Private Security in International Politics • • Deconstructing the State’S Monopoly of Security Governance

Private Security in International Politics • • Deconstructing the State’S Monopoly of Security Governance

Title Page Private Security in International Politics • • Deconstructing the State’s Monopoly of Security Governance Patrick Jerome Cullen Thesis submitted for the degree of Doctor of Philosophy in International Relations The London School of Economics and Political Science 2009 UMI Number: U61569B All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615693 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 W£SE5 F O rtM F H_1BmWV tf1 P.J. Cullen: 02 September 2009 DECLARATION I certify that the thesis I have presented for examination for the MPhil/PhD degree of the London School of Economics and Political Science is solely my own work other than where I have clearly indicated that it is the work of others (in which case the extent of any work carried out jointly by me and any other person is clearly identified in it). The copyright of this thesis rests with the author. Quotation from it is permitted, provided that full acknowledgement is made. This thesis may not be reproduced without the prior written consent of the author. I warrant that this authorization does not, to the best of my belief, infringe the rights of any third party. 2 P.J. Cullen: 02 September 2009 ABSTRACT This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security’s continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the state’s monopoly of security governance. Thus, the security governance framework used within this thesis is understood in terms of a theoretical response to the inability of Realist theory to conceptualize the political content of private security. Against this backdrop of a critique of Realist theory—and its idea of the state’s monopoly relationship to authority, territory and coercion—this thesis re-articulates each of these concepts with reference to a security governance approach to the study of private security. This thesis then provides a positive application of this security governance theoretical framework to a series of original case studies of hybrid public-private and private- private security networks. 3 P.J. Cullen: 02 September 2009 ACKNOWLEDGEMENTS In writing this thesis I have met more people within the International Relations Department at the LSE who have supported me with their friendship than I can reasonably list here. I would like to thank Dan Alamariu; Chris Berzins; Vatche Boulghourjian; Douglas Bulloch; Jenny Engstrom; Gregor Jost; John Maguire; Mark Narron and Jens Poppen. To the many others not listed, thank you. I also want express my gratitude to the late Professor Robert Farlow for encouraging me as an undergraduate to explore the world of international politics, and thank Fr. Arthur Kennedy (PhD) for helping me as an undergraduate understand that ideas are worth taking seriously. I also want to thank Matt Otremba and Mark Ehling, Kaija DeWitt and Andrew and Many Cullen for their camaraderie during the final writing stages of this thesis. Thanks to Professor Nicholas Bisley and MC Highland. Each read and made useful editorial comments on early drafts of this thesis. Special thanks to Professor Peter Weinberger for his assistance and support during the final stages of this thesis. He has proven that friends can also be insightful and helpful critics. Special thanks to Nathalie Wlodarczyk whose early editing, support, and never-ending kindness helped me begin this dissertation. Special thanks also to Julie McCarthy for reminding me to finish it. I must also thank my thesis supervisor Christopher Coker. He provided me as an undergraduate study-abroad student with the inspiration to consider pursuing a PhD in International Relations, the encouragement to write it under his tutelage at the LSE, and the patience to help me see it through to the end. Finally, I owe a special debt of gratitude to my parents Michael and Cecilia Cullen. Their encouragement and unwavering support over the years—both financial and emotional—were indispensible to me throughout this process. I dedicate this PhD to them. 4 P.J. Cullen: 02 September 2009 Acronyms AXO Abandoned Explosive Ordinance BAPSC British Association of Private Security Companies BARS Background Asia Risk Solutions CPA Coalition Provisional Authority CQD Close Quarters Defence DARC Direct Action Resource Center DEA Drug Enforcement Agency, United States DfID Department for International Development, United Kingdom DMA Defence Manufacturers Association, United Kingdom DoD Department of Defence, United States DoS Department of State, United States DoJ Department of Justice, United States DoE Department of Energy, United States DSS Diplomatic Security Service, US State Department EEZ Exclusive Economic Zone ERW Explosive Remnants of War EU European Union FAO Food and Agriculture Organization FCO Foreign and Commonwealth Office, United Kingdom FOB Forward Operating Base GDMA Glenn Defense Marine Asia IED Improvised Explosive Device IMCO Iraq Mine and UXO Clearance Organization IMMAP Information Management and Mine Action Programs 10 International Organization IPOA International Peace Operations Association ISDS International Security and Defence Systems IWPR Institute of War and Peace Reporting IZ International Zone LIS Landmine Impact Survey MCS Monitoring, Control and Surveillance MPRI Military Professional Resources Incorporated NATO North Atlantic Treaty Organization NROC North Reconstruction Operations Center NGO Non-Governmental Organization PIDC Puntland International Development Company PSC Private Security Company PSD Personal Security Detail PMC Private Military Company PMO Project Management Office, Coalition Provisional Authority QRF Quick Reaction Force RIB Rigid Inflatable Boat RLT Reconstruction Liaison Teams ROC Reconstruction Operations Center RROC Regional Reconstruction Operations Center RSSS Reconstruction Security Support Services SAS Special Air Service 5 P.J. Cullen: 02 September 2009 SET Security Escort Teams SME Subject Matter Expertise SROC Satellite Reconstruction Operations Center SWAT Special Weapons and Tactics TEES Tactical Explosive Entry School UN United Nations UNCLOS United Nations Convention on the Law of the Sea UNDP United Nations Development Programme UNESCO United Nations Educational, Scientific, Cultural Organization USAID United States Agency for International Development UXO Unexploded Ordinance WRA Office of Weapons Removal and Abatement, US State Dept. 6 P.J. Cullen: 02 September 2009 Table of Contents TITLE PAGE........................................................................................................................................................1 DECLARATION..................................................................................................................................................2 ABSTRACT...........................................................................................................................................................3 ACKNOWLEDGEMENTS................................................................................................................................4 ACRONYMS........................................................................................................................................................ 5 TABLE OF CONTENTS....................................................................................................................................7 1 INTRODUCING A SECURITY GOVERNANCE FRAMEWORK TO THE STUDY OF PRIVATE SECURITY IN INTERNATIONAL RELATIONS............................................................... 11 Pa r t 1............................................................................................................................................................................................11 1.1 L oc at in g the Pr o bl e m : T he Challen ge of U nderstanding P riv ate Sec ur ity in G lobal Politics a n d International R elatio ns Th eo ry v ia W eb er ia n (R e a l ist ) T heoretical La n g u a g e ................................................................................................................................................................................. 11 1.2 Fro m a R ea list Co nceptio n of Go ver nm en t to a Se c u r it y G o v e r n a n c e M o d e l ................... 14 1.3 Fr a m in g a Sec ur ity Go v er n a n c e M o del a g a in st a C ritical Literature R eview of R e a l is m ...................................................................................................................................................................................... 17 1.4 P

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    332 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us