Plugging the GAP. Working with Buzan: the Ilisu Dam As a Security

Total Page:16

File Type:pdf, Size:1020Kb

Plugging the GAP. Working with Buzan: the Ilisu Dam As a Security Plugging the GAP Working with Buzan: the Ilisu Dam as a security issue by Jeroen Warner1 [email protected] Occasional Paper No 67 SOAS Water Issues Study Group School of Oriental and African Studies/King’s College London University of London Jan 2004 The paper was originally drafted in April 2000 for a seminar at McGill University, Montreal. Summary This paper summarises and develops current theorising on the politicisation and securitisation of transboundary waters. Inspired by the ideas of Buzan, Waever and de Wilde (1998) it sheds light on the inter- and transnational politics of water projects and shows how linkage politics are explained and shown to be relevant in the water sector. The case of the Ilisu Dam project in south-eastern Turkey is used to illustrate how actors can operate in the domain of shared waters and how, through performing speech acts and creating material facts, they seek to influence the sovereignty and integrity of water resources and their use and allocation in complex circumstances. Key words: water, politicisation of water, securitisation of water, linkage in hydropolitics, trans- boundary waters, Ilisu Dam, Euphrates-Tigris basin. Introduction Eleven years after the fall of the Berlin Wall, we still have no consensus over what 'security' entails. While the concept has branched out into many directions, both horizontally (issue-areas) and vertically (levels of security), there is no unifying model of security in general use. More's the pity as the Babel of security talk not only prevents a clear academic debate, the discourse of security has rather important political implications. The present essay will argue that the security framework devised by Barry Buzan, Ole Waever and Jaap de Wilde can be useful in analysing international relations issues, as it introduces a grid in which non-traditional domains and levels of security can find a place. The concept of a 'securitising move' helps understand how 'security' can be subject to political manipulation. Enhanced by ideas from linkage politics, it can be used to make sense of different actor's strategies. With Buzan, I surmise that an instrumentality may underlie this: language may be used for the ulterior purpose of dominating a security domain, which in turn may help change the balance of power within the 1 Project co-ordinator (Multi-Stakeholder Platforms for Integrated Catchment Management), Irrigation and Water Engineering Group, Wageningen University, email: [email protected] , PhD candidate, Flood Hazard Research Centre, Middlesex University. 1 decision-making regime. At the substantive level, this article is especially concerned with the issue-area of water management. As a vital resource for which there is no substitute, water is fundamental to our collective survival and many have sounded alarm bells over potential 'water wars'. Moreover water is generally felt to be in crisis (e.g. Gleick 1993). Yet while the idea of 'water security' is clearly on the rise - the next Stockholm Water Symposium, scheduled for mid-August 2000, even has this as its central theme (see www.siwi.org), water security has not even been theorised. The present paper will kick off with a brief history of the bewildering expansion of the use of 'security' into a range of non-state, non-military areas. The Buzan model is then introduced in Section 1.2 as a way of structuring this rather chaotic field. In Section 2, a number of shortcomings are identified that need to be addressed to enhance the usefulness of the system in nontraditional security issues. I will argue that to arrive at a truly systematic understanding of security in its range of uses, and hopefully detect a pattern, we need to look into the way non-IR disciplines such as psychology and anthropology understand 'security'. One way of teasing out this pattern is presented in '2.1. It is noted that psychological theory reminds us that security is only one of two basic motives for action: security and risk, and that risk itself is two-sided as well ('2.2). Having explored the roots of security and expanded the model, Ole Waever's concept of 'securitisation' is introduced as a discursive strategy in '2.3, which in fact brings in an element of 'instrumentalist constructivism'. This strategy is expanded in '2.4. Section 3 outlines the case study, which deals with the controversy over the Ilisu Dam, which is part of the Turkish multi-dam Great Anatolia Project. The interest of this controversy is that it involves state, private and NGO actors, at the national and international level, and therefore likely to bring in different types of security strategies at different levels. The case is re-interpreted in light of the theory in Section 4, followed by a Conclusion. 1. Security revisited: beyond Westphalia Writing on security has traditionally been dominated by International Relations scholars, who traditionally wrote on the art of war and diplomacy. According to IR conventional wisdom, the present organisation of international society was created with the Peace of Westphalia of 1648. Formally independent, endowed with absolute sovereignty- the supreme, independent and final authority - clearly separated by borders and the obligation of non-intervention in domestic affairs of other states, states are commonly portrayed as unitary, impenetrable billiard balls. States are assumed to be acting to maximise its own 'national' interest and always on the lookout for power and stability. The state's key interest, however, is national security. A state, it is maintained, will always attempt to maximise means to safeguard its security in direct ratio to perceived threats to state survival. The Westphalian paradigm clearly gives priority to military security and diplomatic relations (high politics) over development issues including economic and environmental problems (low politics). High politics is followed closely by top decisionmakers; low politics is left to the relevant minister or delegated to civil servants, and only exceptionally capture high-level attention (Mouritzen 1996: 67). Countries that fail to solve their high politics differences will never cooperate on low politics (Lowi 1993). But the traditional division is not cast in stone - it is up to the state to decide what is high politics (Mouritzen, 1996: 73). Foreign affairs agendas become larger and more diverse, and the traditional hierarchy among issues are falling away. 'No longer can all issues be subordinated to military security.' (Keohane and Nye 1977). Most notably, 'economic security' (re)surfaced as a policy concern in the administration after Ezra Vogel questioned U.S. superiority (1979). As Japan's economic power grew to rival American hegemony, and trade wars with the European Union became commonplace in the mid-80s, students of International Political Economy started to focus on economic security, raising a formerly 'low-politics' issue into the domain of 'high politics'. There was not just a horizontal shift in 'security domains' going on, a renewed interest at other levels of security was also noticeable. At roughly the same time the concept of human security gained currency. The 1982 Palme (UN) Commission on Disarmament and Security issues was apparently the 2 first to include environmental security, and soon UNDP started including noneconomic indicators such as literacy, longevity and health in its Human Development Report in 1987, partly in response to the 1982 Palme Commission which is credited with introducing the concept of 'human security'. This shifted the level of analysis away from states towards communities and individuals, from warheads to hospital beds. Later the Bonn Declaration defined human security as '...an absence of the threat to human life, lifestyle or culture' (cited in Solomon 1999) suggests a cultural domain of security. Finally, environmental security drew attention to the subject of security: the environment, and people depending on it, though in the subsequent policy debate environmental security has generally come to mean threats to nation-states from conflict over environmental resources (see, for example, the thorough discussion of the literature by Gleditsch 1997). I will briefly touch on two types of criticism the rise of environmental security has elicited. A purist approach to security has warned against the inflationary use of security (e.g. Deudney 1990) and the extension of security to other domains than the military sector and the state. These are essentially two different problems. It is eminently possible to accept the broadening of categories to include non-military domains while still subscribing to a worldview in which the state is the key nexus between the local and global levels and be concerned with controlling risk and conflict. Others have recognised that military security, concerned with protecting territory and independence, is only one domain in which conflicts are meted out. The other type of unease came from a radical perspective pointing at the Hobbesian-Malthusian fallacy of equating scarcity with violent conflictm then presents strengthening the Westphalian state as the only solution. Critical authors have questioned the suitability of the state, notably the military, to provide environmental security, it being among the worst polluters (Dalby 1997) and warned against more pervasive intervention and the danger of a panoptic state (Klein 1997). Finally, Duffield (1999) has pointed at a worrying convergence of international development aid and security politics. Perhaps, as a close reading of his article suggests, the rise of 'environmental security' is part of a rather grander design, a concept of control? (Warner 2000). The next section will briefly venture into this possibility. Turbulence and insecurity Nonmilitary forms of security slowly but surely attracted interest in academic circles but also in the NATO community. It is tempting to surmise cynically that the rise of environmental security was about a discredited security establishment inventing new challengesto legitimse its privileged role. Indeed, in the early 1990s President Bush assigned his former employer, the Central Intelligence Agency, to search for and analyse new security problems (Lipschutz 1995).
Recommended publications
  • Security Dialogue
    Security Dialogue http://sdi.sagepub.com/ Gender Identity and the Subject of Security Gunhild Hoogensen and Svein Vigeland Rottem Security Dialogue 2004 35: 155 DOI: 10.1177/0967010604044974 The online version of this article can be found at: http://sdi.sagepub.com/content/35/2/155 Published by: http://www.sagepublications.com On behalf of: International Peace Research Institute, Oslo Additional services and information for Security Dialogue can be found at: Email Alerts: http://sdi.sagepub.com/cgi/alerts Subscriptions: http://sdi.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://sdi.sagepub.com/content/35/2/155.refs.html >> Version of Record - Jun 1, 2004 What is This? Downloaded from sdi.sagepub.com at Bobst Library, New York University on January 26, 2012 01_Security Dialogue 35/2 5/18/04 10:37 AM Page 155 Gender Identity and the Subject of Security GUNHILD HOOGENSEN & SVEIN VIGELAND ROTTEM* University of Tromsø, Norway This article is a contribution to the ongoing debate on human security in Security Dialogue; the authors argue that they provide an illustra- tion of the complexity and dynamism of security. To illustrate this point, the authors examine security through the notion of societal security as understood by Ole Wæver, and use identity as a ‘door’ to a broader understanding and use of the concept of security. The focus of the article is gender identity as an integral perspective of security. In conjunction with elite-defined state interests, identity articulates the security interests of ‘significant groups’, supporting the articula- tion of security needs by individuals (as they identify themselves with various significant groups) and communities.
    [Show full text]
  • Political Science in Motion and JEAN-FREDERIC MORIN R a E M D I O T N I a O
    Political Science in Motion_Political Science in Motion 16/11/15 10:52 Page1 This book examines recent developments in political science research. What n EDITIONS DE L’UNIVERSITE DE BRUXELLES o are the new influences to which the discipline opens itself up? Is political i t science research converging towards a single model or splitting into different N N o st I streams? What are the new challenges at the beginning of the 21 century? By A R M M addressing these questions, this collection of essays discusses three O O M C n interrelated topics: the relationship between political science and the C i A I problems of politics, the relationship between political science and other N R e E fields of research, and the transformation of the profession. In so doing, this O D c M E volume traces the major trends in contemporary political science research A n R R F e - since the end of the Cold War. Y i N B A c D E J E S As part of this approach, the authors rely on the academic journals as a field T D I l of investigation. Each of the eight chapters focuses on a different journal, N D Political Science a A E c including the American Political Science Review , West European Politics, the i t British Political Science Review , Security Dialogue , the Journal of Common i l Market Studies , International Security , Electoral Studies and the Revue o in Motion française de science politique . n P o i The book is intended to scholars with an interest in the historiography of t political science, the epistemology of knowledge, the sociology of the o M EDITED BY profession as well as the evolution of the field in terms of research agendas, theoretical approaches and methodological debates.
    [Show full text]
  • The Copenhagen School and Japan in the Late Tokugawa Period 1853-1868
    The Copenhagen School and Japan in the Late Tokugawa Period 1853-1868 History and International Relations 1 Abstract This paper analyses Japan in the late Tokugawa period using the Copenhagen School of security studies as a theoretical framework. The scope of analysis lies strictly within the time period of 1853-1868. The intended nature of the analysis is simple, and mainly aims to understand the late Tokugawa period through the lens of the Copenhagen School. It also aims to contribute to the literature of the subject area, in that it uses an interpretivist international relations theory to analyse the late Tokugawa period in Japan. The theoretical framework is applied by examining three of the Copenhagen School’s core aspects—securitization theory, regional security complex theory, and the broadening of the security agenda into five distinct sectors—and applying each of them in turn. The analysis draws from a range of examples from the given time period, largely focusing on domestic attitudes towards the prospect of modernization and Westernization, and foreign economic and imperial interests towards Japan. The analysis also considers the actions of contemporary actors at various levels of analysis, and analyses them as acts of securitization where suitable. The analysis finds that the use of the Copenhagen School as a mode of historical enquiry produces a nuanced and structured understanding of various aspects of late Tokugawa Japan. By placing the case study in the context of securitization theory, regional security complex theory, and analysing empirical examples with respect to the five sectors of security, the events of late Tokugawa Japan can be construed as a constructivist network of security dynamics, as opposed to a traditional reading of history in a simple chronological fashion.
    [Show full text]
  • A Critical Application of Securitization Theory: Overcoming the Normative Dilemma of Writing Security
    A Critical Application of Securitization Theory: Overcoming the Normative Dilemma of Writing Security Catherine Charrett International Catalan Institute for Peace [email protected] / [email protected] This text is based on the author’s Masters dis- sertation: “Taking on the Normative Dilemma of Writing Securitization: A Critical Approach”, submitted in 2008 as partial fulfillment of the requirements of a Masters of Science in Interna- tional Relations from the London School of Eco- nomics in London, England. Institut Català Internacional per la Pau Barcelona, desembre 2009 © 2009 Institut Català Internacional per la Pau Gran Via, 658, baix. 08010 Barcelona (Spain) T. 0034 93 554 42 70 | F. 0034 93 554 42 80 [email protected] | www.icip.cat Editors Javier Alcalde and Rafael Grasa Editorial Board Pablo Aguiar, Alfons Barceló, Catherine Charrett, Gema Collantes, Caterina Garcia, Abel Escribà, Vicenç Fisas, Tica Font, Antoni Pigrau, Xavier Pons, Alejandro Pozo, Mònica Sabata, Jaume Saura, Antoni Segura and Josep Maria Terricabras Graphic Designer Cla-se ISSN 2013.5793 (on line edition) 2013.5785 (paper edition) DL B-38.039-2009 All rights reserved ABSTRACT (ENG) This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent.
    [Show full text]
  • Downloaded from Brill.Com09/24/2021 03:39:49PM Via Free Access 524 Jackson-Preece
    The Hague Journal of Diplomacy 13 (2018) 523-544 brill.com/hjd Rearticulating the Friend–Enemy Distinction within States: The HCNM’s ‘New Diplomacy’ of Desecuritization Jennifer Jackson-Preece European Institute; Department of International Relations, London School of Economics and Political Science, London WC2A 2AE, United Kingdom [email protected] Received: 1 August 2017; revised: 27 March 2018; accepted: 1 May 2018 Summary This article’s premise is that the practice of representatives of international organiza- tions has something important to tell us about what it means to ‘do desecuritization’. The analysis provides a qualitative process-tracing of diplomacy by the Organization for Security and Co-operation in Europe’s (OSCE’s) High Commissioner on National Minorities (HCNM). It finds that ‘new diplomats’ can ‘do desecuritization’ differently. By rearticulating norms, as well as negotiating interests, the HCNM is able to escape the constraints imposed by security grammar and begin to transform the friend–enemy distinction within states. ‘New diplomats’ like the HCNM are capable of initiating such fundamental changes within states because their non-state platforms and institution- al cultures transcend traditional international dichotomies of ‘us’ and ‘them’. These findings add nuance to our understanding of desecuritization as practice and suggest a novel methodological approach for studying desecuritization empirically. Keywords Organization for Security and Co-operation in Europe (OSCE) − OSCE High Commissioner on National Minorities (HCNM) − norm entrepreneur − desecuritiza- tion − national minorities − conflict prevention © koninklijke brill nv, leiden, 2018 | doi:10:1163/1871191X-13030027Downloaded from Brill.com09/24/2021 03:39:49PM via free access 524 Jackson-Preece Introduction (De)securitization has emerged as an important theoretical framework in which to think about the questions that diplomats have traditionally handled: how to preserve peace in the threat of conflict; and, even more fundamentally, how to replace enmity with friendship.
    [Show full text]
  • Securitization of Energy Through the Lenses of Copenhagen School 1
    The 2013 WEI International Academic Conference Proceedings Orlando, USA SECURITIZATION OF ENERGY THROUGH THE LENSES OF COPENHAGEN SCHOOL 1 Sezer Özcan PhD Fellow, Bielefeld Graduate School in History and Sociology (BGHS), Bielefeld University, Germany Paper prepared for the 2013 Orlando International Conference, 21-23 March, 2013, West East Institute, Orlando/USA. Abstract ‘Security’ is considered one of the most significant concepts within International Relations (IR) studies, prompting much serious debate around it. At the beginning of the twenty-first century, broad literature has emerged on the concept of security and the field of Security Studies. New definitions of security emerged following the Cold War, and the debates moved beyond military issues through to other fields such as economic, environmental and societal issues. In this context, the theory of securitization, which is contributed to the IR literature by the Copenhagen School as a mode of analyzing security processes, has also emerged within Security Studies. The theory represents a new and alternative approach applied by many scholars in their analysis of security politics in all sectors. It fundamentally analyses how an issue is brought up to the level of security by the speech act, namely explaining how issues are securitized, and what methods are involved. Within such a framework, this paper is dedicated to discussing the security approach of the Copenhagen School (CS), and particularly the theory of securitization, in order to form a theoretical framework to analyze the issue of energy securitization. With the security approach of the School, the framework enables analyzing the issue of energy (particularly oil and natural gas) through the perspective of securitization, and to discuss how the issue of energy has moved into security issues.
    [Show full text]
  • Prémisses Et Usages Politiques De Conceptions « Non-Traditionnelles
    Delphine Allès, Pascal Vennesson, The State and Military Sources of Comprehensive Security -- ISA 2017 -- Do not cite or quote The State and Military Sources of Comprehensive Security in Southeast Asia Delphine Allès University Paris-Est Créteil, LIPHA 61 avenue du Général de Gaulle 94010 Créteil Cedex – France Email: [email protected] Pascal Vennesson S. Rajaratnam School of International Studies Nanyang Technological University Block S4, Level B4 Nanyang Avenue Singapore 639798 Email: [email protected] Prepared for delivery at the 58th International Studies Association Annual Convention, Baltimore, Maryland, February 22th-25th, 2017 Abstract: Broader security advocates commonly assume that widening the concept of security to include other sectors than the military, giving equal emphasis to domestic and trans-border threats, and allowing for a transformation of the conflictual logic of international and domestic security go together. In this paper, we argue that this conventional account is mistaken. By examining the sources and manifestations of the broader security agenda in Indonesia, Malaysia and, at the regional level, ASEAN we show that the broader security agenda has old and deeply influential military and strategic roots with unsettling policy and normative implications. Our argument is important for three reasons. First, this dimension is left out of most accounts of non-traditional security in South East Asia (SEA) which tend to apply common human/non-traditional security narratives to regional concerns in order to evaluate the relevance of government initiatives, leaving an important theoretical gap given the increasing calls for non-Western approaches to IR. Second, our argument helps to explain why SEA governments have been among the early promoters of non-traditional security narratives.
    [Show full text]
  • Conflict and Diplomacy in the Middle East Written by Yannis Stivachtis
    Conflict and Diplomacy in the Middle East Written by Yannis Stivachtis This PDF is auto-generated for reference only. As such, it may contain some conversion errors and/or missing information. For all formal use please refer to the official version on the website, as linked below. Conflict and Diplomacy in the Middle East https://www.e-ir.info/2018/10/04/conflict-and-diplomacy-in-the-middle-east/ YANNIS STIVACHTIS, OCT 4 2018 This is an excerpt from Conflict and Diplomacy in the Middle East: External Actors and Regional Rivalries. Get your free copy here. The Middle East occupies a unique geographical and strategic position. Hence, it is not a coincidence that every great power in history has sought to advance its interests in the region. In addition to its geographical and strategic uniqueness, the Middle East is the birthplace and spiritual center of the three most important monotheistic religions, namely Christianity, Judaism and Islam, as well as the greatest single reserve of oil. Last, but not least, due to its geopolitical importance, any inter- and intra-state conflict in the Middle East has the potential not only of destabilizing the region as a whole or upsetting the regional balance of power but also affecting global stability. For these reasons, the Middle East has been a major center of world affairs; an economically, politically, and culturally sensitive area. The purpose of this volume is to provide an account of international relations in the contemporary Middle East. To address the question of regional order, attention will focus on the policies of external actors – such as the United States (US), Russia, China, the European Union, and the United Nations – as well as on regional hegemonic aspirations and resulting rivalries.
    [Show full text]
  • Securitisation and Desecuritisation of Drug Trafficking at the Brazilian
    Contexto Internacional vol. 41(1) Jan/Apr 2019 http://dx.doi.org/10.1590/S0102-8529.2019410100011 International Security and New Threats: Securitisation and Silva & Pereira Desecuritisation of Drug Trafficking at the Brazilian Borders Caroline Cordeiro Viana e Silva* Alexsandro Eugenio Pereira** Abstract: The expansion of the security agenda was at the basis of the emergence of new theoretical concepts in the field of studies on international security. One example is the concept of securitisa- tion, developed by the Copenhagen School, which makes it possible to examine, on the one hand, new threats to the security of countries and, on the other hand, the policies through which they seek to address them. Based on this concept, the article argues that drug trafficking was securitised by the Brazilian government in the period of 2011-2016. From 2016, with the issue of Decree nº 8903, the matter returned to the stage of ‘politicisation’ as understood by the Copenhagen School. The decree marked, therefore, a process of desecuritisation of the issue in Brazil, since it revoked the Strategic Border Plan, resulting in the loss of the temporary and emergency nature of the ‘Ágata’ operations. This article analyses the development of Brazilian legislation since 1976 on this matter and carries out, for the period 2011 to 2016, content analysis of the narrative on securitisation. In addition, this work examines the guidelines and nature of the Brazilian government’s public policies aimed at combating drug trafficking. Keywords: Brazil; drug trafficking; securitisation; desecuritisation; Operation Ágata. Introduction The third theoretical debate on international relations highlighted the need for new studies on international security that question the assumptions of ‘realism,’ which is the prevailing classical theory of international relations.
    [Show full text]
  • 10. Securitization Theory: Legitimacy in Security Politics
    10. Securitization Theory: Legitimacy in Security Politics 10.1. LEGITIMACY IN SECURITIZATION THEORY Directly and in the short term repression against terrorist groups can only diminish their resources – therefore its counter-intended effect can only take place in the long run. Furthermore, the counter-intended effect of re- pression is only conceivable in connection with the security discourse of the terrorist groups’ opponents. In order to understand this counter-intended effect I present securitization theory which deals with the question of how actors develop legitimacy for the imposition of extraordinary means. With my simulation-analysis I am subsequently able to analyze the feedback loops of intended and counter-intended effects of state repression. 10.1.1. Legitimacy and Audience in Security Politics Securitization Theory belongs to the wider branch of Critical Security Stud- ies which itself is a constructivist approach in the studies of International Relations. The theory is built on the assumption that security is not an ob- jective fact. It explains how security is socially constructed by ‘securitiz- ing’ issues: “A security issue is posited (by a securitising actor) as a threat to the survival of some referent object (nation, state, the liberal international economic order, the rain forests), which is claimed to have a right to survive. Since a question of survival necessarily involves a point of no return at which it will be too late to act, it is not defensible to leave this issue to normal politics. The securitising actor therefore 244 | SECURITIZATION OF ISLAM IN CENTRAL ASIA claims a right to break normal rules, for reasons of security” (Buzan & Waever 2003: 71).
    [Show full text]
  • Societal Security and Social Psychology
    Review of International Studies (2003), 29, 249–268 Copyright © British International Studies Association DOI: 10.1017/S0260210503000159 Societal security and social psychology TOBIAS THEILER* Abstract. The concept of societal security as developed by the Copenhagen school has three underlying weaknesses: a tendency to reify societies as independent social agents, a use of too vague a definition of ‘identity’, and a failure to demonstrate sufficiently that social security matters to individuals. This article shows that applying social identity theory to the societal security concept helps remedy these weaknesses and closes the theoretical gaps that the Copenhagen school has left open. It enables us to treat ‘society’ as an independent variable without reifying it as an independent agent. It also suggests a much sharper definition of identity, and a rationale for the Copenhagen school’s claim that individuals have a psychological need to achieve societal security by protecting their group boundaries. Social identity theory thus supports the societal security concept in its central assumptions while giving it stronger theoretical foundations and greater analytical clout. Introduction The concept of societal security first came to prominence in Barry Buzan’s classic People, States and Fear.1 From the early 1990s, a series of writings by Buzan, Ole Wæver and a number of collaborators revived and significantly reinterpreted it, turning societal security into a conceptual cornerstone of what some have labelled the ‘Copenhagen school’ in International Relations (IR).2 By the end of the decade, the Copenhagen school had developed additional concepts and societal security had lost some of its erstwhile centrality. Nonetheless, it has remained the most innovative element in the Copenhagen school and the one that sets it apart most clearly from other approaches in International Relations.
    [Show full text]
  • The Viability of Human Security
    The Viab In the fi rst part, The Viability of Human Security elaborates various aspects The Viability of the Report by the eu’s Barcelona Study Group on Europe’s Security Capabilities, A Human Security Doctrine for Europe (2003). It discusses the international legal consequences of adopting a human security strategy, as well ilit as specifi c operational demands. Also the internal consequences for the eu are of Human Security discussed by positioning the human security approach within the discussion y of H about the blurring distinction between internal and external security. Military and police organisations have to be transformed to fi t the eu’s quasi-domestic Monica den Boer & Jaap de Wilde (eds.) structure. This redefi nition of purpose should be linked to restructuring the military to fi t the demands of contemporary peace-building. uman Se The second part calls for the need to include a bottom-up approach to the study of human security. The concept of ‘Human Security from Below’ is introduced in order to highlight how people in war-torn countries or failed states have no choice but to build up their own security arrangements. Case studies from Bosnia Herzegovina, Israel and the Palestinians show how these curi self-help structures emerge and how they are linked to transnational contexts. Moreover, human security initiatives from below also occur in more stable ty societal circumstances, e.g. local security networks in the Netherlands. The reason to link human security arguments about interventions abroad to Mo arguments about domestic and internal eu-security is to highlight the universal ambitions inherent to the human security concept.
    [Show full text]