Extracting Human Security from the Shtokman Gas Field

Extracting Human Security from the Shtokman Gas Field

Faculty of Humanities, Social Sciences and Education Department of Sociology, Political Science and Community Planning Extracting human security from the Shtokman gas field Security assemblage in the Murmansk region (2007-2012) — Maria Goes A dissertation for the degree of Philosophiae Doctor – September 2017 Extracting human security from the Shtokman gas field Security assemblage in the Murmansk region (2007-2012) Maria Goes Doctoral thesis submitted for the degree of Philosophiae Doctor Faculty of Humanities, Social Sciences and Education Department of Sociology, Political Science and Community Planning September 2017 Table of Contents Acknowledgments ...................................................................................................................... i Summary ................................................................................................................................... ii Abbreviations and acronyms .................................................................................................. iii List of figures, pictures and tables .......................................................................................... v 1. Introduction and the research question ............................................................................. 1 1.1. Brief history of the concept of security in Russia ............................................................................ 4 1.1.1. The first Russian law on security .................................................................................................. 5 1.1.2. The Federal law “On security” from 2010 .................................................................................... 6 1.2. Lived experience of security transformation in Russia: from geopolitics to human security .......... 9 1.3. The Murmansk region and the GAPS project ................................................................................ 11 1.4. The concept of security assemblage ............................................................................................... 13 1.5. The relevance of my research ......................................................................................................... 15 1.6. Outline of study .............................................................................................................................. 18 2. Methodology ....................................................................................................................... 20 2.1. Implementing a narrative approach: the issue of subjectivity and causality .................................. 20 2.2. Case study as a research design ...................................................................................................... 22 2.3. Research criteria: validity, reliability, plausibility and authenticity ............................................... 23 2.4. Research as experiment .................................................................................................................. 24 2.5. Official documents as a source of data ........................................................................................... 26 2.6. Narrative approach to interviews .................................................................................................... 27 2.7. Data and scope of interviews .......................................................................................................... 29 2.8. Interview guide ............................................................................................................................... 30 2.9. Reflection on my role ..................................................................................................................... 32 2.10. Conclusion .................................................................................................................................... 33 3. The Murmansk region and the Shtokman gas field: articulating expectations (2007- 2012) ......................................................................................................................................... 34 3.1. Outlook of the Murmansk region (2007-2012) .............................................................................. 34 3.1.1. Industry and economics ............................................................................................................... 36 3.1.2. Military-industrial complex ......................................................................................................... 37 3.1.3. The fuel and energy complex (TEK) ........................................................................................... 39 3.2. Shtokman begins ............................................................................................................................ 40 3.3. Shtokman narratives: intensity of desire ........................................................................................ 46 3.3.1. Narrating national perspectives ................................................................................................... 46 3.3.2. Narrating regional perspectives ................................................................................................... 51 3.4. Conclusion ...................................................................................................................................... 59 4. Conceptual framework: an analytic of assemblage ........................................................ 61 4.1. Post-structuralism and security studies .......................................................................................... 61 4.2. (Im)possibility of shifting focus from the state to the individual ................................................... 64 4.2.1. Realism versus human security ................................................................................................... 64 4.2.2. Debates over state-individual relationships ................................................................................. 66 4.2.3. Security assemblage as a combination of state and human security ........................................... 69 4.3. Specifics of Deleuze and Guattari’s philosophy: possibilities and limitations............................... 70 4.4. Schizoanalysis, desire and security of expectations ....................................................................... 75 4.4.1. Schizoanalysis, capitalism and desire .......................................................................................... 75 4.4.2. Desire, subjectivity and agency ................................................................................................... 77 4.4.3 Desire and security of expectations .............................................................................................. 78 4.5. Rhizome and tree ............................................................................................................................ 79 4.5.1. Bridging rhizome and human security: a discussion on broadening versus narrowing.............. 80 4.6. Abstract machine as a rule .............................................................................................................. 82 4.7. Tetravalent structure of assemblage ............................................................................................... 83 4.8. Horizontal axis: ‘machinic assemblage of bodies, actions and passions’ ...................................... 84 4.8.1. Approaching the individual: narrative identity and ‘becoming’.................................................. 85 4.8.2. Approaching the state .................................................................................................................. 89 4.8.3. State, individuals and multi-actor based security model ............................................................. 90 4.9. Horizontal axis: ‘collective assemblage of enunciation’ ................................................................ 92 4.9.1. Deleuze and the Copenhagen School: performative sentences, ‘incorporeal transformations’ and impersonality of language ..................................................................................................................... 93 4.9.2. The collective assemblage of enunciation in the Russian context ............................................... 96 4.10. Vertical axis: ‘territory’ ................................................................................................................ 97 4.10.1. Peculiarities of the Russian space .............................................................................................. 98 4.10.2. The Russian Arctic as ‘smooth’ and ‘striated’ space ................................................................ 98 4.11. ‘Lines of flight’ as a move between ‘territory’ and ‘cutting edges’ ........................................... 101 4.12. Vertical axis: ‘cutting edges’, ‘deterritorialisation’ and ‘reterritorialisation’ ............................ 102 4.13. Conclusion .................................................................................................................................. 103 5. Insecurity of expectations as a main rule of the abstract machine of the security assemblage in the Murmansk region (2007-2012) ............................................................. 104 5.1. Oil and gas sector as state business: implications for the Murmansk region ............................... 104 5.2. ‘Vertical power structure’

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    260 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us