKDQQLYHUVDU\RI WKHHVWDEOLVKPHQWRIWKH'HSDUWPHQWRI+RPHODQG6HFXULW\RQ0DUFKIRUH[DPSOH %XVKDVVHUWHGμ7KHHYHQWVRI6HSWHPEHUWKHWKGHPRQVWUDWHGWKHWKUHDWVRIDQHZ HUD,VD\³QHZ´EHFDXVHZHIRXQGWKDWRFHDQVZKLFKVHSDUDWHXVIURPGLIIHUHQWFRQWLQHQWV QRORQJHUVHSDUDWHXVIURPGDQJHU¶ 7KHLQYRFDWLRQRIWKLVGDWHDVDWXUQLQJSRLQWEHWZHHQμROG¶DQGμQHZ¶HUDVLVSROLWLFDOO\ VLJQL¿FDQWEHFDXVHLWKDVEHHQUHJXODUO\FLWHGE\WKH86DGPLQLVWUDWLRQDVDMXVWL¿FDWLRQIRU D UDQJH RI UHVSRQVHV WR WKH WKUHDW RI LQWHUQDWLRQDO WHUURULVP WKDW LQFOXGHV PLOLWDU\ LQWHU- YHQWLRQ LQ $IJKDQLVWDQ DQG ,UDT WKH UROOLQJ RXW RI QHZ KRPHODQG VHFXULW\ PHDVXUHV DW KRPHDQGDEURDGDQGDEDWWHU\RIFRXQWHUWHUURULVPSROLFLHVDQGSUDFWLFHV VHH&KDSWHU $UJXDEO\RQHRIWKHGH¿QLQJIHDWXUHVRIDUDQJHRIZRUNDVVRFLDWHGZLWKFULWLFDOVHFXU- LW\ VWXGLHV KRZHYHU KDV EHHQ D FULWLTXH RI WKH XVDJH RI μ¶ DV D NH\ WXUQLQJ SRLQW LQ JOREDO VHFXULW\ UHODWLRQV 5DWKHU WKDQ VLPSO\ DFFHSWLQJ WKH WHPSRUDO QDUUDWLYH RI DV ushering in a new era, this temporal narrative has come under intense scrutiny in the criti- FDOO\RULHQWHGOLWHUDWXUH7KHYHU\SDFNDJLQJRIHYHQWVRQ6HSWHPEHUDVμ¶KDV EHHQ TXHVWLRQHG DV DQ RYHUVLPSOL¿HG FRGLQJ RI D FRPSOH[ VHULHV RI HYHQWV DQG LVVXHV 6RPHVFKRODUVKDYHDOVRSRLQWHGWRZKDWWKH\FRQVLGHUWREHWKHPHGLDK\SHUEROHRIUHSUH- VHQWDWLRQVRIμ¶5HSHDWHGLPDJHVDQGIRRWDJHRIWKHFROODSVHRIWKHLFRQLFWZLQWRZHUV ZHUHZDWFKHGJOREDOO\DQGUHFHLYHGXQSUHFHGHQWHGPHGLDFRYHUDJH:KLOHDFNQRZOHGJLQJ WKHWUDJHG\RIWKHDWWDFNVLWKDVEHHQDUJXHGWKDWRWKHUHYHQWVLQJOREDOSROLWLFVVXFKDVWKH RQJRLQJFRQÀLFWLQ'DUIXUIRUH[DPSOHKDYHE\FRQWUDVWFODLPHGPRUHOLYHV\HWDWWUDFWHG IDUOHVVDWWHQWLRQ The tendency to take 9/11 as an unproblematised starting point in a seemingly continu- RXVVHTXHQFHRIHYHQWVLQWKHμZDURQWHUURU¶QRZNQRZQDVVLPSO\μ¶μ%DOL¶μ,VWDQ- EXO¶μ¶μ0XPEDL¶KDVDOVREHHQFULWLFLVHG$VZHOODVLJQRULQJWKHVSHFL¿FLWLHVRIHDFK RIWKHVHWUDJHGLHVVXFKDQDUUDWLYHLPSOLHVWKDWJOREDOKLVWRU\VRPHKRZ begins ZLWK ,QWXUQDVHPSKDVLVHGE\WKRVHZRUNLQJLQWKHSRVWFRORQLDOWUDGLWLRQWKLVGHKLVWRULFLVHV WKHYDULRXVFRORQLDOOHJDFLHV:HVWHUQIRUHLJQSROLFLHVDQGJOREDOLQHTXDOLWLHVWKDWDUHSDUW RIWKHEURDGHUFRQWH[WLQZKLFKDQGRWKHUWHUURULVWLFHYHQWVFDQEHHPSODFHG IRUPRUH VHH &KDSWHU 6LPLODUO\ VFKRODUV DVVRFLDWHG ZLWK SRVWVWUXFWXUDOLVP DQG ,QWHUQDWLRQDO
Introduction
WKHMRXUQDO &XOWXUHVHW&RQÀLWV HGLWHGE\'LGLHU%LJR were seen to be developing a more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ÀLFW %\ FRQWUDVW VFKRODUV DVVRFLDWHG ZLWK WKH &RSHQKDJHQ 6FKRRO DSSURDFKRULJLQDOO\SURSRVHGWKHFRQFHSWRIμVHFXULWL]DWLRQ¶DVDPHDQVWRZDUGVGHYHORSLQJ DQHZDQDO\WLFDO±UDWKHUWKDQH[SOLFLWO\QRUPDWLYH±DSSURDFKWRWKHVWXG\RIVHFXULW\+HUH WKH IRFXV LV VKLIWHG RQ WR DQDO\VLV RI WKH FRQVHTXHQFHV WKDW IROORZ IURP LQYRNLQJ WKH FRQFHSWRIVHFXULW\SDUWLFXODUO\LQUHODWLRQWRQRQPLOLWDU\LVVXHV RUVHFWRUV DQGSURSR- QHQWVRIVHFXULWL]DWLRQWHQGWREHPXFKPRUHVFHSWLFDODERXWWKHPHULWVRILQFOXGLQJLVVXHV VXFKDVSRYHUW\DQGHQYLURQPHQWDOGHJUDGDWLRQDVμVHFXULW\¶WKUHDWV7KRVHDVVRFLDWHGZLWK WKH3DULV6FKRRODSSURDFKKDYHFRQFHQWUDWHGPRUHRQWKHTXHVWLRQRIKRZVHFXULW\SURIHV- VLRQDOVDQGEXUHDXFUDFLHVμGR¶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μVFKRROV¶KLJKOLJKWVWKHYDUL- DWLRQ EHWZHHQ GLIIHUHQW FULWLFDO DSSURDFKHV UHVLVWLQJ WKH WHPSWDWLRQ WR OXPS WKHVH DSSURDFKHV LQWR RQH FDWHJRU\ 7KH VFKRROV PHWDSKRU DOVR XQGHUOLQHV WKH H[WHQW WR ZKLFK FULWLFDODSSURDFKHVDUHSURGXFWVRILQGLYLGXDODQGFROOHFWLYHLQWHOOHFWXDODFWLYLW\UDWKHUWKDQ WKHRULHVμRXWWKHUH¶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¶VLQLWLDOHIIRUWLQWKLVUHJDUGZDVODUJHO\ LQWHQGHGDVDURXJKVNHWFKRIWKH¿HOGDQGKHDFNQRZOHGJHGWKDWWKHVFKRROVPHWDSKRULV SRWHQWLDOO\SUREOHPDWLFIRUDQXPEHURIUHDVRQV±QRWOHDVWEHFDXVHHDFKRIWKHVHμVFKRROV¶ XVXDOO\FRPSULVHVRQO\DKDQGIXORIVFKRODUVDQGPDQ\PRUHGRQRWFRQYHQLHQWO\¿WZLWKLQ DQ\RIWKHVHWKUHHFDWHJRULHV7KHLGHDRIVFKRROVDOVRULVNVRYHUVWDWLQJWKHFRJHQF\RIWKH SRVLWLRQVWKH\DUHWDNHQWRUHSUHVHQW$VRQHSURPLQHQWUHMRLQGHUDUJXHGWKHVFKRROVFDWH- JRULVDWLRQ μFDQ EH PLVOHDGLQJ LI WDNHQ WRR VHULRXVO\ $EHU\VWZ\WK &RSHQKDJHQ DQG 3DULVDUHGLVSHUVHGORFDWLRQVDVVRFLDWHGZLWKVSHFL¿FLQGLYLGXDOVDQGGHEDWHVPXFKPRUH WKDQXQLWDU\VFKRROVRIWKRXJKW¶ &$6( 7KLVUHVSRQVHE\DODUJHFROOHFWLYHRI VFKRODUV XQGHU WKH UXEULF RI μ&ULWLFDO $SSURDFKHV WR 6HFXULW\ LQ (XURSH¶ &$6( DUJXHG WKDWLQVWHDGRIμVFKRROV¶FULWLFDOVHFXULW\VWXGLHVLQ(XURSHLVEHWWHUWKRXJKWRIDVDQH[WHQ-
Introduction 11
VLYHQHWZRUNZLWKRYHUODSVDQGGLDORJXHEHWZHHQGLIIHUHQWVFKRROVJHQHUDOO\RXWZHLJKLQJ WKHLUGLVWLQFWLRQV2QWKLVUHDGLQJFULWLFDOVFKRODUVKLSRQVHFXULW\DOVRH[WHQGVZHOOEH\RQG school boundaries into anthropology, criminology, human geography, and sociology rather WKDQEHLQJUHVWULFWHGE\VFKRROSHULPHWHUV %\WDNLQJWKHWKUHHVFKRROVLGHDDVDVWDUWLQJSRLQWWKRXJKWKH&$6(FROOHFWLYH¶VDUJX- PHQWLVLWVHOILQGLFDWLYHRIWKHH[WHQWWRZKLFKWKHVFKRROVPHWDSKRUKDVEHFRPHSDUWRIWKH μIXUQLWXUH¶ LQ GHEDWHV RYHU FULWLFDO VHFXULW\ VWXGLHV 7R VRPH H[WHQW WKHQ UHIHUHQFH WR WKHVFKRROVQRPHQFODWXUHLQODWHUFKDSWHUVLVXQDYRLGDEOHEXWZHDUHDOVRDFXWHO\DZDUHRI WKH OLPLWDWLRQV RI WKLV FDWHJRULVDWLRQ DV D ZKROH ,Q SDUWLFXODU WKH WULSDUWLWH JHRJUDSKLFDO GLVWLQFWLRQ PLVVHV RXW RQ WZR LPSRUWDQW DSSURDFKHV WKDW DUH QRW QDPHG DV μVFKRROV¶ EXW ZKLFK QHYHUWKHOHVV FRQVWLWXWH VLJQL¿FDQW FULWLFDO DSSURDFKHV WR VHFXULW\ )HPLQLVW DQG JHQGHUDSSURDFKHV GLVFXVVHGLQ&KDSWHU DQGDSSURDFKHVGHULYHGIURPYDULRXVIRUPVRI SRVWFRORQLDOWKHRU\DQGH[SHULHQFHV GLVFXVVHGLQ&KDSWHU 7KHLQFOXVLRQRIWKHVHWZR DSSURDFKHVLQWKLVWH[WDGGUHVVHVWZRRIWKHRIWHQREVHUYHGODFXQDHLQWKHVFKRROVFDWHJRUL- VDWLRQWKHSODFHRIIHPLQLVWDQGJHQGHUVFKRODUVKLS VHH6\OYHVWHU DQGWKHSRWHQWLDO (XURFHQWULVP:HVWFHQWULVPRIFULWLFDODSSURDFKHV
XQKHOSIXO FKRLFHV DERXW ZKLFK μVFKRRO¶ RI WKRXJKW WR DGRSW ZKLFK KLQGHUV UDWKHU WKDQ DVVLVWVWKHWDVNRIDQDO\VLQJSUHVVLQJLVVXHVLQJOREDOSROLWLFV :KDW ZH ZLVK WR GUDZ DWWHQWLRQ WR WKHUHIRUH LV D UHFRJQLWLRQ RI WKH LPSRUWDQFH RI UHÀHFWLQJFULWLFDOO\RQWKHLQWHOOHFWXDOPDSVZHRIWHQXVHLQFULWLFDOVHFXULW\VWXGLHV0DSV are usually two-dimensional, whereas critical security studies is very much a layered body RIZRUNZLWKPHVV\LQWHUFRQQHFWLRQVDVZHOODVDUHDVRIGLYHUJHQFH7KHWHUUDLQZHDUH GHDOLQJZLWKKDVDFRPSOH[WRSRJUDSK\DQGLWLVSUHFLVHO\WKLVPHVVLQHVVRUYDULHJDWLRQDV UHÀHFWHGLQWKHLPDJHFKRVHQIRUWKLVERRN¶VIURQWFRYHUWKDWZHVHHNWRFRQYH\DQGZRUN ZLWK UDWKHU WKDQ EUXVK WR RQH VLGH 7R JHW DW WKLV LGHD ZH ERUURZ ERWK IURP WKH DUWLVW -DFNVRQ 3ROORFN¶V VLJQDWXUH VW\OH IRU WKH FRYHU DQG IURP WKH FULWLFDO VHFXULW\ VFKRODU 5LFKDUG:\Q-RQHVWKHLGHDRIμWUDYHOLQJZLWKRXWPDSV¶:ULWLQJDERXWWKHVWXG\RIVHFXU- LW\LQWKHFRQWH[WRIWKH&ROG:DU¶VHQG:\Q-RQHVVXJJHVWHGWKDWDVZHOODVWKHFKDQJHV WR FRQYHQWLRQDO PDSV UHTXLUHG E\ WKH GLVVROXWLRQ RI WKH 6RYLHW 8QLRQ WKH ODQGVFDSH RI VHFXULW\DQGLQVHFXULW\ZDVDOVRUDSLGO\FKDQJLQJ±WRWKHSRLQWZKHUHWKHLQWHOOHFWXDOPDSV RIWKH&ROG:DUSURYLGHGE\VHFXULW\VWXGLHVQRORQJHUKDGWKHVDPHSXUFKDVH :\Q-RQHV ,Q WKLV VHQVH VHFXULW\ VFKRODUV ZHUH GHHPHG WR EH WHPSRUDULO\ WUDYHOOLQJ ZLWKRXW
Introduction 13
¿HOG LV DOZD\V D PHVV ± IX]]\ ERXQGDULHV FRQWHQWLRQ PHWKRGRORJLFDO TXDQGDULHV¶ DOWKRXJKWKHVDPHFRPPHQWDWRUZDUQVWKDWWKLVFDQμEHFDUULHGWRRIDU¶ 0RUJDQ :HZRXOGDUJXHWKDWWKLVUHFRJQLWLRQLVRIWHQQRWFDUULHGIDUHQRXJKLQUHODWLRQWRFULWLFDO DSSURDFKHVWRVHFXULW\DQGWKDWWKHPHULWVRIFULWLFDOVHFXULW\VWXGLHVDVDQμDFWLYH¿HOG¶RI SUHFLVHO\WKLVVRUWDUHIUHTXHQWO\PLVVHG5DWKHUWKDQFOXPSLQJDSSURDFKHVWRJHWKHURUSUH- maturely prescribing the boundaries between and around critical approaches to security, then, we instead opt to invite readers to engage in their own critical cartography in reading WKLVWH[W7KHFKDSWHUVFDQEHUHDGLQRURXWRIWKHVHTXHQFHLQZKLFKWKH\DUHSUHVHQWHGRQ WKHFRQWHQWVSDJHRUZLWKFKDSWHUVLQ3DUW,UHDGLQWDQGHPZLWKWKRVHLQ3DUW,,DQGYLFH YHUVD 7KH WH[W DV D ZKROH DQG LWV LQGLYLGXDO FKDSWHUV DUH GHVLJQHG LQ VXFK D ZD\ DV WR DOORZUHDGHUVWRLGHQWLI\HQJDJHDQGMXGJHWKHLQWHUFRQQHFWLRQVDQGGLVMXQFWLRQVEHWZHHQ FULWLFDO DSSURDFKHV WR VHFXULW\ IRU WKHPVHOYHV 8VLQJ WKH WH[W LQ WKLV ZD\ ZLOO ZH KRSH SURYHDSURGXFWLYHZD\RILQWURGXFLQJDQGFRQQHFWLQJUHDGHUVWRWKHVXEMHFWPDWWHURIFULW- LFDOVHFXULW\VWXGLHV
.HLWK .UDXVH DQG 0LFKDHO & :LOOLDPV Critical Security Studies: Concepts and Cases /RQGRQ8&/3UHVV $ODQGPDUNDUWLFXODWLRQRIDQGFRQWULEXWLRQWRWKH¿HOGRIFULWLFDOVHFXULW\ VWXGLHV %DUU\%X]DQDQG/HQH+DQVHQ 7KH(YROXWLRQRI,QWHUQDWLRQDO6HFXULW\6WXGLHV &DPEULGJH &DPEULGJH8QLYHUVLW\3UHVV 2IIHUVDFRPSUHKHQVLYHLQWHOOHFWXDOKLVWRU\RIVHFXULW\VWXGLHV 6WHYH6PLWK μ7KH,QFUHDVLQJ,QVHFXULW\RI6HFXULW\6WXGLHV&RQFHSWXDOL]LQJ6HFXULW\LQWKH /DVW7ZHQW\<HDUV¶LQ6WXDUW&URIWDQG7HUU\7HUULII HGV &ULWLFDO5HÀHFWLRQVRQ6HFXULW\DQG Change /RQGRQ)UDQN&DVV 3URYLGHVDFRPSUHKHQVLYHRYHUYLHZRIFULWLFDOVHFXULW\VWXGLHVDVLW VWRRGDWWKHWXUQRIWKHPLOOHQQLXP &$6( &ROOHFWLYH μ&ULWLFDO $SSURDFKHV WR 6HFXULW\ LQ (XURSH $ 1HWZRUNHG 0DQLIHVWR¶ Security Dialogue ± $ GHWDLOHG RYHUYLHZ RI WKH VWDWH RI FRQWHPSRUDU\ FULWLFDO DSSURDFKHVWRVHFXULW\WKDWDOVRDWWHPSWVWRRXWOLQHQHZDYHQXHVRILQTXLU\ -HI+X\VPDQV μ6HFXULW\:KDWGR\RXPHDQ"¶ (XURSHDQ-RXUQDORI,QWHUQDWLRQDO5HODWLRQV , ±)RFXVHVRQWKHLVVXHVDVVRFLDWHGZLWKGH¿QLQJWKHFRQFHSWRIVHFXULW\IRUFRQWUDVWLQJ GLVFXVVLRQVRQDVLPLODUWKHPHVHH:ROIHUV DQG%DOGZLQ GHWDLOVLQ%LEOLRJUDSK\
Abstract $PRQJ WKH PXOWLSOH FULWLFDO DSSURDFKHV WR VHFXULW\ RQH VSHFL¿F YDULDQW ± &ULWLFDO 6HFXULW\ 6WXGLHV &66 RU WKH μ:HOVK 6FKRRO¶ DSSURDFK ± KDV VRXJKW WR H[SOLFLWO\ OLQN WKH VWXG\ RI VHFXULW\WR&ULWLFDO7KHRU\7KLVFKDSWHUORFDWHVWKHNH\LQWHOOHFWXDORULJLQVDQGGHYHORSPHQWV LQWKLVLQWHUSUHWDWLRQRI&ULWLFDO6HFXULW\6WXGLHVEHIRUHPRYLQJRQWRGLVFXVVLQPRUHGHWDLO LWVFHQWUDOLGHDV+HUHSDUWLFXODUDWWHQWLRQLVSDLGWRWKHFRQFHSWRIμHPDQFLSDWLRQ¶DVYLHZHG IURPD&66SHUVSHFWLYHDQGWKHLVVXHRIKRZVHFXULW\WKHRU\DQGVHFXULW\SUDFWLFHVDUHUHODWHG WRRQHDQRWKHUZLWKLQ)URPKHUHWKHFKDSWHUJRHVRQWRGLVFXVVVRPHRIWKHPRVWSURPLQHQW FULWLFLVPVRI:HOVK6FKRRO&66EHIRUHHYDOXDWLQJWKHFRQWULEXWLRQVOLPLWDWLRQVDQGSRWHQWLDOL- WLHVRIWKLVSDUWLFXODULQWHUSUHWDWLRQRIWKHUHODWLRQVKLSEHWZHHQ&ULWLFDO7KHRU\DQGVHFXULW\
cance appending the word ‘critical’ to ‘security studies’ has been interpreted in several dif- ferent ways. One particular school of thought – known variously as ‘Critical Security Studies’, ‘CSS’ (upper case), or sometimes as the ‘Welsh School’ of security studies (see %R[ ±DUJXHVWKDWUHODWLQJWKHVWXG\RIVHFXULW\WRμ&ULWLFDO7KHRU\¶JHQHUDWHVDVSHFL¿F range of theoretical, methodological, and normative implications. One proponent has summed up these implications as entailing the ‘Broadening’, ‘Deepening’, ‘Extending’, and ‘Focusing’ of security studies (Wyn Jones 1999: 166): ‘Broadening’ refers to a con- ception of security studies that includes a range of issues beyond military force under the rubric of security. ‘Deepening’ implies a theoretical approach to security that connects our understandings of security to deeply rooted assumptions about the nature of political life more generally. ‘Extending’ denotes the expansion of the security studies agenda to recog- nise not only a multiplicity of issues, but also a multiplicity of actors beyond the state as sites of insecurity including, most fundamentally, individual human beings. Finally, CSS claims to provide an approach to security that is ultimately ‘focused’ in the sense that it is grounded in a particular normative goal: that of human ‘emancipation’. This self-styled Critical approach to security departs radically from more conventional (or ‘traditional’) approaches to security for reasons that are discussed in more detail later in the chapter. However, while some of the moves made by the Welsh School’s Critical Security Studies/CSS-project are shared by the other approaches gathered under the critical umbrella, other commitments entailed in its relation of Critical Theory and security have
_ 3UREOHP6ROYLQJ7KHRU_ , Cox argued, takes the nature of world politics as a ‘given’. In other words, it assumes that there are a number of actors and issues that we should always focus upon. In security studies, this was traditionally manifested in the assumption that states are key actors in world politics, and that war between states is the central problem to be ‘solved’ in world politics. Cox argued that _&ULWLFDO7KHRU_ , by contrast, should critically interrogate the Traditional DVVXPSWLRQVPDGHE\SUREOHPVROYLQJWKHRU\:K\VKRXOGZHGRWKLV"&R[DUJXHGWKDWE\ assuming that world politics is simply a range of problems – such as the problem of war between states – to be resolved, we risk missing out on key dimensions of world politics WKDWGRQ¶W¿WVTXDUHO\LQWRDSUREOHPVROYLQJPLQGVHW0RUHWKDQWKLVZHDOVRHPEHGDQG legitimate the ‘problems’ we set out to study. What we should be doing is critically interro- gating the way that the SUREOHP is set up. Fundamentally, Cox argued, Problem-Solving and Critical Theory can also be distin- guished by their approaches to knowledge (Cox 1981). Whereas Problem-Solving Theory assumes that scholars can attain and produce knowledge of the world in an objective and value-neutral fashion, Critical Theory assumes that because academic analysts are neces- sarily embedded within the social world they seek to analyse, knowledge has an inherently social character. Hence there is no easy distinction that can be made between ‘facts’ and ‘values’. When building a theory or presenting an argument, we necessarily concentrate on some ‘facts’ and not others, highlight certain issues, and cover others in less detail or not at all. All of these decisions will be affected by our own social position, education, beliefs, and so on. The way that we as analysts choose to piece these elements together to either IUDPHRUDGGUHVVDVSHFL¿FμSUREOHP¶LQZRUOGSROLWLFVLVWKHUHIRUHQRWDQHXWUDODFWLWLV an act that is, consciously or not, built upon a series of choices as to what counts as import- ant and what does not. In turn, the ways that particular theories interpret and present the world will have consequent effects for how others view it, how decisions get made, where we devote our attention, how resources get distributed, and so on. This led Cox, drawing on the ideas of Antonio Gramsci (see Box 1.4), to make his now famous pronouncement that ‘theory is always IRU someone and IRU some purpose’ (1981: 128). If we apply this perspective to the discipline of security studies, it has far-reaching implications. Security studies originally developed with the explicit mandate of solving the problem of war and instability in world politics. It had clear objects of analysis – states – and a clear goal – explaining why states go to war. One of the key exponents of this vision of security studies, Stephen Walt, has succinctly argued that ‘security studies may be GH¿QHG DV WKH VWXG\ RI WKH WKUHDW XVH DQG FRQWURO RI PLOLWDU\ IRUFH ¶ 0RUH VSHFL¿FDOO\ Walt advised that security studies was best understood as the study of ‘the conditions that make the use of force more likely, the ways that the use of force affects individuals, states DQGVRFLHWLHVDQGWKHVSHFL¿FSROLFLHVWKDWVWDWHVDGRSWLQRUGHUWRSUHSDUHIRUSUHYHQWRU engage in war’ (1991: 212, emphasis in original). This view of security studies, which originates from Neo-Realist International Relations theory, is what has become known to its critics in CSS as ‘Traditional Security Studies’. As in Problem-Solving theory, the central problem to be addressed (war) is already assumed in this view, as are the key actors (states). Although Walt makes reference to individuals and societies, he leaves us in no doubt that their security is predicated upon the policies adopted by states and that states should, by consequence, be the primary area of concern for secur- ity studies. In keeping with the Coxian approach, critics of the ‘Traditional’ approach argue that this narrowly focused problem-solving approach has several weaknesses. They claim
20 Approaches
that Traditional security studies tends to accept the world ‘as it is’, assuming that analysts simply produce knowledge about the world ‘out there’. Traditional security studies assumes a number of ‘enduring features’ of world politics, most prominently it assumes war between states as the enduring recurrent feature of the international system. So in other words, Traditional security studies accepts (i) the state, (ii) the ‘anarchic’ nature of the international system (the idea that there is no higher authority or actor above the state level), and hence that (iii) wars between states are an inherent feature of the international system. During the Cold War in particular, these factors tended to be taken-for-granted starting points for the study of security. Scholars operating within the CSS framework argue that accepting war as the fact of international life LVSDUWRIWKHSUREOHP. Think about the logic here: if we begin from the assumption that war is a natural feature of international life, then we are perpetually limited to efforts to constrain it. Following the broader critical move within Critical International Relations theory espoused by Cox, what CSS argues is that we need to be sceptical about WKHDFWXDOEHQH¿WVRIDQH[FOXVLYHIRFXVRQZDUDQGFRQÀLFWZKLFKWKRXJKVWLOORIJUHDW importance, are but one among a multitude of contemporary security issues. Instead of the ‘problem-solving approach’ proponents of CSS have called for a study of security that ‘goes beyond problem-solving ZLWKLQ the status quo and instead seeks to help engage with the problem RI the status quo’ (Booth 2005a: 10). A primary objection to the traditional approach is that it is too narrowly focused on the military security of states (what is often referred to as ‘state-centrism’ or ‘statism’). In doing so it paints a static picture of international life that claims to simply portray the world ‘as it is’, but also makes a powerful political statement in assuming that fundamental change in the nature of world politics is virtually impossible. After the end of the Cold :DUZKLFKUDGLFDOO\XQGHUPLQHGFRQ¿GHQFHLQWKLVWUDGLWLRQDODSSURDFKEHFDXVHRILWVSUH- FOXVLRQ RI VLJQL¿FDQW LQWHUQDWLRQDO FKDQJH D QXPEHU RI FULWLFLVPV HPHUJHG RI WKLV VWDWH centric security focus and these have helped inform the emergence of CSS. First the contention is that state-centrism is HPSLULFDOO\XQKHOSIXO : in other words, that it is an incomplete description of the nature of contemporary world politics. Following the &ROG:DUFRQÀLFWEHWZHHQVWDWHV±WKHFHQWUDOWUDGLWLRQDOIRFXV±ZDVDUJXDEO\QRORQJHU the biggest issue in world politics. In the 1990s, the frequency of wars ZLWKLQ (rather than between) states led some to coin the concept of ‘New Wars’ (Kaldor 1999), to describe con- ÀLFWVVXFKDVWKRVHWKDWKDYHRFFXUUHGZLWKLQ the former Yugoslavia, Somalia, Rwanda, and later in Sudan. In this context the Traditional focus on wars between states seemed poorly equipped to grasp either the localised nature of new wars or the ways in which they are HPEHGGHGZLWKLQJOREDOFRPSOH[HVRIPLOLWDULVPDLGDQGGHYHORSPHQW 'XI¿HOG Second was that state-centrism often acts as a MXVWL¿FDWLRQRIWKHVWDWXVTXR : in other words LWMXVWL¿HVWKHSUHVHUYDWLRQRIWKHVWDWHV\VWHP,QWKHμGHYHORSHGZRUOG¶VWDWHVPLJKWZHOOEH argued to uphold the liberty of their citizens; but in many parts of the ‘developing world’ states can be the biggest threat to the liberty, human rights, and lives of their citizens. Some peace theorists have argued that in many cases, states can be a source of VWUXFWXUDOYLROHQFH – that states are often a major cause of poverty and repression for their citizens (Galtung 1996). Drawing on this line of thinking, scholars such as Richard Wyn Jones argue that we should approach the traditional assumption of the state as protector of its citizens with caution:
Even if a very narrow, military understanding of security is applied, it is apparent that the arms purchased and powers accrued by governments in the name of national secur- ity are far more potent threats to the liberty and physical safety of their citizens than