master thesis marketized security the impact of trans-national corporations on how sovereignty and...

86
Page 1 of 86 Standardforside til projekter og specialer Til obligatorisk brug på alle kandidatprojekter og specialer på: Internationale udviklingsstudier Global Studies Erasmus Mundus, Global Studies A European Perspective Politik og Administration Socialvidenskab EU-studies Forvaltning (scient.adm) Virksomhedsstudier Virksomhedsledelse Projekt- eller specialetitel: Marketized Security: The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured Projektseminar/værkstedsseminar: Udarbejdet af (Navn(e) og studienr.): Projektets art: Modul: Anders Høgh Andersen - 56116 Speciale K4 Gitte Højstrup Christensen - 48288 Speciale K4 Vejleders navn: Lars Buur Afleveringsdato: 27-07-2016 Antal anslag inkl. mellemrum: 238.128 Tilladte antal anslag inkl. mellemrum: 240.000 Jeg/vi erklærer, at der i projektet/specialet/opgaven ikke er afskrift fra tidligere publicerede tekster (inklusive egne eller andres opgaver), medmindre disse passager er tilføjet reference. Undgå plagiat: lær at referere korrekt. Klik her: http://www.stopplagiat.nu/index_flash.html Hvis du overskrider det tilladte antal anslag inkl. mellemrum vil dit projekt blive afvist indtil en uge efter aflevering af censor og/eller vejleder.

Upload: gitte-christensen

Post on 10-Jan-2017

30 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 1 of 86

Standardforside til projekter og specialer

Til obligatorisk brug på alle kandidatprojekter og specialer på:

Internationale udviklingsstudier

Global Studies

Erasmus Mundus, Global Studies – A European Perspective

Politik og Administration

Socialvidenskab

EU-studies

Forvaltning (scient.adm)

Virksomhedsstudier

Virksomhedsledelse

Projekt- eller specialetitel:

Marketized Security: The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Projektseminar/værkstedsseminar:

Udarbejdet af (Navn(e) og studienr.): Projektets art: Modul:

Anders Høgh Andersen - 56116 Speciale K4

Gitte Højstrup Christensen - 48288 Speciale K4

Vejleders navn:

Lars Buur

Afleveringsdato:

27-07-2016

Antal anslag inkl. mellemrum:

238.128

Tilladte antal anslag inkl. mellemrum:

240.000

Jeg/vi erklærer, at der i projektet/specialet/opgaven ikke er afskrift fra tidligere publicerede tekster

(inklusive egne eller andres opgaver), medmindre disse passager er tilføjet reference.

Undgå plagiat: lær at referere korrekt. Klik her: http://www.stopplagiat.nu/index_flash.html

Hvis du overskrider det tilladte antal anslag inkl. mellemrum vil dit projekt blive afvist indtil en uge

efter aflevering af censor og/eller vejleder.

Page 2: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 2 of 86

Marketized Security

The Impact of Trans-National Corporations on how

Sovereignty and Rights are Configured

‘If the natives are in different worlds,

how come we can shoot them?’

– Stephen Stich

Anders Høgh Andersen & Gitte Højstrup Christensen

Master Thesis, July 2016

Global Studies, Roskilde University

Supervisor: Lars Buur

Page 3: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 3 of 86

Abstract

This thesis is concerned with exploring the neoliberal marketization of security and risk, and what

consequences this marketization has for how transnational corporations affect sovereignty and

rights in weak states. It looks at the different actors involved in constructing socio-political risk,

security assemblages and inclusive-exclusion. A theoretical framework is constructed from these

theoretical concepts, which is used to explore the power relations within security configurations that

transcends states. Furthermore, this thesis explores the relationship between security measures of

transnational corporations (TNCs) and contemporary practices such as Corporate Social

Responsibility and Social License to Operate. It argues that there has been an increase in global

consumer awareness of corporate responsibility and human rights violations which has influenced

marked forces. This has resulted in an increased global consumer pressure on TNCs “forcing” them

to incorporate contemporary practices into their security measures. This development is portrayed

through expert interviews and cases studies of western based natural resource extraction companies

in Nigeria and Colombia. This thesis finds that these contemporary practices can be used to mitigate

risk, but they can also be used as a ways to control the local population by creating an inclusive

exclusion that determines whether or not one is posing a risk to the authority concerned.

Furthermore, by diffusing the sovereignty of the host countries, the security assemblages allow

TNCs to influence the authorities involved, or even to act as the sovereign authority themselves.

Page 4: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 4 of 86

Acknowledgements

We would like to express a sincere gratitude to our interviewees: Michael Nellemann Pedersen -

PKA, Bruno Kalhøj - Maersk Oil, Johnny Andersen - Vesper Group, Frederik Østerby - Guardian

Security Risk Management, Dr. Rajiv Maher, and Dr. Thomas Mandrup. The six of you gave us

valuable knowledge and insight into the security and risk management industry, which inspired us

to explore the impact contemporary business practices have on the development of the global

security market.

We would also like to extend our deepest appreciation and gratitude to our thesis supervisor: Dr.

Lars Buur, who has given us valuable guidance and support that made us push ourselves beyond

what we thought we were capable of.

As this is a written assignment it is required to emphasize the author of each chapter, please see

appendix B: „Individualization of the thesis‟, for this.

Page 5: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 5 of 86

Table of Contents

Chapter 1. Introduction ........................................................................................................................ 8

1.2. Research question ...................................................................................................................... 9

1.3. Structure of the thesis ................................................................................................................ 9

Chapter 2. Methodology .................................................................................................................... 12

2.1. Clarification of concepts ......................................................................................................... 12

2.2. Interview method ..................................................................................................................... 13

2.3. Case studies ............................................................................................................................. 15

2.4. Why study Shell in Nigeria? ................................................................................................... 15

2.5. Why study Prodeco and Drummond in Colombia?................................................................. 16

2.6. Analysis strategy ..................................................................................................................... 17

2.7. Limitations............................................................................................................................... 17

Chapter 3. Theoretical framework ..................................................................................................... 19

3.1. Introduction to the Chapter...................................................................................................... 19

3.2. Security Assemblages.............................................................................................................. 19

3.3. Socio-Political Risk ................................................................................................................. 22

3.4. Inclusive-exclusion and the right to security of the person ..................................................... 26

3.5. Our outlook on contemporary configurations of Security....................................................... 29

3.6. Interim Conclusion .................................................................................................................. 31

Chapter 4. Neoliberal practices: global security and risk management ............................................. 32

4.1. Introduction to the Chapter...................................................................................................... 32

4.2. Neoliberalism .......................................................................................................................... 33

4.3. Marketization and Financialization ......................................................................................... 34

4.4. Corporate Social Responsibility: making responsible investments ........................................ 36

4.6. Social License to Operate: managing socio-political risks ..................................................... 41

4.7. Interim conclusion ................................................................................................................... 43

Chapter 5. Nigeria: the case of oil companies and private security ................................................... 45

5.1. Case introduction ..................................................................................................................... 45

5.2 Outline of the Chapter .............................................................................................................. 46

5.3 Nigeria‟s security history and the Niger Delta conflict ............................................................ 47

Page 6: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 6 of 86

5.4. Shell‟s „Other‟ security practices in the Niger Delta .............................................................. 49

5.5. Pressure from the global stakeholder community ................................................................... 52

5.6. Security assemblages ............................................................................................................... 53

5.7. Re-configuration of sovereignty and rights ............................................................................. 54

5.8. Interim Conclusion to the Chapter .......................................................................................... 56

Chapter 6. Colombia: the case of coal-mining companies and fragmented sovereignty ................... 58

6.1. Case introduction ..................................................................................................................... 58

6.2. Outline ..................................................................................................................................... 59

6.3 Background on the security situation in Colombia .................................................................. 60

6.4. Foreign Extraction Companies and Fragmented Sovereignty ................................................. 61

6.5. Security Assemblages.............................................................................................................. 65

6.6. The Danish Connection ........................................................................................................... 67

6.7. Interim Conclusion to the Chapter .......................................................................................... 69

Chapter 7. Discussion ........................................................................................................................ 72

7.1. Similarities and differences ..................................................................................................... 72

7.2. Conflicting security practices .................................................................................................. 74

7.3. Implementing soft security and practices ................................................................................ 74

7.4. Thesis shortcomings ................................................................................................................ 75

Chapter 8. Conclusion ........................................................................................................................ 77

References .......................................................................................................................................... 78

Page 7: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 7 of 86

List of Abbreviations

AUC Autodefensas Unidas de Colombia (United Self-Defense Forces of Colombia)

CSR Corporate Social Responsibility

JAAF Juan Andrés Álvarez Front

DONG Dansk Olie & Natur Gas (as in DONG Energy)

FARC Fuerzas Armadas Revolucionarias de Colombia (Armed Revolutionary Forces of

Colombia)

FDI Foreign Direct Investments

FPIC Free, Prior and Informed Consent (of Indigenous People)

G4S Group4Securicor

GDP Gross Domestic Product

JTF Joint Task Force

MNC Mult-National Corporation

NGO Non-Governmental Organization

NSCDC Nigeria Security and Civil Defence Corps

OSL Outsourcing Services Limited

PAX Not an abbreviation – Latin for peace

PKA Pensionskassernes Administration

PMSC Private Military Security Company

PSC Private Security Company

SCIN Shell Companies In Nigeria

SLO Social License to Operate

SRM Security Risk Management (In Guardian SRM)

TAR Territory, Authority & Rights

TNC Trans-National Corporation

UN United Nations

UNGPBHR United Nations Guiding Principles on Business and Human Rights

UN ICCPR International Covenant on Civil and Political Rights

UN UDHR United Nations Universal Declaration on Human Rights

US United States

Page 8: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 8 of 86

Chapter 1. Introduction

In the globalized world of business, there has been an increase in attention towards stakeholder

communities1 and their effect on businesses including reputation and profitability (Matuleviciene et

al 2015; Ipsos 2011: 4). When combined with consumer awareness in western countries, it has

changed the way transnational corporations are conducting business across the world (Epstein-

Reeves 2010). Particularly, high-risk areas inflicted with violence and instability have been the

focal point for this newfound awareness. These high-risk areas are often located in countries with a

frail central authority and what are sometimes referred to as „weak‟ states. In this thesis, this type of

country is one of the central topics and we will regard weak states as states that are not necessarily

impoverished but in one way or another are not in full control of territory and not considered

legitimate by the populations. Operating in these kinds of countries often entail a high level of risk

for transnational corporations but also high rewards for those willing to endure what they consider

„great risks‟. We explore two cases which portray examples of this in our thesis, namely Nigeria

and Colombia. In these two countries, transnational companies based in the west endure great

security- and socio-political risk in pursuit of the vast riches that are made in and through the rich

natural resource endowments. Both countries also exemplify what we refer to as „weak‟ states.

Neither states are impoverished, primarily due to their natural resource extraction industries, but

both states‟ authority is being challenged by non-state actors as they struggle to provide security

provisions for both citizens and foreign corporations. To mitigate the risks involved with operating

in such countries, the transnational corporations are creating configurations of security that often

extends beyond what the state of the host country can provide (Kasali 2011: 32).

These configurations of security entail a degree of outsourcing of violence from the state to non-

state and private actors (Mandrup 2012). The different approaches to security and the involvement

of non-state and private actors beg the question of how they affect the already weak state authority

in the host countries and how the western understanding of rights translates into these new

configurations of security. Furthermore, it implies reconfigurations of sovereignty as well as the

immediate control of certain areas become contested between trans-national corporations (hereafter

TNCs), non-state actors and the state itself.

The consumer awareness previously mentioned pertains to these actors and the methods they use to

provide security provisions for the TNCs which often include the use of harsh and illicit measures.

However, global consumers are increasingly expecting western based corporations to uphold moral

guidelines for human rights and right to security found in their homeland even when operating

abroad. This puts the TNCs in a difficult situation as the host countries often work with different

moralities than those the TNCs are expected to bring with them. Whereas in the past TNCs have

been able to exploit the different morality of the weak host country government, in terms of

corruption, security measures, land and resource grabbing etc. Some will argue that the TNCs still

do this, but no longer can ignore the changing demands of stakeholder communities and marked

forces.

1 See definition of stakeholder communities in 2.1: „Clarification of Concepts‟

Page 9: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 9 of 86

This thesis seeks to explore the relationship between contemporary business practices and TNCs‟

security measures in weak states. Therefore, we present two interconnected aims in this thesis: one

is to explore the problematic associated with how market forces permeates the sphere of global

security and effects how TNCs interact with stakeholder communities. The other is to explore the

problematic concerning the reconfiguration of sovereignty and rights that take place between TNCs,

the state and private/non-state security actors.

1.2. Research question

How can we conceptualize the marketization of security and risk, and what are the

consequences of this marketization for how transnational corporations affect

sovereignty and rights in weak states?

Sub-questions:

How does neoliberalism, as a mode of governance, affect how transnational

corporations approach security and risk management?

How does marketized security affect the way transnational corporations interact with

stakeholder communities?

How do security assemblages effect the configuration of sovereignty and the right to

security?

1.3. Structure of the thesis

In order to answer our research question and sub-questions, the analysis is divided into 4 chapters,

each addressing a sub-question, where chapter 5 & 6 address the same sub-question. In the

following outline of the thesis we present the overall structure from start to finish.

Chapter 2

This chapter addresses issues of methodology with the purpose of depicting our choice of

method(s), and it explains the methodological reflections which have guided the overall research

design of the thesis. In this chapter we describe our primary and secondary empirical data and

explain our reasoning behind conducting and incorporating semi-structured expert interviews into

parts of the thesis. Furthermore, this chapter provides an outline of our case studies and argues their

relevance with regard to our research question.

Page 10: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 10 of 86

Chapter 3

This chapter focuses on explaining our choice of theory which consists of different theoretical

concepts and ideas that we define and combine into one analytical framework used to analyze the

globalized marketization of security and risk. These theoretical concepts are “socio-political risk”,

“security assemblages” and “inclusion/exclusion”.

Chapter 4

This chapter addresses the following sub-questions: „How does neoliberalism, as a mode of

governance, affect the way transnational corporations approach security and risk management?‟ We

start out by presenting our understanding of neoliberalism as a mode of governance, showing how

the field of security has undergone a certain level of marketization and financialization. From here

we move on to interpreting contemporary practices such as corporate social responsibility and

social license to operate. We argue how these practices can be seen to result from increasing global

consumer awareness and demands which in return are affecting global marked forces.

Chapters 5

This chapter addresses the following sub-questions: „How does marketized security affect the way

transnational corporations interact with stakeholder communities?‟ This chapter is a study of

security in Nigeria with a focus on the foreign oil extraction company Shell‟s operations in the

Niger delta region. It starts out with a short introduction that outlines the main problematic

addressed in the chapter. This is followed by a historical context based on the security history of

Nigeria and the negative effects associated with Shell operations in the Niger Delta. This provides

the foundation for a deeper analysis of how stakeholder communities are pressuring Shell to

incorporate the contemporary practices presented in chapter 4. From here, the chapter moves into a

more theoretical analysis of security assemblages, and what consequences Shell‟s presence and

security practices in the Niger Delta has for the configuration of sovereignty and rights.

Chapter 6

This chapter also addresses the sub-question: „How does marketized security affect the way

transnational corporations interact with stakeholder communities?‟ This chapter presents a second

case study of security in Colombia with a focus on foreign coal extraction companies Prodeco and

Drummond. As with the previous case study, this chapter starts out presenting a short introduction

that outlines the main problematic that will be addressed. From here, a historical context is

presented providing background on the security situation in Colombia. Then the case study moves

into an exploration of fragmented sovereignty and the role of foreign extraction companies in the

Cesar region. This paves the way for an analysis of the construction of security assemblages,

inclusive-exclusions and the configuration of sovereignty and rights. Based on these we make a link

Page 11: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 11 of 86

to the transnational corporation DONG Energy, and explore how Danish consumers and media have

affected the practices of this TNC.

Chapter 7

This chapter discusses the findings of the case studies and addresses the sub-question: ‟How do

security assemblages effect the configuration of sovereignty and the right to security?‟ It starts out

by comparing the similarities and differences between the two cases, focusing on the construction

of security assemblages and the actors involved. Next we argue how TNCs seem to be portraying

contradictory security practices, due to pressure from stakeholder communities. This leads to a

discussion of the implementation of soft security and contemporary practices, arguing how these are

increasingly becoming integrated parts of the product in some companies‟ business strategies and

images. This chapter ends with a discussion and reflections on the analytical shortcomings of the

thesis.

Chapter 8

This chapter constitutes the conclusion of our thesis, where we synthesize our findings pertaining to

answering the main research question.

Page 12: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 12 of 86

Chapter 2. Methodology

To be able to answer our research question and sub-questions, we have chosen to combine two

different types of qualitative research methods: semi-structured expert interviews, and case studies.

This has provided us with a holistic understanding of the development of the global security scene

through a wide range of perspectives, ranging from boots on the ground and academic experts to

transnational corporations. The semi-structured expert interviews are our only source of primary

empirical data, whereas we include several different secondary sources of qualitative data such as

books, academic articles, journals, NGO reports, news websites and written court testimonies. This

last mentioned source of secondary data is primarily applied in the Colombia case study with regard

to the Drummond examples. Furthermore, in the Nigeria case study the Shell example incorporates

leaked quantitative data released by Wikileaks. We have chosen to include this type of unverified

data with a level of apprehension, but also in combination with verified data to obtain a higher

degree of validity in our major arguments and claims.

2.1. Clarification of concepts

In order to understand how the research question should be understood and what the analysis will

encompass, we will start by providing a clarification of the main concepts used in the research

question and the sub-questions.

Marketization: we use this concept as an umbrella term which refers to „[t]he exposure of an

industry or service to market forces‟ (Oxford dictionaries 2016), which in this thesis is the security

industry. Furthermore, marketization of the security industry is referred to as marketized security.

By this, we argue that market forces have introduced consumer awareness, demand and supply

logic, and stakeholder community relations into the security industry. This will be further explained

in chapter 4.

Stakeholder Communities: in this thesis we utilize the conceptualization by Boutilier and

Thomson (2011) to describe stakeholder communities as those „affected by the actions of a

company or who could have an effect on the company‟ (2). As we will explain in chapter 4, we

argue that TNCs affect two types of communities: at their home country and in host countries where

they operate. Therefore, the concept of „stakeholder community‟ refers to both types of

communities.

Weak State: we realize that the term „weak state‟ is highly politicized but in this thesis we will

refer to states with fragmented authority as „weak‟. By fragmented authority we refer to countries

that are not fully in control of the territory and population. Therefore, the concept will refer to

lacking or no authority in certain geographical areas of the country in question without any political

connotations.

Page 13: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 13 of 86

2.2. Interview method

In order to understand and explore the development of the global security and risk marked, we

deemed it necessary to collect empirical data about different practices and experiences within this

field. For this, expert interviews seemed most suitable, as these would allow us to gain insight into

the interviewees‟ perspectives on their lived world. This goes in line with Kvale‟s (1983)

description of a qualitative interview as „an interview, whose purpose is to gather descriptions of the

life-world of the interviewee with respect to interpretation of the meaning of the described

phenomena‟ (174). More specifically, we chose to conduct semi-structured interviews with all the

interviewees because these entail a fairly open framework allowing for focused, conversational,

two-way communication. This follows Kvale and Brinkmann‟s (2009) social constructivist notion

of a semi-structured interview being an interview, where knowledge is constructed through the

interaction between the interviewer and the interviewee (3).

We conducted six semi-structured expert interviews ranging from forty-five minutes to one and a

half hours in duration, with both academic experts and private actors who to one degree or another

effect and are affected by changes and developments in global socio-political risks and security.

The interviewees were primarily chosen through our personal and work-related networks. We

selected these academics and private company actors based on their relationship to global security

and risk, be it strictly academic, in connection with a risk assessment or private security firm, or as

the company employee concerned with making responsible investments abroad. The purpose of

interviewing such a diverse range of actors was to gather different types of knowledge about the

security field and the global marketization of security and risk. Furthermore, it was through these

semi-structured interviews that concepts such as CSR and SLO were brought up in connection with

security and risk management. This inspired us to explore the relationship between these

contemporary practices and the development of the global security market.

We chose to interview six representatives from three different lines of work concerned with global

security and risk. It was important for us to have two experts representing each field of study in

order to ensure coherence and to confirm and strengthen the validity of arguments. To represent

academic experts on security and risk, we interviewed Dr Thomas Mandrup, from the Royal Danish

Defense College, who specializes in the privatization of security (PMSCs) and issues of state

sovereignty with a focus on Africa. The other academic expert we interviewed was Dr Rajiv Maher,

who specializes in CSR, business and human rights, as well as conflict between natives and

extractive/natural resource projects. We also conducted semi-structured interviews with two

representatives from the private security industry who work for companies that supply security and

risk services of different kinds to TNCs and governments. One was analytics officer Frederik

Østerby from Guardian Security Risk Management,2 a private company that provides risk

2 http://www.guardian-srm.com/about/

Page 14: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 14 of 86

assessments for different types of client all around the world. The other was private security

contractor and team leader Johnny Andersen from Vesper Group,3 a Swedish-based company that

offers both boots on the ground and risk assessments, and is currently in charge of all operational

security (protection, transportation, etc.) at the Danish embassy in Kabul, Afghanistan. Our third

type of interviewee was representatives from Danish-based private corporations involved in global

business ventures and investments. One of these interviewees was investment director Michael

Nellemann Pedersen from PKA,4 a Danish pension fund that makes investments in close

cooperation with a security and risk management companies to ensure a stable and corporate

responsible return for its members. The other interviewee was Bruno Kalhøj, head of security and

crisis management at Mærsk Oil,5 an international privately owned company that has several oil

extraction partnerships around the world. Appendix A provides the general interview guide we used

during all six interviews however separate questions were added to the guide for each interview,

based on the interviewee‟s line of work and expertise area.

In the thesis we have chosen to reference the interviewees as such: (surname, year, time). Time

referring to the exact moment in the interview where the given quote or argument was expressed.

Furthermore, due to exchanges of confidential information during some of the interviews, we have

chosen not to make the sound files publically available, but these can be forwarded via e-mail upon

request. Despite this, all the interviewees agreed to let us record the, as well as to letting us usetheir

names and company/work affiliations. This might have added both positive and negative values to

the thesis. The positive value refers to the level of transparency and validity their testimonies holds,

as anyone would be able to contact them afterwards to confirm the quotes and answers depicted in

this thesis. This also portrays the negative value that refers to the responsibility that comes with not

being anonymous which, might affect the interviewees‟ willingness to speak completely freely

about certain things.

All six interviewees are experts within different parts of the security and risk field, and are all high-

level employees in their departments. We purposely chose to interview representatives at similar

employment levels with high levels of responsibility, experience and insider knowledge about the

global security and risk management industry. This arguably makes their testimonies more

compatible with one another. Had we chosen to interview mid-level employees, we might not have

been able to gain the needed insight knowledge for our analysis. Furthermore, both of the academic

experts, Mandrup and Maher, are state employees which arguably allows them to speak more freely

about the negative effects of transnational companies and private security. Our other four

interviewees, by contrast, are all employed by private companies and work with security and risk

management in their daily jobs. This might have had an influence on how willing they were to

criticize their own industry and/or employer. An example of this is that Maersk Oil required they be

3 http://www.vespergroup.se/

4 https://www.pka.dk/

5 http://www.maerskoil.com/about-us/Pages/about-us.aspx

Page 15: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 15 of 86

allowed to read and approve the quotes we used from the interview with their head of security and

crisis management, Bruno Kalhøj, before publication.

2.3. Case studies

Because the aim of this thesis is primarily exploratory we have chosen to incorporate qualitative

case studies, as these can be seen as „an approach to research that facilitates exploration of a

phenomenon within its context using a variety of data sources‟ (Baxter & Jack 2008: 544). To make

the two case studies compatible with one another, we have constructed similar research designs for

both cases, which make it easier to compare and contrast. The purpose of doing so is that it allows

us to identify potential global tendencies. Furthermore, as it is essential to reflect upon our own

effect on the construction of meaning during the interviews, this is also goes for incorporating case

studies. So in line with Lund‟s (2014) methodological reflections, we acknowledge that these cases

are produced by our investigations of them, based on the analytical and theoretical lens that we have

chosen to apply (230).

Furthermore, our case studies build upon Gluckman‟s (1961) idea of the extended case method,

where he argues that

the most fruitful use of cases consists in taking a series of specific incidents affecting

the same persons or groups, through a long period of time, and showing … [the]

change of social relations among these persons and groups, within the framework of

their social system and culture. (10)

This type of method is concerned with providing detailed analyses of social processes wherein

individual strategies and choices reveal the context of everyday life. We found this especially

relevant in our analysis of how TNC effect the (re)configuration of rights, which is an essential part

of our thesis aim.

Each case study is based on a non-western state with extensive histories of violence, corruption and

weak government. Furthermore, we have chosen these two states based on the fact that they located

on different continents and are both rich in natural resources, which for decades have attracted

foreign, especially western, transnational natural resource extraction corporations. Another essential

aspect which inspired us to incorporate these two states is that they are both examples of states in

which there exists a wide range different types of non-state security actors. Each case study will be

used to explore the relationship between the state, foreign extraction companies and private/non-

state actors. Furthermore, we will use our case studies to discuss how the security practices of

foreign TNCs have increasingly become affected by market forces and contemporary stakeholder

communities.

2.4. Why study Shell in Nigeria?

The fact that Shell is a western-based TNC that operates in a high-risk area within a weak state in

and of itself makes for an interesting case study of security configuration and sovereignty. As of

Page 16: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 16 of 86

2016 Shell is the seventh largest company in the world measured by revenue (Google Finance

2016), a strong indicator of the TNC‟s immense economic influence and power. Because of this,

much has been written and recorded about Shell and its operations abroad. In particular, its strong

presence in the Niger Delta has received much attention from scholars, NGOs, investors, media, etc.

Up until the leakage of data in 2012, Shell had managed to keep its true security spending in

Nigeria from reaching the public. Furthermore, given this TNC‟s long and dominant history in the

Niger Delta, it seems relevant to use Shell as an example of the complex relationships between

foreign oil companies and public/private security. Furthermore, we want to explore to what degree

the co-dependency between Shell and the Nigerian government influences the configuration of

security, sovereignty and rights in the Niger Delta.

2.5. Why study Prodeco and Drummond in Colombia?

Our initial interest in Drummond‟s and Prodeco‟s coal-mining operations in Cesar, Colombia,

began when the Danish energy company DONG Energy was accused by a Dutch NGO, of having

bought „blood-coal‟ from Colombia. The accusation was brought to the attention of the Danish

public by various news outlets and caused a debate on responsibility, as well as whether DONG had

undertaken due diligence with their CSR programs. A further investigation of the case revealed how

the two coal-mining companies had funded and used paramilitary forces to provide security in and

around their mines in Colombia, particularly in the period from 1996 to 2006. The primary cause of

instability and violence was a left-wing insurgency, which the Colombian government tried to

combat by allowing the formation of paramilitary forces, which in turn became protectors of

capitalist ventures such as the coal mines. This highly volatile situation created an intricate division

of sovereignty and authority in the Cesar region and is a significant part of the reason why we chose

to examine this case. Another interesting aspect of this case, however, is how DONG Energy was

affected by what happened in Cesar, even though it had nothing to do with the atrocities committed

by the paramilitary forces. The case then becomes an example of how local events have global

effects through assemblages and how the configuration of these assemblages defines what governs

the actors within the assemblage.

Page 17: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 17 of 86

2.6. Analysis strategy

To provide a better understanding of our analysis strategy, we have constructed an overview table

depicting what empirical data, theoretical concepts and method(s) that are combined and applied in

the four analytical chapters.

2.7. Limitations

When conducting research for a large-scale project, one will often encounter certain limitations

associated with access, time frame and geographical location. We too have encountered all of these

in our research, which has influenced the direction we ended up going in. First of all, it is important

to reflect upon the limitations of case studies, and as Levy (2008) argues, „it is important to note

that “case” is not equivalent to observations‟ (3). Ideally, we would have preferred to be able to

travel to both Colombia and Nigeria to visit the Cesar region mines and Niger Delta oil wells. This

would have enabled us to observe the operation sites at first hand to gather our own empirical data

and acquire in-person impressions of scale, environment, attitudes etc. Also, it would have been of

great benefit to have been granted access to interview Shell and Drummond and/or Prodeco

employees and security personnel, as well as representatives of the local communities living side by

side with these extraction sites. Additionally, it would have been very interesting to have been able

How can we conceptualize the marketization of security and risk, and what are the consequences of this marketization

for how transnational corporations affect sovereignty and rights in weak states?

Chapter 4 5 & 6 7

Sub-question How does neoliberalism,

as a mode of governance,

affect how transnational

corporations approach

security and risk

management?

How does marketized

security affect the way

transnational corporations

interact with stakeholder

communities?

How do security

assemblages effect the

configuration of

sovereignty and the right

to security?

Empirical Data Interviews, academic

literature

NGO reports, academic

literature, legal documents,

leaked data

Findings from Chapters 5

and 6, academic literature

Theoretical Concepts Practices of governance,

socio-political risk

Assemblages, socio-

political risk, sovereignty,

inclusive-exclusions

Assemblages, sovereignty,

rights, inclusive-

exclusions

Method Semi-structured expert

interviews. Compiling and

comparison with academic

literature

Extended case study

method. Analyzing using

the theoretical framework

and findings of Chapter 4

Discussion. Comparing

and contrasting

similarities and

differences

Page 18: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 18 of 86

to interview key politicians from each country to acquire a better understanding of their perceptions

of the costs and benefits associated with having foreign extraction companies operate in their

respective countries. However, due to the high level of security threats associated with the natural

resource extraction sites and their surrounding areas in both Nigeria and Colombia, travelling there

to conduct fieldwork was unfortunately not a viable option. However, we contacted DONG, which

has only recently terminated its business with Prodeco, and asked to be granted an interview.

Unfortunately, this request was denied, and we were instead referred to an official statement

recently posted on DONG‟s website with regard to a recent case linking Prodeco to human rights

violations in the Cesar region of Colombia. Another aspect which we encountered as a limitation at

an early stage in our research is the lack of useful data on similar cases around the world. Therefore,

instead of incorporating many different case studies into our analysis, we chose to go in-depth with

two different, but in many ways also similar case studies: of Shell in Nigeria and Prodeco and

Drummond in Colombia. The latter was inspired by the contested business relationship with DONG

Energy.

Page 19: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 19 of 86

Chapter 3. Theoretical framework

3.1. Introduction to the Chapter

In this chapter we outline the theoretical framework that will be used in the thesis. This is built up

around three main analytical concepts: „security assemblages‟, „socio-political risk‟, „and inclusive

exclusion‟. While the two first concepts concern the first part of our research question on

conceptualizing marketized security and risk, „inclusive exclusion‟ and the right to security of

person‟ pertains to the last part of the research question concerning how transnational corporations

affect rights and sovereignty in weak states. Both examples from Nigeria and Colombia concern

local security situations with global ramifications for the TNCs involved. The security situations in

the two countries then become multi-sited, as foreign companies try to arrange the security situation

to their advantage. The theoretical concept of security assemblages, we suggest, allows us to

analyze local settings that are affected by, and effect, a larger global setting. We will use the

concept of security assemblages to analyze how different security actors are related and affect one

another. This will be followed by a presentation of the concept socio-political risk. The term „risk‟

has many different associations, and in this chapter we present some of these ideas and the types of

risk they pertain to, and combining them to come up with a suitable conceptualization that fits the

research problem this thesis addresses. The two concepts of security assemblages and socio-

political risk help us conceptualize the marketization of security, while the last concepts of inclusive

exclusion will, we suggest, enable us to understand the consequences such marketization has on

rights and sovereignty. Furthermore, in this thesis, the Foucauldian concept of biopolitics refers to

Agamben‟s idea of life being politicized through a process of inclusive exclusion, which is what can

be seen as the nucleus of sovereignty (Hansen and Stepputat 2005). Addressing sovereignty as such

allows us to dislocate sovereignty from pertaining to the state alone.

3.2. Security Assemblages

Analyzing global security assemblages requires a variegated understanding of power. It also

demands an appreciation of the particular place of security in modern politics, where its

status as a public good is one of the central institutional features and legitimating principles

of the sovereign state. (Abrahamsen and Williams 2010: 101)

This part of the thesis describes our conceptualization of the term ‘security assemblages’, which we

will use to provide substantial theoretical value to the description of contemporary security

governance arrangements. Our argument is that literature that has inspired theories of „security

assemblages‟ seem to be split into two main schools of thought, both of which emerged as a

response to global neoliberalism. One school seems to argue that the increased outsourcing to

private actors in contemporary forms of governance can be viewed as a neo-colonial wave that

especially weakens the power and authority of fragile states (Mandrup 2012) and might eventually

lead to the end of the sovereign nation state (Mandrup 2016; Levi 2002; Guéhenno 1995; Ohmae

1995). The other school seems to argue that privatization and outsourcing is a type of indirect

Page 20: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 20 of 86

governance used by weak states to regain control over their populations and territories (Abrahamsen

and Leander 2016; Abrahamsen and Williams 2010; Hönke 2010, 2008; Sassen 2006, 2008). Both

schools of thought raise interesting and relevant arguments for the objective of this thesis, but

scholars within the latter school especially will be used to define our understanding of the

phenomenon of security assemblages.

To fully conceptualize the term security assemblages, we will start with the idea of an assemblage,

taking our point of departure in Abrahamsen and Leander‟s definition:

[…] as a descriptive term, assemblage captures these new geographies of power that are

simultaneously global and national, public and private: diverse hybrid structures that inhibit

national settings but are stretched across national boundaries in terms of actors, knowledges,

technologies, norms and values. (2016: 134)

With this in mind, it is essential to mention that no grand theory or methodology regarding

assemblages exists, but most of our understanding of this phenomenon is embedded in Saskia

Sassen‟s conceptualizations related to Territory, Authority and Rights (TAR) (2006: 4). Sassen

describes TAR as „complex institutionalizations constituted through specific processes and arising

out of struggles and competing interests‟ (2006: 4-5). Following this trail of thought, Abrahamsen

and Williams (2010: 92) argue that „the process of partial state disassembly has been crucial to the

rise of private security‟. This means that:

in the field of security, the result of these processes of disassembly and reassembly has been

the formation of complex, multi-sited institutional orders – global security assemblages –

where a range of different security agents interact, cooperate and compete to produce new

practices and structures of security governance (Abrahamsen and Williams 2010: 95).

This description is significant for our understanding of security assemblages, because it implies that

these components (TAR) – what the territory is, who the authorities are, and what the right becomes

– are not static, but rather subject to change when new actors and interests enter the national sphere

– an idea that will be further scrutinized and elaborated on in our examples and analyses. Sassen‟s

three components of TAR are traditionally viewed as part of the Westphalian nation-state domain

(Sassen 2006, 2008; Hönke 2010; Abrahamsen and Williams 2010), or what Hönke (2010: 105)

more specifically calls „the Weberian ideal-type “Anstaltsstaat”‟, where the:

national sovereign gains exclusive authority over a given territory and at the same time that

territory is constructed as coterminous with that authority […] this in turn gives the

sovereign the possibility of functioning as the exclusive grantor of rights. (Sassen 2006: 6)

However, Sassen argues that, due to neoliberal market power and globalization, the entry of new

international private actors is causing a reconfiguration of the traditional understanding of TAR.

With this argument, Sassen portrays globalization as a „process of realignment‟ (Abrahamsen 2016:

133) within the state, rather than a process of external forces decomposing the state from within, as

academics within the second school of neocolonialism have argued. Sassen, through Abrahamsen

and Williams, describes the reconfiguration of TAR as a three-step process:

Page 21: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 21 of 86

a process of „disassembly‟ in which previously public functions are increasingly transferred

to private actors; the development of „capacities‟ by private actors that allow them to act at a

global level; and a process of „reassembly‟ whereby these new actors and capabilities

become part of global assemblages that are embedded in national settings but operate on a

global scale. (Abrahamsen and Williams 2010: 91)

The increase of private actors in the global security market does not lead to a disappearing or

weakening of the state, but rather a disassembly of the national leading to the „emergence of new

types of orderings that coexist with older orderings [where] particular components of the state have

actually gained power because they have to do the work of implementing policies necessary for a

global corporate economy‟ (Sassen 2008: 63). This point is especially relevant for the focus of this

thesis, because it suggests, in line with Hönke‟s argument (2010: 106), that the extended role of

private corporate actors in security governance can be seen as a new type of „indirect governance‟

by „quasi-outsourcing‟ local governance from the host state to the home states of private actors and

multinational companies.

A useful example of a security assemblage is airport security. These assemblages involve both

national and transnational regulatory networks and are enforced by both private and state actors.

Furthermore, this specific example of a security assemblage operates in an area that transcends the

traditional boundaries of what are public and private spaces. The airport itself can be privately

operated, but the border of the nation it is located in is the state‟s domain and is regulated by official

government security forces. At the same time, private security companies regulate other domains of

the airport, such as shops, passenger screening etc. Regulations are also divided into their different

aspects, as on the one hand there are the national regulations of the country in which the airport is

located, while on the other hand there are international regulations regarding flight security

internationally.

In the same way, any actor that deals with international relations of any kind must be aware of the

different security assemblages that exist within its field, taking into account the regulations in its

home country, the applicable international regulations, and the regulations of the country it is

operating in.

In summary, our understanding of security assemblages implies a reconfiguration (disassembly and

reassembly) of power between the state and private/non-state actors. However, this does not mean

that the state necessarily experiences a weakening of its authority, but rather a decentralization and

outsourcing of certain aspects of power and authority to the private sphere. Also, security

assemblages are not one-sided but can be seen as sources of security that can be constructed as

being both in opposition to the state, serving only private interests, and also often as an integrated

part of state governance.

Taking this idea to a global level implies that global security governance is no longer solely focused

on the security apparatus of monolithic states, and that it has moved away from the traditional

Westphalian understanding of state security and security in general (Schouten 2013: 84; Sassen

2006).

Page 22: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 22 of 86

We will use this understanding of security assemblages when we analyze our two examples from

Nigeria and Colombia concerning local security situations in which the fact that foreign companies

operate in the two countries has global ramifications for rights. Therefore, the purpose of

incorporating this theoretical concept is to use it to look at security as multi-sited hybrid structures

that depart from local settings. So, instead of focusing on rigid outlines of institutional and spatial

definitions of security constructs, our understanding of security assemblages allows us to

investigate security situations in multi-sited settings and to analyze how these security situations

affect corporations, citizens, and states across borders through (re-)configuration of norms, values

and actors.

3.3. Socio-Political Risk

In recent times, there has been a significant increase in political risk for MNCs

[multinational corporations]. This is true not only for an MNC‟s operations in developing

countries, but also for those in developed countries. Governments have felt the need to

respond to various pressure groups aimed at curbing the power of MNCs. (Hood and Nawaz

2004: 9)

Several authors writing about forecasting and managing political risk have argued that certain types

of risk associated with war, local conflict or expropriation are essential elements of risk assessment

and management for foreign direct investments (FDI) (Frynas and Mellahi 2003; Moran 1998;

Herring 1983). Moran argues that „the need of international investors and financial institutions to

provide effective tools and strategies to manage risks and uncertainties of an extra-commercial

nature remains high‟ (1998: 1). The concept of „political risk‟ is ambiguous, with an array of

diversified definitions and emphasis (Kansal 2015; Kobrin 1979). Frynas and Mellahi argue that

„political risk is an important part of the international business literature, but as a concept, it is

difficult to define, and even more difficult to express in figures‟ (2003: 545). Kansal (2015) further

argues that its „obscurity is beneficial as it presents a scope to tailor the concept of political risk to

include, and attempt to mitigate, risks which may be specific to only a particular economy, sector or

a firm‟.

Even the concept of „risk‟ in and of itself has been defined within many different fields of study and

through different contexts (Douglas 2013; Sottilotta 2013; Beck 2009; Jarvis 2007; Shubik 1998).

As Beck argues, „[s]ociety is founded and administered on the basis of the ambiguity of risk‟ (2009:

6). Therefore, to use the concept as an analytical tool in our case studies and throughout the overall

analysis and discussion, a specification is needed. We have chosen primarily to use the concept of

socio-political risk throughout this project, which refers to a combination of political, financial and

social risks that are all interlinked and part of security assemblages – what the assemblages address.

We have chosen to combine these elements and merge them into one conceptual constellation

because they are impossible to separate from one another when trying to answer the research

question.

Page 23: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 23 of 86

To explain how we understand socio-political risk, it is useful to take a step back and start by

defining the concept of „risk‟ as it has been described by other scholars, because it is from these

definitions that our understanding of socio-political risk has been constructed. Shubik argued that:

Risk is only defined in the context of a specific goal structure. It cannot be assessed

independently from purpose. Probabilities or the possibility of the occurrence of an event

exists independent of purpose. The risk to an individual given that something occurs

depends upon that individual‟s goals and resources. (1983: 134)

Other, more contemporary scholars, such as Frynas and Mellahi, who come out of the CSR

literature, adopt a more business- and firm-specific approach to their definition of risk, which they

argue:

is not a tangible thing but a bundle of expectations concerning potential future instability

that have a market value and determine future earnings. In other words, risk is a subjective

perception of how instability may affect the firm, and it is assessed to predict the likelihood

of different types of instability. (2003: 545)

Some of the more prominent and widely recognized definitions of „risk‟ come from the world of

sociology and anthropology, having been put forward by scholars such as Ulrich Beck and Mary

Douglas. The conceptualizations of risk by these two scholars differ significantly, due to the

objectives of each definition. Douglas links contemporary risk with danger and taboo, and argues

that „the modern concept of risk […] is invoked to protect individuals against encroachments of

others‟ (2013: 28, 18). These are interesting definitions, which arguably refer to a „staging of risk‟,

implying that perceptions of certain types of risk are socially constructed through articulation, rather

than through objectively measurable assessments. This also implies that what is considered a risk is

not necessarily physically dangerous.

Beck argues that „chance and danger‟ are the key components of contemporary understandings of

risk, and contends that „the semantics of risk refers to the present thematization of future threats that

are often a product of the successes of civilization‟, and further, that, „through risk, the arrogant

assumption of controllability – but perhaps also the wisdom of uncertainty – can increase in

influence‟ (2009: 4, 5). For Beck, the introduction of globalization can be seen as a challenge to

state territoriality and sovereignty by weakening the state‟s and citizens‟ authority to act

independently and separately. According to Jarvis, Beck sees globalization as a phenomenon that

de-nationalises markets, creates international patterns of competition for foreign investment

and forces the state to respond to an international rather than purely domestic constituency.

The state‟s source of legitimacy is primarily internal, yet much of its material needs can be

realised only through external economic interaction. (Jarvis 2007: 26)

These arguments are relevant because they say something about how the development of modern

society by means of globalization is edging on and providing meaning to contemporary ideas of

risk. As Douglas states, „a risk is not only the probability of an event but also the probable

magnitude of its outcome‟ (Douglas 2013: 31).

Page 24: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 24 of 86

Although our understanding and use of the concept of socio-political risk has its starting point in

Douglas‟s and Beck‟s definitions of risk, it also draws heavily upon Frynas and Mellahi‟s (2003)

contemporary understanding of political risk linked to the financialization of security, in addition to

Hood and Nasaw‟s (2004) suggestion of how political risk may be defined as a „particular exposure

to risk which depends on the actions of a government, and its assessment or analysis for a TNC is a

decision-making tool for investing in foreign countries‟ (ibid.: 12). When combined in the way we

have presented it here, these ideas and definitions can act as theoretical tools used to conceptualize

the marketization of security and risk by linking socio-political risk management to the re-

configuration of rights and sovereignty. This link will become clearer by the end of this chapter,

when all the theoretical concepts and analytical perspectives have been presented and combined.

However, first we must expand upon our understanding and use of the notion of socio-political risk.

One of the main interests of this thesis is how socio-political risk is generated, and its connection to

the marketization and privatization of security. Therefore, one more theoretical concept will be

useful to add to the equations, which is Gidden‟s idea of „professional expertize‟ (1990: 27). This

idea also forms part of our understanding of socio-political risk assessment and management, and it

plays a significant role in our data analysis. Giddens argues that „the systems in which the

knowledge of experts is integrated influence many aspects of what we do in a continuous way‟

(1990: 27). This means that „non-experts‟ trust and rely on „experts‟ establishing systems that

integrate acceptable socio-political risk-levels, „but if there is disagreement amongst those

possessing expert knowledge the lay actors need to decide which experts to trust‟ (Linsley and

Shrives 2009: 494). This is where, in some (weak) states, the government‟s police, as the designated

and traditional experts on security and risk, have in some cases lost out to the expertise of private

security companies (Lupton 1999). This means that, when such disagreements appear between the

experts and non-experts, it can result in a redefinition of existing norms by „norm entrepreneurs‟

(Krahman 2013: 55-57; Finnemore and Sikkink 1998: 895), who consist of both the non-experts

who initiate the change in norms, as well as the new private actors who are offering an alternative to

the norm, which in this project are private security companies, involving:

those moments of rupture and possible transformation when social actors re-appropriate new

norms, such as to enable new subjectivities to enter the public sphere and to alter the very

meaning of claims making in the public sphere itself. This is the promise of democratic

iterations and cosmopolitan norms in the present. (Benhabib 2009: 701)

Bigo adds to this argument by suggesting that invoking security and risk should be made plausible

through

a transnational field of professionals in the management of unease [...] larger than that of

police organizations in that it includes, on one hand private corporations and organizations

[...] and, on the other hand, intelligence services and some military people [...] a node

connecting many competing networks responding to many groups of people who are

identified as a risk. (2002: 64)

Page 25: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 25 of 86

Aitken suggests that risk assessment markets „seek to mobilize forms of everyday and non-

specialized knowledge‟ (2011: 124), an argument based on what Hayek referred to in 1945 as

„particular circumstances of time and place‟ (Hayek 1945: 521). Aitken combines Giddens‟ and

Hayek‟s ideas on the construction of expert knowledge, and uses them to explain the

financialization of security. He further emphasizes how the financialization of security, which

builds on non-expert knowledge, constitutes an attempt to commodify insecurity: „the attempt to

mobilize not expertise but forms of everyday experience‟ (Aitken 2011: 125). This matches

Gidden‟s idea of expert knowledge, implying that non-experts construct their own risk knowledges

through local encounters and observations. Therefore non-experts are continually making

assessments concerning the credibility of experts‟ risk knowledge, based on their own experiences

(Lupton 1999; Linsley and Shrives 2008). If these assessments differ too much from the expert

assessments, non-experts will turn to other sources of knowledge, which are often in the private

sector. In this way, private security companies become the new expert systems on risk assessments

and risk management. This is especially evident in weak states, where there are high levels of

corruption in government forces, and the state as the intended arena for expert systems on risk and

security is unable to provide security for its own citizens or for firms operating within its territory. It

is especially under such circumstances that private security contractors are increasing in numbers

and gaining legitimacy through risk management.

In summary, our conceptualization of what we have coined „socio-political risk‟ can be used to

provide substantial analytical value to the description of contemporary security governance

arrangements. One of the main focuses of this project is how transnational corporations (TNCs)

manage socio-political risks, and therefore we will, for the most part, refer to cross-border risks as

socio-political risks because these combined terms include the different aspects of risk that are

deemed most relevant for the focus of this thesis. Furthermore, we use the term in a holistic way,

which includes any risk that is the product of national and/or international changes in the business

environment, meaning social risk, political risk and government policy risk. This implies that the

concept of socio-political risk is an umbrella term that for the most part is firm-specific, given the

contextual significance of a company‟s own assets and capabilities, and especially the geographical

location of its operations, which affect the types or risks it faces.

Socio-political risk acts like a red thread throughout the thesis and is what ties all the different

theoretical and analytical components together. Therefore, we will apply our conceptualization of

socio-political risk as an analytical tool to explore how it plays a key role in the long-term business

strategies of TNCs when operating or investing in weak states. This applies to both of our examples

from Nigeria and Colombia. Furthermore, we will use this concept to link the main actors involved

in the configuration and re-configurations of global security. Socio-political risk will also be used to

explore how new discourses on risk are constructed and produced in the interplay between states,

civil society organizations, corporations and PSCs. The concept of socio-political risk thus points

towards the primary relationship that evolves between actors in the security assemblage and is what

connects the home state and the host state for TNCs.

Page 26: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 26 of 86

3.4. Inclusive-exclusion and the right to security of the person

To answer our research question, we also need to look at how TNCs use of private security affects

the configuration of rights and sovereignty. By rights, we refer to the right to security as inscribed

in the UN Universal Declaration of Human Rights, Article 3, which reads: „Everyone has the right

to life, liberty and security of person‟ (UN UDHR, Article 3).

In 1966 further additions were made in the International Covenant on Civil and Political Rights,

Article 9:

[…] No one shall be subjected to arbitrary arrest or detention. No one shall be deprived of

his liberty except on such grounds and in accordance with such procedures as are established

by law. (UN ICCPR, Article 9)

As such, our understanding of the right to security is that is provides a basic acknowledgement of a

person‟s right to his or her own freedom under the auspices of the law. This leads us to the

sovereignty part of our research question. It is our presumption that hitherto the right to security is

something that has been provided by the sovereign state through its monopoly on violence. As Max

Weber suggested, this is what constitutes the state as the:

only human Gemeinschaft which lays claim to the monopoly on the legitimated use of

physical force. However, this monopoly is limited to a certain geographical area, and in fact

this limitation to a particular area is one of the things that defines a state. (Weber, 2015:

136)

But as our research question suggests, we presume that the notion of the state being the sole

provider of security in function of a right is no longer applicable in the age of globalization. A

reconfiguration of the state and of rights does not necessarily mean that the state is no longer

relevant, but we do need to theorize beyond the state and look more holistically at rights and

sovereignty. To explore this further, we will incorporate Agamben‟s concept of inclusive exclusion.

In considering how mechanisms of exclusion work, we will utilize Giorgio Agamben‟s ideas on

what constitutes sovereignty.6 Agamben rejects Foucault‟s idea of sovereignty as an archaic entity

that exists in modern biopolitics and argues that „the production of a biopolitical body is the original

activity of sovereign power. In this sense biopolitics is at least as old as the sovereign exception‟

(Agamben 1998: 11).

As such, Agamben seeks to understand sovereignty at its core, and „bare life‟ is central to this

understanding. „Bare life‟ is simply biological life, and Agamben argues that it „has the peculiar

6 Agamben extends the examination of sovereignty found in Georges Bataille, Carl Schmitt and others through the lens

of Foucault and his concept of biopolitics (Hansen and Stepputat 2005: 16).

Page 27: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 27 of 86

privilege of being that whose exclusion founds the city of men‟ (ibid.: 12), that is, what became

those with access to citizenship.7

This form of „inclusive exclusion‟ is important, and Agamben goes back to ancient Greece, arguing

that the ancient Greeks had no single word for life; rather, they had two – bios and zoē. Zoē referred

to what we have so far called „bare life‟, a life of mere reproductive value and what is common in

all life, be it animals, men, or gods (Agamben 1998: 9). Bios, on the other hand, pertains to the

proper way of living – a qualified life.8 If we return to the notion of the city of men, bios would

describe the life of the free citizens, whereas zoē would be the common denominator in all life in

the city.9 To Aristotle, though, the bare life had a capacity for more, as he wrote: „born with regard

to life, but existing essentially with regard to the good life‟ (Agamben 1998: 9). And it was this idea

of the connection between the bare life and the good life that led Michel Foucault to conceptualize

biopolitics. Foucault wrote:

For millennia man remained what he was for Aristotle: a living animal with the additional

capacity for political existence; modern man is an animal whose politics calls his existence

as a living being into question. (Foucault 1978: 143)

Thus there is a connection between present-day politics and life, what Foucault conceptualizes as

biopolitics. Agamben sees this connection between life and politics as the incorporation of zoē into

the polis, or as the politicization of bare life, and it is within this connection that he suggests the

necessity for analyzing present-day politics and its inherent oppositions (Agamben 1998: 10). Left

vs Right, Private vs Public, Absolutism vs Democracy – these are some of the dominant oppositions

that constitute modern western politics, and it is only, Agamben suggests, through the perspective

of biopolitics – the link between bare life and politics – that we can understand what governs

modern politics (ibid.).

But as mentioned earlier in this chapter, Agamben rejects Foucault‟s idea of sovereign power as

being archaic. Instead he proposes that the link between life and politics is where true sovereign

power exists (Agamben 1998: 11). The inclusion of life into politics is the nucleus of sovereign

power. Its inclusion into modern politics happens through an exclusion where political life is

created by excluding bare life from politics. The link between bare life and politics exists when the

two oppose each other but still remain related in this very opposition. Hence bare life is included in

politics by an exclusion.

7 By „city of men‟, Agamben refers back to Antiquity, when the city consisted of free men and citizens, but excluded

the plebs, women, slaves, and other forms of „bare life‟ from the political community, even though they were still a

crucial part of the economy.

8 Plato made a distinction between three types of bios: the political life (bios politikos), the philosophical life (bios

theōrētikos), and the life of pleasure (bios apolaustikos), all three being lives of purpose and qualification (Agamben

1998: 9).

9 The plebs, women, slaves, etc. did not live up to the standards of bios for each their own reason.

Page 28: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 28 of 86

Rights, and the right to security of person, is found in the politicized life (Agamben 1998: 11-13).

In antiquity, rights were given to those who lived a qualified life, to use Plato‟s terminology, but in

modern politics rights are created through an inclusive exclusion. A person is given rights by being

included in the political life, but these rights can be taken away if the person does not qualify for a

political life. Just as inscribed in the UN ICCPR, Article9, presented in the beginning of this sub-

chapter, an individual‟s right to security of the person can be removed if that person violates a

written law. Living outside the law means exclusion from political life and the removal of certain

rights. In this thesis, we will utilize the idea of rights as an inclusive exclusion that is built upon the

concept of biopolitics to analyze the configuration of rights. This allows us to look at rights as both

juridical written laws and institutionalized ideas, but it also allows us to examine rights beyond the

realm of the state. In his book Homo Sacer, Agamben argues that the nation state cannot be

circumvented when it comes to understanding rights and sovereignty (Agamben 1998: 75-76), but

our hypothesis denotes a state-only focus. We will instead adopt the idea that true sovereign power

can be found in the link between life and politics (biopolitics) and utilized beyond the realm of the

state. We will look at assemblages of security and find the biopolitics within to analyze how

sovereignty might have been reconfigured by private security, and maybe even displaced away from

the nation state. Agamben argues that the sovereign exerts its power through practices of exception

(Agamben 1998: 15-41), but we will look at how sovereign power might be configured by more

„mundane‟ practices – in particular, practices originating in the world of business and finance.

It is within these practices of business and finance that we will try to apply Agamben‟s concept of

sovereignty. In the next chapter we will introduce the concepts of corporate social responsibility,

and social license to operate, both concepts being practices from the business world that, we argue,

have influenced the global security field. It is within these practices that we will utilize this theory

by looking at how, when combined, they create a form of inclusive exclusion. The practices we

examine are often used by TNCs, and we focus on companies operating out of a strong (western)

state but investing in a weaker state. We argue that inclusive exclusion takes place in a TNC‟s home

country as well as in the host country. In this thesis, we have chosen two cases which each

represents a host country – Columbia and Nigeria. We argue that, in the host countries, TNCs

construct new security assemblages by deploying private security actors to establish security

arrangements for their investments in addition to state-provided security. These assemblages are

created in an attempt to mitigate the socio-political risks involved in the investments. The two

practices mentioned above (CSR and SLO) are practical approaches utilized by TNCs to minimize

this risk. They are not only ways to minimize socio-political risks, but also set up the parameters of

the security assemblages created in the host countries by introducing a set of values, norms and

actors.

By combining these values and norms with the logic of minimizing risk, these assemblages create

an inclusive exclusion that seeks to exclude whatever does not conform to values and norms by

constituting them as risk. Furthermore, as we will explain in the next chapter, the described business

practices also place the lives and livelihoods of the affected population in both the home and host

country at its core. As the risks that these practices attempt to mitigate are social and political in

nature, the inclusion of life in the practices turns them into the exercise of biopolitics. In this sense,

Page 29: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 29 of 86

the practices become what governs the actors in the assemblages. And in Agambian terms, the

sovereign power exists by creating biopolitical bodies. Although we choose to move away from a

state-only focus and apply it to the assemblages, it is through the two practices that we will examine

how biopolitics are applied in the assemblages. This allows us to examine how sovereign power has

been reconfigured by the security assemblages set up by TNCs, and how such reconfigurations

affect the right to security within these assemblages.

3.5. Our outlook on contemporary configurations of Security

Combining these three theoretical concepts provides us with a map of the arrangements and

realignment between what we have identified as four separate apparatuses that are all part of the

construction and reconfiguration of security and risk: states, civil society, private security, and

corporations. In traditional Hobbesian theory, security and risk are embedded between two main

apparatuses: the state and civil society. It is the social contract „that prohibits the private use of

armed forces and invests in the Sovereign. In short it is the Sovereign‟s monopoly on the legitimate

use of collective violence that provides security‟ (Krahmann 2010: 23). Therefore, the traditional

Hobbesian configuration of security would be placed on an unbroken line between the state and

civil society. This is simplified in the figure below:

However, since the end of the Cold War, an international neoliberal discourse, with a focus on

downsizing the public sector, has dominated through the agency of globalization. This has led to the

frequent outsourcing of public goods to the private sector (Berndtsson 2009: 116), including the

right to security of person. This is in part what we refer to as the marketization of security and risk,

where a third component, private security, has been added to the international configuration of

security and risk. This implies that the right to security of the person, which is traditionally seen as

the sovereign‟s domain, is increasingly being treated as a business commodity rather than a human

right. As a result, a third element of private security is added to the original global security

configuration. This is depicted in the figure below:

Figure 1: State - Civil Society

Page 30: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 30 of 86

Our argument in this thesis is that a fourth component has also been added to the configuration of

security through the increasing neoliberal marketization of security and focus on risk. We have

chosen to label this last element, which includes TNCs, simply as the corporations. Our argument is

that corporations are constructing new security assemblages by implementing risk management and

private security in relation to their businesses abroad. This is especially evident among western-

based TNCs who operate in or have cooperative arrangements with weak states. These corporations

make deals with the host state for licenses to operate in specific locations, and as the corporations

enter these new sites, we argue that new security assemblages are constructed through their

presence, leading to a reconfiguration of rights. When the state outsources licenses to operate to

foreign corporations, it arguably outsources sovereignty to corporations that in return sub-contract

private security companies. This is especially evident in high risk areas, where extra security

measures must be taken in order to create a safe working environment. This means that

contemporary global security is constructed and re-configured between these four components. This

is depicted in the figure below:

Figure 2: State - Civil Society - Private Security

Page 31: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 31 of 86

Figure 3: Reconfiguration of the Right to Security

3.6. Interim Conclusion

We have examined three different theoretical concepts, assemblages, socio-political risk and

inclusive-exclusion, to formulate a theoretical framework that can be used to explain the relation

between state, citizen, TNCs and private security. Assemblages will be used to understand what

constitutes as the actors and how in local settings can become global. Socio-political risk will be

what connects the actors within the assemblage and constitutes the relations between them.

Inclusive-exclusion is our reconceptualization of Agamben and serves as our take on sovereignty

and the relation between sovereign and citizen. This theoretical framework will be used to examine

our cases.

Page 32: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 32 of 86

Chapter 4. Neoliberal practices: global security and risk

management

4.1. Introduction to the Chapter

This chapter seeks to answer the sub-question „How does neoliberalism, as a mode of governance,

affect how transnational corporations approach security and risk management?‟ Based on this, we

look more closely at how we can understand the marketization of security by examining the

academic literature in conjunction with our empirical interviews. In doing so, we first consider

neoliberalism as a mode of governance to outline the political parameters which lay the foundation

for the marketization of security. Our understanding of neoliberalism as a mode of governance

pertains to the Foucauldian term „governmentality‟ (Mayhew 2004).

Based on the conceptual work, we returned to our interviews, paying particular attention to the use

of specific concepts such as market forces, privatization and everyday knowledge. Furthermore,

through our interviews we identified two examples of practices of neoliberal governmentality:

Corporate Social Responsibility (CSR) and Social License to Operate (SLO). We argue that these

practices are interconnected and act as important enablers linking security and risk and forming a

vital part of the global marketization of security.

First, however, we will explore and define marketization and financialization. Marketization will be

used to describe the restructuring of state tasks and their transfer to private entities and market

forces. Financialization will be used to explain the methods and techniques mobilized within

marketization strategies. In conjunction, marketization and financialization will be used to support

our analysis of how specific aspects of the security field are being turned into financialized assets.

The first practice discussed in the chapter is CSR. We argue that the increasing emphasis on CSR in

contemporary corporate behavior points towards the interconnectedness between what corporations

do abroad and how their conduct is handled at home. Or the other way around, CSR policies and

stakeholder awareness at home also affect and shape corporate behavior abroad.

The second practice is Social License to Operate (SLO). SLO also emerged from the CSR domain,

but it goes beyond CSR by zooming in on how stakeholder communities10

influence and shape the

actions of TNCs abroad. Additionally, this field, which has the potential to influence corporations,

has become an important „market‟ field for PSCs.

The two business practices will be used together with our theoretical framework when we explore

how TNCs manage security and risk in our two examples from Nigeria and Colombia.

10

Concept used by Boutilier and Thomson (2011) to describe communities „affected by the actions of a company or

who could have an effect on the company‟ (2).

Page 33: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 33 of 86

4.2. Neoliberalism

For the purposes of our thesis, it is important to understand how the current world of security is

configured. The private security market, which is our main focus, has sprung up out of the

conventional perception of security as being state-centric. The increased use of private security and

the expansion of the private security market did not happen out of the blue. Neoliberal policy-

making and politics are often recognized as the main reason behind the increased privatization in

the security sector, or in any other sector of governance for that matter. And when we conceptualize

the current configuration of global security, we will do so by treating security as part of the

globalized neoliberal order. However, we need to establish what we mean by „neoliberalism‟, as it

has become an ambiguous term in the academic literature (Venupogal 2015: 166). The term has

been widely criticized for its usage being diffuse, including but not limited to political policy-

making processes, as well as being a label for a macroeconomic doctrine (ibid.: 166-167):

it lives […] as a problematic rhetorical device that bundles together a proliferation of

eclectic and contradictory concepts; a tableau of critical explorations of the material

world by non-economists, clustered together by a shared signifier that thematically

links them to a broader set of morally devolved referents about markets, economics,

subjectivities, state authority, globalization or neo-colonialism. (Venupogal 2015:

183)

In our thesis, we will treat the term „neoliberalism‟ as encompassing the political ideas of

privatization and market deregulation, as well as describing a cultural and ideological phenomenon.

We distance ourselves from the classic understanding of neoliberalism as a term of political

economy and instead start from an understanding of neoliberalism that elucidates power relations

(ibid.: 169). This version of neoliberalism draws theoretically on Marx, Gramsci and Foucault

(ibid.) and conveys the idea of a wealthy West imposing neoliberal ideas (the ones mentioned

earlier, privatization, deregulation, etc.) upon a less wealthy „global South‟ (ibid.: 176). As such, we

use the term „neoliberalism‟ to describe a mode of governance, as it helps us unveil how risk

management and other western practices affect how security and rights are configured.

The phrase „mode of governance‟ can be referred to the Foucaldian term „governmentality‟.

Governmentality can be understood as the organized practices of mentality, rationality and the

techniques that are used to govern subjects (Mayhew 2004). For neoliberalism, mentalities of

competitiveness and self-interest are at its core, and the ideas of a self-regulating market and of the

decentralization of state power to more localized units are some of the rationalities. The techniques

of doing so are directly adapted from the world of business and include such things as risk

management, cost-benefit analyses and quantitative measurement protocols.

This approach to neoliberalism not only draws a theoretical line under our conceptual

understandings of Agamben and assemblages (see chapter 3) through the concept of

governmentality, it also highlights the role that neoliberalism plays in the global security field. It

lets us look more closely at the practices used in the field that pertain to neoliberal governance.

Page 34: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 34 of 86

Through our interviews we have chosen to look more closely at Corporate Social Responsibility,

and Social License to Operate. These two concepts stem from the world of business and finance, but

they have also had an impact on the field of private security as well. Later in this chapter we will

expand on these terms and show how they can be seen as practices of governance. But first we will

look at how they came to be important in the security field.

4.3. Marketization and Financialization

In this thesis, we argue that the field of security has undergone a certain level of marketization and

financialization: the two mechanisms just mentioned are a sign of just that. As terms, both

marketization and financialization are related to the notion of neoliberal governance explained in

the previous section. Marketization pertains to the rationalities of self-regulating markets and the

decentralization of state power. As a concept it refers to the practice of restructuring state

enterprises to act more like private corporations and to be regulated according to market force (van

der Hoeven 1997: 101). But this definition is a bit lacking when it comes to security because neither

the police nor the military in any state is run by market force. In a more abstract sense, however,

one can view the increased number of private security actors as indicating a deficiency in the

security options available to corporations. As such, the marketization of security does not

necessarily pertain to already existing state security apparatuses but the outsourcing of certain

security-related tasks to private entities that operate within market forces. For our thesis, then, this

is how we will view marketization: as the logic of restructuring state tasks by devolving them to

private entities and market forces.

Marketization:

Our interviews provided several examples of the marketization of security. One example is how

Frederik Østerby from Guardian Security Risk Management [Guardian SRM] described the

company as a business enabler rather than a private security company (Østerby 2016: 5:59). The

logic here is that the company provides a service for which there is market need. In contrast to the

state, which has a far more defensive approach to security (ibid.: 36:54), private companies can act

more freely, while the globalized market makes the possibilities for contracts far more diverse. The

market for security services is closely related to the globalized world, and current events are deeply

affecting how the demand and supply equation is configured. At Guardian SRM they have seen an

increased demand in the field of security due to the dynamics of globalization and the increased

targeting of civilians (ibid.: 28:00). Different events around the world, such as terrorism, wars,

political instability etc., are shaping the market demand for security.

An entirely different aspect of the global security field is the investment aspect. This aspect often

influences the global security field in a more indirect way than actual private security companies

and transnational corporations. To uncover this aspect of the global security field, we interviewed

Michael Nellemann Pedersen, the investment director in the Danish pension fund, PKA. He

Page 35: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 35 of 86

described an increased focus on what he refers to as responsible investments within the large

investment groups, and in particular pension funds and similar institutions (Pedersen 2016: 07:26).

Responsible investments are investments made on the basis of a set of core values and norms often

of significance to the civil and political society that surrounds the investor. To PKA this concretely

means no investments in companies that produce controversial weaponry, heavy polluters such as

oil and coal companies, or companies that violate international codes of labor, to name just a few

(PKA 2016). By themselves, responsible investments influence the global security field by setting

up parameters for what are good and bad investments, in addition to the purely economic aspects of

investments. But even though these kinds of investments suggest some level of the incorporation of

morality, the bottom line is still what matters, and in Denmark it is even inscribed in law that

pensions funds must aim at the greatest yields possible (ibid.: 09:24). An example of this is PKA‟s

decision to no longer invest in coal-only based companies (PKA 2016). First of all, coal is no longer

a viable investment, as it is slowly but surely being phased out as a source of energy. But at the

same time there is a moral responsibility to take care of our environment, and a decision to stop

investing in coal is in agreement with this responsibility. The connection between social and

economic responsibility is also something that recurs later in this chapter when we look at

Corporate Social Responsibility [CSR] and Social License to Operate [SLO]. This connection also

shows an aspect of how security has been marketized. Responsibility towards local populations,

surroundings and the environment are no longer based solely on morality but also on economic

considerations. CSR and SLO are both examples of market practices that combine moral and

economic considerations in marketized security and provide insights into how market force affects

the global security field.

Financialization:

Financialization refer to the techniques of marketization, and as such it is a phenomenon within

marketization (Godechot 2015). As an academic term, financialization has been used widely and

across academic disciplines to try and understand the rising number of financial markets (van der

Swan 2014). Definitions of financialization thus vary greatly and spread across understandings,

from a frame through which corporations are shaped and regulated (Froud et. al. 2002) to a way to

live one‟s everyday life through ideas of capitalism and finance (Martin 2002). However, Leyshon

and Thrift propose a more tangible concept of financialization as the processes in which financial

markets convert different practices into financialized assets (Leyshon and Thrift 2007; also Aitken

2011: 127). For our thesis, this concept of financialization is most significant in relation to our

conceptualization of marketized security, since it pertains to how security is being financialized in a

more concrete way.

The fields of finance and security are in many ways intertwined. Both operate with uncertainty as

their core notion, and the two fields manage uncertainty each in its own way (Aitken 2011: 127).

„Risk management‟ is a term that recurs within both fields. In finance markets that deal with

predictions, such as derivatives and futures markets, risk management is central to carrying out

investments and to profiting from them. Managing risk includes aggregating information and

Page 36: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 36 of 86

creating knowledge in order to predict uncertainty related to the markets that are being invested in.

The creation of knowledge pertains to the concepts of expertise vs non-expertise knowledge

outlined in our chapter on socio-political risk. Here, we describe how knowledge is created by

everyday expertise combined with more scientific approaches. These „everyday‟ experiences are at

the core of all prediction markets and rely heavily on the individual experiences that form „everyday

knowledge‟ that cannot easily be put into scientific protocols. We came across this kind of everyday

knowledge during our interviews with private security companies. Guardian SRM has a wide

network of handlers, fixers, informants and other PSCs that they utilize when creating security

solutions or risk assessments for their clients (Østerby 2016: 09:00). This network is primarily

based on their aggregated experience from the founding partners who had decades of experience

working in the Danish Defense Force prior to starting the company (ibid.: 11:10). Their network

usually consists of personal relations, and trust is key to how they choose the people they work with

(ibid.: 11:16). As such, the work and the decisions they make in the company rely greatly on the

everyday knowledge that has been created and accumulated by their employees, and their

employers for that matter. Johnny Andersen confirmed this approach when he explained the hiring

process for his team at the Danish embassy in Kabul. Since it is usually former Danish soldiers who

apply for these jobs, Andersen explains that he either knows the person applying personally or at

least knows someone who knows him (Andersen 2016: 10:00). In this instance, it is also the

personal experience that sets the parameters for hiring. Bruno Kalhøj, however, argued that it is not

always possible to rely solely on personal networks and references to acquire the necessary

information, as there will always be a limit to the size of the network (Kalhøj 2016: 33:45).

However, he did acknowledge the relevance and importance of having a good network in the

security business (ibid.). If we return to Leyshon and Thrift‟s definition of financialization and how

assets are financialized, we can see how this is happening to aspects of the security field as well.

The everyday knowledge of the different actors is key to them performing their jobs, providing the

best possible products, and thus become a defining part of their value as a company. However,

Leyshon and Thrift‟s definition relates to how assets become integrated into financial markets.

What we found in our interviews was not exactly that but rather value creation. But just as in the

financial field, risk is often mitigated by the everyday knowledge of the actors involved, and their

knowledge then turns into assets that have a value in their respective fields. Even though these

assets do not necessarily enter any financial markets, this still shows how aspects of security are

becoming financialized, by value creation, or at the very least intertwined with the field of finance.

4.4. Corporate Social Responsibility: making responsible investments

Throughout several of the interviews we conducted with company representatives and academic

experts on the marketization of security and risk, corporate social responsibility was mentioned

numerous times as a key component. The interest of companies in addressing CSR initiatives and

issues was exemplified by how Michael Nellemann Pedersen, investment director of the pension

fund, PKA, brought up the importance of CSR when making investments for shareholders less than

two minutes into the interview (Pedersen 2016: 1:43). Additionally, Bruno Kalhøj, Head of Security

Page 37: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 37 of 86

and Crisis Management at Maersk Oil, argued that CSR and security are inseparable and that CSR

forms a very important part of the preventative strategy because it is through CSR that a company

builds good relations with local populations (2016: 18:20). Because of the large focus and emphasis

placed on CSR by many of our interviewees, we decided to further develop certain elements

identified within CSR and deploy our understanding of the phenomenon as a key analytical concept

throughout the thesis.

The term [social responsibility] is a brilliant one; it means something, but not always

the same thing, to everybody. To some it conveys the idea of legal responsibility or

liability; to others, it means socially responsible behavior in an ethical sense; to still

others, the meaning transmitted is that of „responsible for,‟ in a causal mode; many

simply equate it with a charitable contribution; some take it to mean socially

conscious; many of those who embrace it most fervently see it as a mere synonym for

„legitimacy,‟ in the context of „belonging‟ or being proper or valid; a few see it as a

sort of fiduciary duty imposing higher standards of behavior on businessmen than on

citizens at large. (Carroll 1999: 280)

As the quote above emphasizes, CSR is a vague concept that has no one overarching definition, but

many different ones depending on context, interests and perspective. We are primarily interested in

the concept from a sociological business-society perspective, but as Dennis Masaka emphasizes,

„[d]ocketed definitions of CSR are not clear over its exact nature and place in the business-society

relations‟ (2008: 14). Because of this lack of precision, we have chosen to construct our own

conceptual understanding of CSR from a combination of primary and secondary sources, chosen

with a focus on their relevance with regard to our research question.

As such, our interest in CSR is bound up with the context of globalization and the current neoliberal

moment, where it can arguably be seen as a form of capitalist legitimacy. Furthermore, as Dr. Rajiv

Maher argued (2016: 12:05), we also believe that globalization plays a huge role in the development

of business-related security issues. Another aspect we wish to emphasize is how CSR policies have

been incorporated as part of many companies‟ business models, implying that CSR policies have

turned into company risk-management devices (Shamir 2011: 313-336).

As we frame our conceptual understanding of CSR, it is essential to keep some critical arguments in

mind, such as that CSR merely represents a type of discursive „window-dressing‟ used by

companies to construct a better brand image for themselves (Rosenberg 2002; Mullerat 2009; Aras

and Crowther 2010). In addition, Maher argues that many companies portray a general over-

eagerness to communicate the credentials of their CSR programs, which are not always in line with

what‟s really going on in the real world (2016: 06:17).

Page 38: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 38 of 86

According to Pedersen from PKA, there has been a general growing global focus and interest in

making responsible investments,11

which is also evident among company board members (2016:

7:26). Pedersen also argued that during the 00‟s there was very little focus on CSR, but today „all‟

investment companies are hiring employees to handle CSR aspects as part of their business model

(Pedersen 2016: 8:25). This argument is in line with Maher‟s description of how there has been a

boom in the focus on CSR and on local populations within the last couple of years (17:10), and big

companies usually hire human rights consultants full-time to develop human rights and CSR

policies (ibid.: 23:05). Additionally, big corporations have started to include the FPIC initiative12

(UN Human Rights 2013; Oxfarm 2015) to their CSR policies, at least on their websites (Maher

2016: 18:40), but as previously mentioned, these policies are sometimes primarily for show, with

the purpose of creating the image and reputation of a good and responsible company. Maher further

argued that companies are always happy to talk about how they respect certain rights, but it‟s

usually just talk to affect a public discourse (ibid.: 20:45).

Pedersen also mentioned that implementing CSR policies is not simply about investment companies

wanting to do good deeds, but are often the result of demands and pressure from stakeholders

because they see potential long-term profits in responsible investments (8:55). Therefore, when

investment companies such as PKA announce that they want to disinvest from the coal industry, it

is not only for environmental reasons, but rather because investing in coal no longer provides as

good a return as it has in past (Ibid.:9:30). Pedersen continued this argument by explaining how

phasing out coal serves an economic purpose that also happens to support environmental change as

well, which makes it a win-win situation for PKA in terms of its company image and returns on

investment (Ibid.:9:43). Therefore, it is important to view CSR for what it is in its entirety, which

we will describe as a long-term business strategy aimed at attracting and retaining shareholders.

Another interesting development within CSR is the involvement of TNCs in „improving‟ their value

chains and business partners. Whereas in the past many companies would immediately „cut all ties‟

with human rights violators to avoid association with a kind of business behavior that could

severely hurt the company‟s image and reputation.

Pedersen also noted that this type of responsible company behavior characterizes PKA, which has

constructed a green-yellow-red list of companies for future investments that is publicly accessible

on their website. If a company has been placed on the red list, it is deemed ineligible for investment,

but if it is on the yellow list, it will be met with a set of requirements for improvements which must

be met before an investment can take place. Once these improvements have been confirmed, the

company moves onto the green list and is eligible for responsible investment (Pedersen 2016:

28:50). One critical aspect of this, which Maher also addressed in his interview, is that some TNCs

11

„Responsible investment is an approach to investing that aims to incorporate environmental, social and governance

(ESG) factors into investment decisions, to better manage risk and generate sustainable, long-term returns.‟

https://www.unpri.org/about/what-is-responsible-investment

12 Free, Prior and Informed Consent of Indigenous People

Page 39: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 39 of 86

which are criticized for cooperating with human right violators in one way or another often excuse

their behavior with statements on how hard they are working at improving the situation. However,

these improvements are sometimes not implemented, but simply function as „window-dressing‟

(Maher 2016: 7:22).

Another important aspect of CSR, which has already been mentioned in part, is its connection with

the growing focus on human rights. This is especially evident in the western world, but it is also

becoming a global phenomenon. As TNCs run and/or establish business ventures in other countries,

they inevitably take part in both the national and local politics of the host state simply through their

presence. Some extraction companies might require high levels of security measures to be taken to

limit socio-political risks associated with theft, sabotage, rebellion, or protests from the local

population. Therefore, many company CSR policies require risk analysis and risk management of a

specific geographical area and its local population. CSR measures, such as building schools, paying

local residents for land, etc., might be calculated as long-term business strategies that will allow

companies to carry out their businesses without complaints from the local population. Several NGO

reports on land grabbing13

(Sassen 2013) in weak states by TNCs have raised concerns and

provoked lawsuits against human right violations, arguably damaging the reputations and

businesses of some of these companies, especially in their often western-based home states, where

human rights are respected in society and form a big part of consumer discourse in general.

Therefore, it is possible to argue that corporations are often more scared of the repercussions in

their home countries than in the countries in which they operate (Maher 31:20). This is in line with

Pedersen‟s argument that, due to globalization, it has become very hard for companies and

consumers to distance themselves from human right violations that might form an external part of

an investment or value chain, such as child labor in the textile industry (26:21). Pedersen continued

this line of argumentation by suggesting that, because of consumer awareness about human rights

violations and their possible consequences for business, most companies today have incorporated

some sort of CSR and human right policies (23:25). Maher agreed that companies are doing things

to alleviate the problems with human rights infringements, but they always do so within an eye to

their business interests (25:12), leading to human rights, from a CSR perspective, having become a

cash-cow for consultancies (23:30). Additionally, Maher argued that companies can be viewed as

treating human rights as a risk in terms of risk assessment (26:50), which implies that risk is a way

to insert human rights into business logic because it is in accordance with the business attitude that

risk is crucial to the bottom line (27:30).

Local uprisings against TNCs operating abroad is often identified with weak and corrupt states that

are rich in natural minerals (Humphreys 2005: 508). Here the idea of corruption arguably plays a

role in making responsible investments, but seen from a different perspective than previously

presented. Thomas Mandrup provided an example of Maersk establishing harbors and ports in West

African countries, where the level of corruption is high and a drug economy predominates. He

13

See chapter 6 on the DONG case in Colombia with regard to the mining company Prodeco.

Page 40: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 40 of 86

argued that, by establishing harbors in these places, Maersk automatically fuels the drug economy.

But the question is how much corruption is acceptable? Maersk has to accept the local terms and

possibly pay off local drug lords to be able to acquire a license to operate14

in these areas. Until

recently, such „compromises‟, in relation to bribes being paid, were deemed acceptable for Danish-

based TNCs operating in corrupt areas of the world, and was even tax deductible up until 1997

(Mandrup 2016: 33:30). However, since then CSR has gained influence both politically and

businesswise. This unusual tax deduction was removed by law in Denmark at the end of 1997

(DR.DK).

In the light of our interviews, we can see that CSR has become not only more prevalent in the world

of business and investments, but also more closely tied to security and risk management. CSR has

become a practice that companies use to try to mitigate socio-political risks in the foreign countries

in which they either operate or invest. In this sense, CSR becomes a matter of how companies

create relations with local populations, and when it comes to incorporating CSR into security

apprehensions, this interaction often takes risk management as its starting point. On the other hand,

CSR has a double meaning in the home countries of corporations. The first aspect relates to the risk

management of CSR, as stakeholders and other financial interests create a demand for profits. The

significant aspect of CSR in the home countries pertains to the public political discourse that shapes

how CSR policies are articulated and what topics are included. This aspect can be influenced by

political ideologies, current events, and so on, as well as by incidents revolving around company

investments in foreign countries. As a result, there is an interconnectedness between what

corporations do abroad and how such conduct is handled at home, but also vice versa, meaning that

CSR politics and stakeholder communities at home also affect and shape corporate behavior abroad.

This phenomenon will be developed further and exemplified during the case studies.

14

See chapter 4 on „Social License to Operate: managing socio-political risks‟

Page 41: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 41 of 86

4.6. Social License to Operate: managing socio-political risks

As was the case with CSR the concept of a „Social License to Operate‟ was brought up several

times during the interviews conducted in relation to security and risk, which led us to incorporate it

as a key analytical concept throughout our thesis. However, while conducting a literature review on

the concept, we encountered many diverse interpretations and definitions of SLO and therefore

decided to construct own understanding of this phenomenon by focusing on those aspects that are

related to our thesis inquiry.

In terms of analytical category, SLO falls under the CSR umbrella and has been constructed as a

primarily western concept. During the past two decades, the concept of SLO has evolved from the

mining industry to become a standard business practice within this particular industry, though some

argue that in the oil and gas industry implementation of the concept is still only in its infancy

(Smith and Richards 2015: 84). As with CSR, there is no single agreed definition of SLO, most of

the definitions available being context-dependent and abstract in nature, such as

„Social license‟ generally refers to a local community‟s acceptance or approval of a

company‟s project or ongoing presence in an area. It is increasingly recognized by various

stakeholders and communities as a prerequisite to development. (Yates and Horvath 2013:

1)

or

Social licence (…) can be seen as an intangible construct associated with acceptance,

approval, consent, demands, expectations, and reputation. Moreover, these notions suggest

an overarching concern with organizational legitimacy. (Parsons et al. 2014: 84)

Common to many of these definitions is that the concept of SLO builds upon the idea that, if a

community does not support the presence of a specific company or project, commodity prices, no

matter how high, will not spawn a positive production or development decision. Therefore, some

argue that „SLO is becoming the new “vision” for companies to recognize and embrace in order to

acquire economic certainty with respect to new projects‟ (Nelsen 2006: 161). Prno and Slocombe

further argue that CSR can be seen as an essential enabling factor in SLO, which can be used to

manage socio-political risks. They state that „Corporate Social Responsibility (CSR) initiatives are

arguably the most utilized marked oriented tools for obtaining a SLO (…) [because] CSR

encompasses the idea that businesses have some responsibilities to society beyond that of only

making profits for their shareholders‟ (2011: 352).

Another important aspect of SLO is its influence on the articulation of risk, which arguably shows

strong ties with human rights. Thomas Mandrup argued that the fact that the western world in

particular is debating human security implies the emergence of a strong focus on individual rights

(2016: 23:15). Following this argument, Nelsen argues that Social License to Operate has become a

significant part a new corporate discourse that is especially evident amongst TNCs in weak states.

She further states that, „[o]nce camouflaged by concepts such as sustainable development and

Page 42: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 42 of 86

sustainability, SLO is now in the forefront as “the language of choice” by industry and

stakeholders‟ (Nelsen 2006: 161). This argument was strengthened by Maher, who stated that

corporations are always happy to talk about how they respect certain rights, but it is often just talk

to influence a public discourse (Maher 2016: 20:45). Maher also argued that SLO is an essential

part of risk management, especially when it comes to business operations in high-risk areas where

some of the biggest „threats‟ alongside environmental ones are the socio-political risks posed by the

local population (ibid.: 27:30). Therefore, it is vital for corporations to gain a Social License to

Operate to ensure the local community‟s acceptance or approval of their presence in a specific area

or region. As already mentioned, we argue that there is a strong correlation between human rights

and SLO, which can be identified in the „U.N. Guiding Principles on Business and Human Rights‟

(UNGPBHR), where it is stated that, „In order to gauge human rights risks, business enterprises

should identify and assess any actual or potential adverse human rights impacts with which they

may be involved either through their own activities or as a result of their business relationships‟

(2011: 19).

Therefore, obtaining a Social License to Operate can be seen as a way for corporations to insert

human rights into a business logic, since this follows the business notion that risk is crucial to the

bottom line. This type of business logic is therefore tied to ideas of legitimacy and protection of the

company brand in terms of identifying and managing the „risk of our reputation blowing up‟, as

Maher put it (2016: 27:50). Prno and Slocombe further argue that „there is now widespread

recognition that mineral developers need to gain a “social license to operate” (SLO) from local

communities in order to avoid potentially costly conflicts and exposure to social risks‟ (2011: 346).

Several of our interviewees agreed that one of the main ways to ensure a good reputation and

relationship with local populations is to cooperate with and/or employ them as part of the value

chain (Østerby 2016: 42:22 & 45:21; Kalhøj 2016: 15:15; Pedersen 2016: 53:00).

However, our argument is that Social License to Operate not only includes the approval and

acceptance of the local population, but the entire stakeholder community. As Thomsen and

Boutilier frame it, this includes „those who could be affected by the actions of a company or who

could have an effect on the company‟ (2011: 2). This implies the inclusion of parties in different

geographical communities, such as the local community, investment funds, human rights activist

groups, joint ventures, etc. Thomsen and Boutilier further argue that in weak sates „individuals and

groups often look to (…) companies to provide what governments have not provided (e.g.,

infrastructure, health services, economic development initiatives)‟ (2011: 8). Therefore, despite the

problems associated with FDIs such as land grabbing, corruption and conflicts, Østerby argued that

many local stakeholders see TNCs as potentially providing both employment and improvements to

the local community (2016: 44:35).

In summary, we argue that SLO is a concept with close ties to CSR, but it goes beyond many of the

common understandings and definitions, which are primarily concerned with getting approval from

the local community next to operational sites. We argue that stakeholder communities cover all

affected parts, including citizens of western states, where the TNCs have been established and have

their base. Reports of companies violating rights abroad can have repercussions for the company‟s

Page 43: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 43 of 86

reputation and brand at home, which could potentially develop into problems leading to the

withdrawal of investments, boycotts or a general decrease in consumers‟ willingness to buy the

company‟s products. Therefore, acquiring a Social License to Operate can be seen as an essential

part of the long-term business strategies of TNCs, playing a significant role in their socio-political

risk management as a result of their operating in an interconnected and globalized world.

4.7. Interim conclusion

In this chapter, we have analyzed our interviews in conjunction with the academic literature in order

to answer the first part of our research question. We started with a discussion of how we understand

the concept of neoliberalism in order to map the political surroundings in which the marketization

of security takes place. What is most important to our understanding of neoliberalism is how it

drives practical forms of governmentality, implying sets of practices that define how actors are

governed. To look at and define these practices is essential to our thesis in order to answer the last

part of our research question pertaining to rights and sovereignty because it points us towards how

actors are governed within assemblages. Furthermore, it also helps us to understand how security

has been marketized by examining the two practices and how they have departed from market force

to become vital aspects of the private security sector.

Furthermore, we found that investments in foreign countries also affected how the global security

field is configured. A combination of moral and economic considerations defines who, where, and

what to invest in, and the global security field is affected through these considerations. Investments

are thus based on market force as well as moral considerations, and security situations surrounding

potential investments affect these considerations. Security can affect morality, as certain situations

can have a negative impact on a corporation‟s public image or just be downright immoral.

Economically, certain security situations can be too expensive to alter in order to make the

investment viable. Finally, we found that security is also intertwined with financial markets, mainly

through risk, where everyday knowledge and trust are central to the fields of both security and

finance.

When replaying recordings of our interviews, it quickly became evident that a few themes recurred

in all of our interviews. These themes have become the focal points discussed in this chapter, as

they point towards certain practices in which the marketization of security is evident. Corporate

social responsibility practices were the most recurring theme in our interviews, and through an

analysis of our interviews and an empirical study of academic discussion of the topic, we found that

CSR and security were no longer separate in the world of transnational corporations. CSR has

become a component of risk management for most TNCs, and it is being used to mitigate the risks

that involve the population of both the home country and the country being targeted for foreign

investments. The second analytical concept and practice we encountered was SLO, which is also

tied to risk management. Most definitions of SLO pertain to the license given by the immediate

neighbors of operational sites in the host country, which is most prevalent in natural resource

extraction industries. However, we argue that, just as with CSR, it also pertains to a socio-political

Page 44: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 44 of 86

risk in the home country of a TNC. Here, the risk is often found in public discourse, and the social

license can be revoked if a company violates the values and norms of the home country, even if this

happens in a foreign country.

The marketization of security, then, involves a certain way of thinking and a set of parameters

defined by market force where the techniques involved resemble those of the financial world. A set

of practices found in the world of transnational corporations has become the object of securitization,

and the private security sector has provided the services required by TNCs operating in these areas.

Furthermore, these practices have connected the countries in which TNCs operate, as risk

management is no longer is a single-sited objective, especially when it comes to socio-political risk.

Conclusively, we argue that marketized security starts out from multi-sited assemblages of security

that affect one another through practices that try to mitigate risks of a socio-political nature.

Page 45: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 45 of 86

Chapter 5. Nigeria: the case of oil companies and private

security

This chapter seeks to answer the sub-question „How does marketized security affect the way

transnational corporations interact with stakeholder communities?‟

5.1. Case introduction

In 2012 an activist group, Platform, released a report which contained leaked documents showing

the transnational oil corporation Shell‟s global security spending between 2007 and 2009 (Amunwa

2012). This was the first time that the public had gained access to these figures, which generated a

lot more questions than answers. The data were leaked by a former Shell manager and showed a

significant percentage (43%) of Shell‟s global security budget, around $343 million in total, being

spend in Nigeria, mostly in the Niger Delta Region. When compared to Shell‟s global security

spending, it became clear that Shell had spent significantly more on security in the Niger Delta

region than in North and South America, the EU and Russia combined (Amunwa 2012: 3-6). And

the main question was why and on what?

Taking a closer look at the leaked data, they reveal a spending post labeled „Other‟ which made up

37% of Shell‟s global security spending between 2007 and 2009. This vast post had no further

explanation attached to it, which led to NGOs and news sources raising concerns about what might

really be hiding under this label (Amunwa 2012; Hirsh & Vidal 2012; Davies 2013). Many

speculated that, because the „Other‟ amount was so vast, it could not simply refer to small and

insignificant security arrangements. The author of the Platform report argued that there was

evidence indicating that Shell used this „Other‟ budget for a range of questionable security

purposes. This suspicion was in part based on a 2003 U.S. Embassy report stating that Shell and

Chevron had made direct payments to individual armed militants in the Delta area (Amunwa 2012:

8). This seemed to imply that this „Other‟ spending referred to non-traditional types of security

arrangements and non-state actors, which could include bribes made to local war lords and/or other

non-government illegally armed groups, to prevent local interference or protests.

Additionally, the report also uncovered a spending post labeled „Third Parties‟ which made up 29%

of Shell‟s global security spending from 2007-2009. This post most likely indicated payments made

to government forces (ibid.: 6-7), as it is well known that „Shell and Chevron have financed

portions of the Nigerian military and police to secure their facilities in Nigeria‟ (Avant 2004: 154).

Unethical though this collaboration between Shell and public government forces might seem,

cooperation between government troops and foreign oil companies is not a new phenomenon in

Nigeria (Obi 2006: 96-98; Arowosegbe 2009: 583; Watts 2004: 59). And as Human Rights Watch

stated in a 1999 report, „[s]ecurity arrangements between the oil companies and the Nigerian

government are inevitable, as are internal oil company provisions for security responses in the event

of incidents of hostage taking, sabotage, or intimidation‟(Human Rights Watch 2005).

Despite this knowledge, it still came as an eye-opener when the leaked data revealed that the „Third

Parties‟ spending was double what Shell spent on its own security staff, and it was estimated that

Page 46: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 46 of 86

the TNC employed more than 600 Nigerian government police officers and 700 members of the

controversial state „joint task force‟ (JTF) comprised of army, navy and police (the Guardian 2012).

This seemed to indicate that Shell had a high level of authority and control over government forces

and the Niger Delta region, and there is no evidence of this having changed within the past eight

years.

When the full Platform report was released in 2012, it had global consequences for Shell, and

western consumers and stakeholders especially came down hard on the TNC, Furthermore,

following the release of the data, several campaigns were started in the west to boycott Shell

(Dovan 2012;15

). Significantly, this pressure from the west seems to have had a significant impact

on Shell‟s official business strategy, which has since led the TNC to assume a degree of

responsibility due to its presence in the Niger Delta. This development is exemplified by two

contradictory statements, made twenty years apart. In 1995 Shell stated that „we do not hold the

solution to community demands for more amenities, more development, more employment and

more control over oil revenues. That is primarily a government responsibility‟ (Boele et al. 2001:

76). However, Shell‟s 2016 official website makes it clear that the TNC has realized that the world

is watching, and that it needs to manage socio-political risks by incorporating new business

practices such as corporate social responsibility (CSR) and social license to operate (SLO) (see

Chapter 4). Furthermore, on its website Shell claims to be a corporate citizen that „places great

importance on making a difference in the environment in which people live and work, fostering and

maintaining relationships with communities, taking care to be a good neighbor and contributing to

sustainable development initiatives.‟(Shell 1). So what has caused Shell to change its business

strategies so radically between then and now? We argue that this change has been brought about by

increasing global consumer awareness of human rights, sustainability and responsible investments.

This has put pressure on the Shell to incorporate preventative business practices that address the

socio-political risks posed by the global stakeholder community (see Chapter 3).

5.2 Outline of the Chapter

The first part of this chapter is primarily an empirical study which begins with a historical

contextual overview of Nigeria‟s security history and the Niger Delta conflict characterized by

violence, corruption and weak governance, which Shell has arguably managed to exploit. This

provides the context needed for a further analysis of Shell‟s „Other‟ security measures, and how

these might be connected to human rights violations and corruption in the Niger Delta. This analysis

also explores the correlation between non-state/private security actors and government forces in

Nigeria. From this historical overview, we move on to the global context, where we explore how

contemporary global consumer awareness has put pressure on Shell to incorporate these new

contemporary practices (CRS and SLO), presented in chapter 4. Our argument is that socio-political

risk dictates marked forces, which Shell, like any other business, has to follow to attract investors

15

Facebook group entitled: boycott Shell: https://www.facebook.com/BOYCOTT-Shell-193160320746514/

Page 47: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 47 of 86

and satisfy consumer needs. From this point, the chapter then moves into a more theoretical analysis

that addresses the last section of the research question that is concerned with sovereignty and rights

in weak states. It starts out with an analysis of how Shell‟s presence and control in the Niger Delta

is significant in the construction of new security assemblages. This is followed by addressing the

co-dependent relationship between Shell and the Nigerian government, showing how Shell has

gained operative control of and authority over the Niger Delta. Finally, this second part of the

chapter analyzes how Shell‟s control and authority in the Niger Delta has had consequences for how

sovereignty and rights are configured.

5.3 Nigeria’s security history and the Niger Delta conflict

To acquire a better picture of the security arrangements in Nigeria, we must first take a closer look

at Nigeria‟s history of violence. The current security situation in Nigeria reflects more than 55 years

of instability, civil war, military coups, corruption and bad government (Frynas and Mellahi 2003:

584). Since Nigeria‟s independence in 1960, the country has been considered critical and

unfavorable for foreign investors, reflected in Control Risk Group‟s (1997)16

political risk report

stating that Nigeria is „one of the most difficult places in which to do business‟ (71). This report

came out the same year that a hundred Shell workers were held hostage by a local armed group

(Frynas and Mallahi 2003: 556).

The distribution of oil revenues has been the source of many conflicts in Nigeria, and one of the

most threatening ones was the civil war that broke out in 1967, which was ignited over oil struggles

between different identity groups (Zalik 2004: 405). Shell, which had been active in the country

since 1937 and had produced Nigeria‟s first commercial oil exports in 1958 (Shell 2) as hit hard by

the civil war, which disrupted its onshore oil production. As a cconsequence, Nigeria‟s crude oil

production declined from 420,000 barrels/day in 1966 to 320,000 b/d in 1967 and 145,000 b/d in

1968 (Frynaz and Mellahi 2004: 548). In the beginning commercial crude oil production in the

Niger Delta seemed to have held out great promise of prosperity for local communities, but instead

the emergence of joint ventures between foreign oil companies and the Nigerian state generated

threats to both the environment and traditional livelihoods in the Niger Delta (Watts 2004: 59).

During the 1970s, the Nigerian government realized that it had outsourced too much authority and

power to the foreign oil companies. So, in an attempt to increase control over its own oil resources,

the government started acquiring equity stakes in foreign oil companies and managed to reclaim

60% ownership in the majority of foreign oil companies operating in Nigeria (Frynas 2000: 31-32).

However, despite this movement towards greater national influence and control, Frynas and Mellahi

(2003) conclude that foreign oil companies have remained operators of the joint ventures with the

government, so they have retained effective control of the ventures (ibid.: 550). Zalik (2004) further

16 Control Risk Group is „an independent, global risk consultancy specialising in political, integrity and security risk.

We help some of the most influential organisations in the world to understand and manage the risks and opportunities of

operating in complex or hostile environments‟. https://www.controlrisks.com/en/about-us

Page 48: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 48 of 86

confirmed that the Nigerian state has at various moments introduced legislation in an attempt to

claim control over the oil sector, and as previously mentioned holds a large percentage of shares in

these ventures:

Operationally, however, foreign companies have run the industry – Shell in particular

– with protection from the Nigerian military. This arrangement has meant that

individual government agents can profit immensely through 'rents' or bribes accruing

from oil contract kickbacks, while in terms of productive capital and as an agent of

development and security, the Nigerian state has remained largely incapacitated and

often a force to be feared. (ibid.: 404)

What had previously distinguished Shell from other oil companies operating in the Niger Delta

region was that it obtained a more favorable deal than its rivals Mobil and Texaco, which has

sparked several accusations of bribery and government corruption. Even when nationalization

measures were being implemented, Shell was favored over its competitors: „[t]he form‟s position in

the Nigerian political economy proved to be a competitive advantage. If compared with other

foreign oil companies in Nigeria Shell had a considerable greater political influence, particularly in

the early years of the Nigerian oil industry‟ (Frynas and Mellahi 2004: 550). This was especially

evident in the 1960s, as several Shell managers or people connected with Shell gained prominent

political positions in Nigeria. In 1993 Ernest Shonekan, who had previously been Shell‟s non-

executive director and became head of state in Nigeria (ibid.: 551).

Due to massive land and resource grab, when the Nigerian government had earlier either sold or

leased land to oil companies, a civil society nationalization campaign began during the 1970s and

1980s. This development consisted of local citizens joining and mobilizing against what was

referred to as „the slick alliance‟ between the oil companies and the Nigerian military (Watts 2004:

59). Despite the Nigerian government attempting to regain control of its oil resources, it also very

much depended on the foreign oil companies to produce and sell its oil. From 2000 to 2004, oil and

gas accounted for 75% of total government revenues and 97% of Nigeria‟s foreign exchange

earnings (Arowosegbe 2009: 584), while in 2008 oil and gas constituted roughly 90% of Nigeria‟s

foreign exchange earnings and 83% of its GDP (Noruwa 2012: 16). So, despite Nigeria‟s long time

desire to regain control and independence from the foreign oil companies, its economy is heavily

intertwined and dependent on the revenues these foreign oil companies produce for the country.

There are several examples from the 1990s of the Nigerian government placing the foreign oil

companies‟ rights and security above the local population, which has only added fuel to the ongoing

conflict between the parties. This follows Isima‟s argument that in Nigeria „far greater emphasis has

been placed on the governance of the security sector than on the provision of physical security for

citizens‟ (2007: 24). In the 1990s an ethnic group of around 400,000 people established a political

movement to campaign for a „Bill of Rights to challenge both Shell for environment compensation

and the Nigerian state for direct control of “their oil”‟ (Watts 2004: 59). However, the government

would not accept these kinds of demands and protests, and the leaders of the group were all hanged

by Nigerian military forces in 1995 (ibid.). Another example of popular resistance occurred in 1998,

when the Ijaw Youth Council released a declaration, claimed resource ownership of the oil in the

Page 49: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 49 of 86

Ijaw area of the Niger Delta (ibid.), and asked all oil companies and their employees to withdraw

from the area (Arowosegbe 2009: 583). In response, the federal government „declared a state of

emergency in the region and deployed thousands of soldiers, naval troops and anti-riot policemen to

protect oil installations and investments‟ (ibid.). Yet another example of this „slick alliance‟, where

we argue that the Nigerian government seems to have favored the rights and security of foreign oil

companies over its own citizens, came in 1999. Here the oil company Chevron Texaco was accused

of flying Nigerian military units in its helicopters, from where shot and killed two people protesting

on top of an oil platform (Obi 2006: 96-98). Our argument is that this joint-venture relationship

between the foreign oil companies and the Nigerian government also affects government actions

and policies, which, due to the dependency relationship, are often shaped in favor of the foreign oil

companies, especially Shell, rather than the local communities. This argument is supported by a

1999 Human Rights Watch report, in which it is stated that,

[g]iven the overwhelming role of oil in the Nigerian national economy, the policies

and practices of the oil companies are important factors in the decision making of the

Nigerian government. Because the oil companies are operating joint ventures with the

government they have constant opportunities to influence government policy,

including with respect to the provision of security for the oil facilities and other issues

in the oil producing regions (Godwin 2016).

5.4. Shell’s ‘Other’ security practices in the Niger Delta

For more than a decade now, the security situation in the Niger Delta region has been getting worse

and increasingly unstable, to a point where the region has been labeled a high-risk area (Obi and

Rustad 2011: 168; Godwin 2016). Much of the unrest is due to disagreements over the ownership

and rights associated with resources, and many foreign oil companies are experiencing the

sabotaging of pipelines and platforms, as well as the kidnappings and killings of their employees

(Frynas and Mellahi 2003: 556; Obi 2008: 417-434). A 2008 estimate showed that the oil

companies in the region have had over two hundred employees kidnapped (Akpan 2010: 37).

Furthermore, NGOs have raised several red flags with regard to oil companies contributing to the

escalation of violence in the Niger delta region (Frynaz and Mellahi 2003; Tran 2004; Amunwa

2011, 2012). An example of this occurred in 2003, when WAC Global Services composed of

Nigeria-based specialists in conflict resolution (Tran 2004) carried out an internal 93-page survey

which was leaked. In the report, WAC accused Shell of enabling conflicts in the Niger Delta. The

report stated that:

[it is clear that SCIN [Shell Companies in Nigeria] is part of Niger Delta conflict dynamics

and that its social license to operate is fast eroding. Whereas some groups argue that SCIN

consciously fuels conflict as part of a “corporate conspiracy”, the SCIN-conflict links result

rather from a quick-fix, reactive and divisive approach to community engagement expressed

though different areas of policy, practice and corporate culture. (ibid.: 5)

Page 50: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 50 of 86

In addition to these observations, WAC argued that, due to the escalation of violence, Shell would

have to leave the area within the next five years (Tran 2004). Nevertheless, Shell maintained its

operations in the Niger Delta despite several periods when non-essential personal had to be

evacuated from high-risk operational sites, and despite having received much criticism and serious

allegations of human right abuses. An example of this occurred in 2011, when Platform, the activist

organization,17

released a report on corporations and human rights violations in the Niger Delta

region. The report followed up on the 2003 accusations previously presented and went on to claim

that „Shell‟s poor community engagement has provided the “catalyst” for major disruption,

including one incident that shut down a third of Shell‟s daily oil production in August 2011‟

(Amunwa 2011: 6). The 2012 map below portrays Shell‟s presence in the Niger Delta, which

includes more than 6,000 kilometers of pipelines and flow-lines, 87 flow-stations, 8 gas plants and

more than 1,000 producing wells in a 70,000 km2 area which is home to approximately 30 million

people (Shell 3).

Figur 1Adapted from Stakeholderdemocracy.org: http://www.stakeholderdemocracy.org/about-the-niger-delta/

During the 1980s, the economic principles of deregulation and privatization were introduced in

Nigeria (Kalejaiye et al. 2013: 2403), which meant a liberalized economy, part of which consisted

in an emerging security market. By mid-2000, according to Abrahamsen and Williams, security had

become the second largest „money-spinner‟ in Nigeria, only exceeded by oil and gas (2005: 3). This

also means that there is a strong correlation and mutual dependency between the two biggest

„money-spinners‟, because they each profit from one another. Globally, the issue of security

management has gone through a shift, from its traditional Hobbesian formation as an exclusive

function of government, towards a more accommodating security sector that encourages

participation by private security actors (Kasali 2011: 33). The privatization of security is a global

phenomenon (Abrahamsen and Williams 2011: 171), and for more than a decade private security

17

Platform London‟s description of themselves states that their „campaigns focus on the social, economic and

environmental impacts of the global oil industry‟ http://platformlondon.org/about-us/

Page 51: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 51 of 86

has contributed significantly to the Nigerian economy. However, privatized security is by no means

a new phenomenon in Nigeria and has had a strong presence in the state almost since its

independence. Kasali (2011) argues that „the first private security outfit providing uniformed guards

in Nigeria came into being in 1965, and since then the number of existing private security firms has

drastically increased‟ (ibid.: 40). Due to the high levels of conflict and instability in Nigeria, which

are especially evident in the Niger Delta region, foreign oil companies require more security

provision than the Nigerian state is able to provide. This increasing demand for stronger security

provision has paved the way for the intensified presence of private security contractors, which can

arguably be seen as the result of an incompetent Nigerian government‟s inability to provide security

within its borders. Following this argument, Kasali (2011) suggests that:

[t]he origin of the proliferation of private security companies (guards) in Nigeria can

be traced to the systemic failure and inefficiency that adorn the public security sector,

which exhibits blatant inability to meet the security needs of the people resulting from

her age-long anti-people posture, inadequate training, official corruption, nepotism

among other negativities. (ibid.: 32)

Furthermore, there is a strong indication that the number of PSCs operating in Nigeria is still

growing based on estimates from 2006, when there were between 1500 and 2000 active PSCs in

Nigeria, with around 100,000 employees in total (Abrahamsen and Williams 2006: 3), to around

2,550 active PCSs in 2011 (Purpura 2011: 206). We have been unable to find any recent estimates,

but based on the previous numbers, we posit that this number has increased within the past five

years and that the market demand has still not been met.

Intriguingly, on their website, Shell claims that they do not employ PSCs in the Niger Delta, but

instead rely on two categories of security personnel: a corps deployed by the Nigerian police, and a

government-deployed Joint Task Force, comprising the army, navy and police (Shell 4). However,

returning to the leaked document that listed Shell‟s security spending from 2007-2009, this does not

seem to be completely correct, or at least not within that time period. Because the two types of

security personnel mentioned above would both fall under the „third party‟ category, this does not

explain the vast amount spent on „other‟ security measures, not to mention the post labeled

„contractors‟ in the leaked data. However, this could also refer to PSC providing consulting

services. When investigating this claim further, a complex overlap between public and private

security can be detected. PSCs such as Group4Securicor (G4S), through its subsidiary Outsourcing

Services Ltd. (OSL), cooperate with the so-called „spy‟ police, who have been trained by the

Nigerian police but are under the direct control of the oil companies (Abrahamsen and Williams

2010: 138). Shell alone has 1,200 at its operational sites in the Niger Delta, including an

intelligence unit (ibid.). Furthermore, Shell‟s many operational sites in the Delta are guarded by

more than 1,300 government forces, „including 600 police and Mobile Police, known locally as the

“kill and go” and 700 soldiers from the Joint Task Force (JTF), a combination of the army, navy

and police‟ (Amunwa 2012: 6).

The foreign oil companies‟ co-dependent relationship with the Nigerian government and PSCs is

complicated and arguably steered by monetary gains. However, we argue that the emergence of

Page 52: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 52 of 86

PSCs is in the Nigerian government‟s interest, because it depends on the revenues that the foreign

oil companies produce, and therefore the state depends on cooperation with PSCs to secure its own

economic interests based on the amount of oil that these companies produce. And the logic here is

that, if oil platforms are compromised or shut down due to protests or other serious security threats,

less or no oil is produced and sold, which hurts both the Nigerian government and the oil company.

As Abrahamsen and Williams (2008) explain it:

it is not so much the case that private capital and force work against the interest of some

“public” interest, but rather that the interests of the government in power is intimately bound

up, and even dependent on, the extraction of resources by private /foreign capital. (ibid.:

140)

5.5. Pressure from the global stakeholder community

Along with Shell‟s control of the Niger Delta region arguably also comes new and different types of

accountability. As previously argued, Shell‟s presence has a strong influence on Nigeria in terms of

policy changes and rights, but we argue that the influence is two-way. From the contemporary

business practices presented in Chapter 4, we were able to conclude that global consumer awareness

and responsibility have become serious threats to the revenue-earning and reputational survival of

TNCs (particularly the publicly registered companies). More and more stakeholders in the west

have become aware of how Shell is violating the rights of the local Niger Delta population, which

have resulted in increasing western-based pressure on Shell to adopt new types of practices. As

described in Chapter 3, the socio-political risks that the local community arguably poses have

become one of the main concerns of foreign oil companies such as Shell when operating abroad in

high risk areas. This means that with global awareness has also come a form of empowerment,

which has given a voice to local populations in weak states. As Abrahamsen and Williams (2010)

argue:

In a setting where participation in internationally developed frameworks such as the

Voluntary Principles on Security and Human Rights and the UN‟s Global Compact

have become a mark of a socially responsible firm (something that is in part the result

of broader international pressures) and where the oil companies are seeking new

strategies in response to the failure of past security policies, PSCs may become

important actors in attempts to transform security governance. (ibid.: 224)

Therefore, practices such as Corporate Social Responsibility (CSR) and Social License to Operate

(SLO) have been incorporated into the security management of most TNCs regarding their

operations abroad within the past ten years. As previously mentioned, it has become extremely

damaging for a company‟s image and reputation today to be associated with local community

disapproval, human rights violations and unsafe working conditions for employees, all of which

Shell has been accused of in the Niger Delta within the past fifteen years. As the 2004 WAC report

stated, „It is clear that SCIN [Shell Companies in Nigeria] is part of Niger Delta conflict dynamics

and that its social license to operate is fast eroding‟ (2004: 5). Therefore, instead of attempting to

Page 53: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 53 of 86

force the local population into compliance through harsh security measures and a little

compensation, global stakeholder communities have increasingly begun to expect better ethics and

sustainability initiatives from Shell. What is noteworthy about these practices is that they have

moved beyond local or national arenas and become the subject of global attention.

5.6. Security assemblages

Now turning to the second part of the chapter, we explore how Shell and its use of private and

government forces play a significant role in the construction of security assemblages. We look at

the policies implemented by the government as an attempt to gain some level of control over the

vast amount of PSC that has emerged in Nigeria. Furthermore, we analyze the co-dependent

relationship between Shell and the Nigerian government, which is arguably steered by high levels

of corruption. Lastly, we analyze Shell‟s operational control and authority in the Niger Delta and

show how this effects the configuration of local sovereignty and rights.

When looking at Nigeria‟s approach to private security actors, the government seems to have

conflicting policies, because, despite recognizing a general strong demand for heavy security in the

Niger Delta, Nigerian law prohibited PSCs from carrying firearms (Kasali 2011: 43; Abrahamsen

and Williams 2009:10). This law can arguably be seen as an expression of the Nigerian

government‟s attempts to sustain a level of control over private security actors operating within

Nigeria, because this forces them to co-operate with government forces, which are allowed to carry

arms. Often, Nigerian police officers or soldiers, who are armed with fully automatic weapons, are

paired with private contractors so that the public security officers can „legitimize‟ and/or cover up

the activities of the private security guards. However, this collaboration between public and private

security forces is further complicated because these government forces are being supervised by PSC

staff and getting paid additional wages by the foreign oil companies, while in principle continuing

to take orders from their own commanding officers. This results in a unique and complex merging

of public and private authority, responsibility and interests (Abrahamsen and Williams 2009: 10),

making it difficult to detect where the public authority ends and private authority begins and vice

versa. Additionally, there are a vast number of unregistered PSCs and militia groups operating in

Nigeria that encourage their employees to carry weapons for their private security activities, and it

is difficult for the government to control the circulation of weapons among security guards (Kasali

2011: 42-43). It is hard to estimate of how many illegal PSCs and militia groups there currently are

in Nigeria, but within a three-week span in 2013, the Nigeria Security and Civil Defence Corps

(NSCDC) shut down 25 illegal PSCs operating in the country (Premium Times 2013).

It can be argued that the increasing numbers of foreign oil companies and PSCs operating in Nigeria

go hand in hand. The ongoing Niger Delta conflict has arguably created a fruitful market for

different types of security actors. Some of the more prevalent PSCs in Nigeria are TNCs often

based in the west such as G4S (England), RED24 (Scotland), etc. Both the PSCs and the foreign oil

companies inevitably bring with them certain western values, norms, knowledge and technologies

that are inserted into local security assemblages in the Niger Delta. Following this logic,

Abrahamsen and Williams (2010) argue that the symbolic and material power produced by foreign

Page 54: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 54 of 86

oil companies and global PSCs significantly influence the reproduction of political power in

Nigeria. This means that these private actors, as parts of global security assemblages, might

influence practices within assemblages in new and significant ways (ibid.: 224). Furthermore,

attempting to analyze the conflict in the Niger Delta region in terms of private security contractors

providing security for transnational interests provides at best an incomplete story. The foreign oil

companies and the government both play a key role in how security is configured in the Niger Delta

as well. We have already revealed that the protection of oil operation sites and pipelines is provided

by a multifaceted network of public and private, global and local security actors which serve

national as well as foreign interests (Abrahamsen and Williams 2008: 140). This configuration of

security at the operational sites is a result of cooperation between the foreign oil companies and the

government, and the PSCs are the primary tool alongside government troops. A disassembly

happened when the government was unable to provide security from a disenfranchised civilian

population, and crimes, kidnappings, protests, etc., became too big a security risk for the oil

companies. The demand for security by the foreign oil companies then forged the re-assembly and

included PSCs to police the civil unrest surrounding the oil fields more effectively. The oil

companies, the government, the PSCs and the local population are all relevant when examining the

security assemblage created in the Niger Delta.

Now returning to the two schools of thought we framed with regard to security assemblage theories

in Chapter 3. The Nigerian government currently seems to be located somewhere between the two.

On the one hand, the Nigerian government is losing its authority due to a new configuration of

security created by different non-state actors, including foreign oil companies, PSCs, illegal militia

groups, local ethnic groups, etc. On the other hand, many of these actors have been present in

Nigeria since its independence, so there are no new actors, but rather an increase in the numbers of

existing actors. This implies that they have always been part of the security assemblage, but their

increase in numbers has made them more significant and influential in the construction of the

security assemblage.

5.7. Re-configuration of sovereignty and rights

Following this last line of thought, we argue that private security actors add to the reconfiguration

of power and sovereignty in Nigeria, as they construct what Abrahamsen and Leander (2016: 134)

refer to as „new geographies of power‟. Nigerian political scientist Claude Ake (1997: 306) argues

that:

[b]ecause everyone places the highest priority on controlling (power), political competition

becomes immensely intense and unrestrained (…) The importance of the struggle is that the

state disappears in a process of parceling and privatization, its place is taken by communities

and ethnic groups, nationalities and subnationalities.

This seems to suggest that Shell‟s strong presence and control of the Niger Delta region has

constructed what can be described as „a state within a state‟ where Shell is the sovereign. This idea

is supported by the fact that private contractors guarding Shell oil platforms and wells have

Page 55: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 55 of 86

obtained special permission to carry arms within „Shell territory‟. However, outside these

operational sites the private contractors must obey the state law that prohibits PSCs from carrying

weapons. Arguably, Shell has become a visual manifestation of social control and regulation within

the Niger Delta. As one local resident explained the situation:

“in the Niger Delta Shell is the state”. Similarly, Shell Nigeria (SPDC - Shell Petroleum

Development Company of Nigeria) states in its 2001 People and Environment Report that

their community development work has left communities in the area with the impression

that “Shell is the only government we know” (SPDC, 2001:16). (Zalik 2004: 406)

Returning again to the two different schools of thought within security assemblage theories, one

school argues that because Nigeria is outsourcing so much control to private actors, it is weakening

the state‟s power and authority (Mandrup 2012). Furthermore, this outsourcing of sovereign control

could eventually mean the end of Nigeria as a sovereign nation state (Levi 2002; Guéhenno 1995;

Ohmae 1995). However, in line with the second school of thought, we argue that this type of

outsourcing can be seen as indirect governance used by the Nigerian state to gain a degree of

control over its populations and territory, which it never truly had full control of in the first place

(Abrahamsen and Leander 2016; Abrahamsen and Williams 2010; Hönke 2010, 2008; Sassen 2008;

2006).

Taking this argument even further opens up to the idea that Nigeria‟s outsourcing of control to

private actors such as Shell can be seen as a type of state resilience and a reconfiguration of the

traditional understanding of Westphalian sovereignty. As Jana Hönke (2010) argues, these

„reconfigurations are, however, better understood by thinking of them as processes of state

transformation that are related to broader reconfigurations of spatial order‟ (ibid.: 3) Our logic here

is that, through this indirect governance, for example, co-ventures with foreign oil companies, the

Nigerian state gains some degree of control and revenue which it is unable to obtain through

democratic measures. Furthermore, it is important to bear in mind that Nigeria is a very young state

which has never been a true democracy as we in the west would define it. Therefore, our argument

is based on the idea that the western world‟s constructed requirements of what constitutes a „true‟

sovereign might not be applicable in the case of Nigeria. Furthermore, we also assert that the

argument that Nigerian sovereignty is being weakened by its outsourcing of control is therefore

based on the western understanding of sovereignty, which, given Nigeria‟s colonial history, was

never thoroughly established in the first place. This might be due in part to the embryonic state of

Nigeria after only 56 years of independence. On the other hand, one could argue that a young state

such as Nigeria might demonstrate a greater level of versatility and the ability to reconfigure itself

through the implementation of policies on deregulation and privatization to adapt to the current

neoliberal moment. Furthermore, we argue that the nationalized government policies can arguably

be seen as the government‟s attempt to reclaim ownership and symbolic control of the oil ventures.

However, this we interpret as a facade more than a reality, because, as previously argued, Shell still

has operational control over the work sites and authority over the public security officers working

for them.

Page 56: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 56 of 86

Because the local population is being viewed as a source of socio-political risk, Shell, as the acting

sovereign, constructs an inclusive exclusion of those who oppose its authority. This implies that

through its security measures Shell is constructing a security assemblage that contain specific

western values and norms, as well as restrictions and rules that the local population is expected to

adapt to and follow. We argue that this entails a type of inclusive exclusion that seeks to exclude

what does not conform to the sovereign‟s values and norms, rules and restrictions. These included-

excluded individuals or groups are seen as threats posing socio-political risks to the sovereign. An

example of this could be a local person who enters Shell territory without permission (despite the

land originally belonging to his/her people). This person is viewed as a trespasser and risks being

shot by a civilian officer who has been co-hired by Shell. This undermines the local person‟s UN

right to security of person, as described in Chapter 3, and is an example of Shell‟s right to security

being placed above the right of the local population. We thus argue that a hierarchy of rights is

being constructed within these security assemblages, where local citizens who do not follow the

sovereign‟s (i.e. Shell‟s) rules are excluded from certain rights.

It has been difficult to pinpoint the exact values, norms, knowledge and technology in this

assemblage as reliable information regarding the PSCs and what they actually do has been difficult

to obtain. When it comes to knowledge and technology it is possible to argue that the PSCs bring

with them a level of expertise in policing the various types of civil unrest that might occur in the

wake of the oil companies‟ operations. But to pinpoint exactly how this knowledge and technology

are a part of the assemblage is difficult to assess. However, the two practices, CSR and SLO, can

arguably be regarded as technologies of power and here the PSCs have a role as well. The PSCs

exemplify marketized security by creating value from their knowledge and expertise on how Shell

can mitigate the socio-political risk in the Niger Delta by implementing the two practices.

5.8. Interim Conclusion to the Chapter

Shell has a long history of corruption, harsh security measures and different types of violation with

regard to the rights of local populations in the Niger Delta. This is something that is deeply

embedded within the minds of the local population and is one of the main reasons for the ongoing

conflicts and unrest in the area. Furthermore, we argue that the emergence of private security actors

is a result of a weak government attempting to maintain some level of control, as it is unable to

provide proper security in and of itself. Additionally, the incorporation of private security actors

into the Nigerian security configuration serves the Nigerian government‟s economic interests,

which are bound up in oil production. However, Shell‟s use of „Other‟ security measures has linked

it to human rights violations, severely damaging its global reputation and its social license to

operate in the Niger Delta region. As a result, we argue that Shell has encountered intense global

pressure to adopt new business practices such as CSR and SLO. Therefore we argue that CSR and

security have become inseparable entities, meaning that CSR plays a significant role in the

preventative segment because it is through CSR that a company builds good relations with local

populations. Also, one of the security management logics of incorporating CSR and acquiring an

SLO is that these are likely to prevent local populations from wanting to „get back at the company‟

Page 57: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 57 of 86

because their rights have been neglected. Furthermore, we argue that incorporating these practices

to mitigate socio-political risks constitutes a new way of governing, where hard security measures

are increasingly being combined with soft, preventative ones. Shell‟s attempts to eliminate the

socio-political risks posed by local protestors can be seen as a form of exclusion of those who do

not want to comply with Shell‟s norms, values and restrictions. This means that Shell is constituted

as the local sovereign power through the construction of new security assemblages which consists

of both private and public security actors. Additionally, a weak, corrupt and desperate government

has enabled Shell‟s dominance and control in the region, allowing the TNC to influence policies

and regulations. From this we argue that Shell has had a significant impact on the configuration of

sovereignty, which has arguably created a hierarchy of rights in the region.

Page 58: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 58 of 86

Chapter 6. Colombia: the case of coal-mining companies and

fragmented sovereignty

This chapter seeks to answer the sub-question „How does marketized security affect the way

transnational corporations interact with stakeholder communities?‟

6.1. Case introduction

In 2006, Drummond, an American coal company, was accused of playing a significant role in the

murder of trade union members in Colombia, where the company was operating several coal mines

(PAX 2015:83). Drummond was acquitted by the US courts, but there is still an ongoing appeal

against the verdict (ibid.). Nevertheless, the case was not without its repercussions, and a globalized

trade network made sure that it had consequences even in Denmark. Here, DONG Energy, whose

primary stakeholder is the Danish state,18

was a purchaser of coal mined by Drummond in

Colombia. The accusations of murder immediately led to DONG Energy cease purchasing coal

from Drummond, as they simply did not want to have their company associated with such behavior

(Fagbladet 3F 2007).

Ten years later, on January 1, 2016, an article on the bloody history of Colombian coal-mining was

printed in the Danish newspaper „Information’. The article described how DONG Energy was

buying coal from the Colombian coal-mining company Prodeco, which is owned by Glencore, the

world‟s biggest trader in raw materials (Information 2016). Prodeco has been accused of

participating in the murder of trade union members (ibid.), just as Drummond was a decade earlier.

This time, however, the reaction from DONG was not as swift as it had been with the Drummond

incident some ten years earlier, and it was not until mid-April that DONG officially cut its ties with

Prodeco (Paxforpeace 2016). As with the Drummond incident, DONG Energy vowed not to do any

further trading with Prodeco until the company met DONG Energy‟s requirement for responsible

sourcing (DONG Energy 2016).

The newspaper article was inspired and sourced by a report published by a Dutch NGO called PAX

(Information, 2016), which mapped out the Colombian coal-mining industry‟s involvement in

violations of human rights. According to DONG Energy itself, it has not done any business with

Prodeco since May 2015 (DONG Letter, 2016). Despite the fact that DONG Energy was not in

business with Prodeco at the time the article was printed, the article still managed to frame DONG

and give the company negative publicity by suggesting that DONG‟s trading in Colombia was

unethical.

One of the primary aspects of the discussion of DONG‟s ties with the Colombian coal industry has

been the extraction companies‟ involvement with paramilitary forces and other non-state violent

actors. The Danish public is not familiar with the kind of conflict seen in this case, but the

involvement of non-state actors in violent conflict is nothing out of the ordinary in Colombia. Since

18

The Danish state has sold many of its shares to both foreign and domestic investors, but still holds 60%.

Page 59: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 59 of 86

independence in 1819 the overall internal security situation in Colombia has been greatly affected

by private actors (Rochlin 2015: 1-3). Historically, the Colombian state has been weak and has

never really been able to uphold a monopoly of violence within its territory. Instead, security has

been privatized and dispersed among a range of („non‟-state) actors and public authorities in the

country (ibid.). The types of non-state actors vary from the private militias of caudillos19

to

politically entrenched paramilitary groups and from community defense groups to drug cartels

(Rochlin 2015; Richani 2007). The dispersed security in Colombia has meant that various economic

enterprises in the country have sometimes existed in complete dislocated from official state

structures (Rochlin 2015: 2). This makes Colombia an interesting case for our thesis, but also a

complicated one, since there arguably already exists a variety of security assemblages external to

the central government in the country. The dislocation of security apparatuses from the state is

especially interesting when we look at how transnational corporations provide security for their

operations and how they create demands for security that affects its configuration.

6.2. Outline

Before we discuss how TNCs affect security in Colombia, we will first describe the history of

internal security in the country. We start from the conflict between the government and the rebel

group FARC and show this conflict as an example of the fragmented sovereignty of the Colombian

state. In continuation, we look at how the government implemented a US counterinsurgency

doctrine and how that spawned right-wing paramilitary groups. The groups we will primarily be

referring to are the AUC and JAAF, which we consider to be non-state actors, as they act on their

own and are financed primarily by private actors. However, they do have unofficial ties to the state

military through training and personnel switching from the military to the paramilitary groups. After

we have described the overall security situation, we will proceed to the more specific example of

the coal-mining companies of Drummond and Prodeco and their operations in the Cesar

Department. This section of the chapter uses the PAX report as its primary source for describing the

crimes committed by the paramilitary groups at the instance of the two coal-mining companies. We

have included a few statements from the actors directly involved in the crimes and some supporting

evidence so that we can arrive at an accurate picture of what transpired in and around the coal

mines. This description of the historical events is necessary to establish a foundation on which to

analyze the assemblage created by the state, the coal-mining companies and the paramilitary

groups. The assemblage is accordingly analyzed in the next section of the chapter by incorporating

the theory presented in Chapter 3. After we have „mapped‟ out the assemblage, we will look at how

it has affected DONG Energy as described in the beginning of this chapter, and how the two

practices of governance described in Chapter 4 are relevant to this example. Finally, we conclude

19

Directly translates from Spanish as „leader‟ but in a South American setting its common use is more like a mixture of

warlord and landlord. The term was used to describe landowners in the post-independence era of Colombia (and other

South American countries) who often used private militias to rule their lands.

Page 60: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 60 of 86

by incorporating our view of Agamben‟s theory of sovereignty and look at how the assemblage is

affecting the configuration of rights.

6.3. Background on the security situation in Colombia

The security situation in Colombia has a long and intricate history, with perpetual conflict from the

country‟s birth until the present. Although highly interesting for anyone with interests in social and

political science, the failed state-building of Colombia since its independence in 1819 is not

something we will go into; rather, we will look at how present-day security is configured in

Colombia and how it came to be configured in this way.

On June 23, 2016, the Colombian government, led by President Santos, met with the leader of the

communist rebel group Fuerzas Armadas Revolucionarias de Colombia, or FARC (The Guardian

2016). At the meeting the two parties entered the final stages of peace negotiations, formally ending

a half-century-long war. When FARC was officially formed in 1966, its agenda was primarily

concerned with land reforms and a national redistribution of wealth, and it was heavily influenced

by the Latin American peasant guerilla doctrine made famous by Ché Guevara and Fidel Castro

(Rochlin 2015: 2). It is no coincidence that FARC focused heavily on land reforms, as land-

ownership has been the historical center of gravity for much of the civil violence in the country

(Richani 2007: 405).

Even before FARC came into being, land was heavily contested to a degree where non-state actors

have acted as public authorities or governing bodies, leaving sovereignty in the country severely

fragmented (ibid.). As a response to the FARC insurgency, in 1968 the Colombian government

passed a law that allowed civilians to carry arms and to organize, effectively, thus legalizing the

formation of paramilitary groups (ibid.: 406). Not only did this law underline the weakness of the

Colombian government, it also further reinforced the de-monopolizing of the use of violence. Even

though the law was repealed in 1988, paramilitary groups had already been formed and gained

financial capacity through their involvement with drug cartels in the early 1990s (ibid.: 405-407).

These paramilitaries started as support units for the Colombian military in the fight against

insurgent groups such as FARC, but the extreme economic boom in the narcotics industry helped

the creation of formal paramilitary groups (ibid.). FARC had formerly relied on income from narco-

trafficking, but it was largely replaced by the new right-wing paramilitary groups, as they were

better aligned ideologically with the drug cartels (ibid.). One of these groups, the Autodefensas

Unida de Colombia (AUC), even proclaimed themselves to be „defenders of capitalism‟ (Rochlin

2015: 2). As the paramilitaries were meant to help counter the left-wing insurgency of FARC, they

quickly became a tool of the political class of landowners, whose interests directly opposed those of

FARC (ibid.). This class included the drug-cartels that needed land for the production of cocaine,

but also ranchers, miners and other types of landowners (ibid.).

The right-wing paramilitary groups, particularly the AUC, became the defenders of landowners, just

like private militias had been to the caudillos a century before. These landowners, present-day

caudillos, and the right-wing paramilitary groups may be operating outside of legal government

Page 61: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 61 of 86

structures, but they are still interconnected with the state through their function as counter-

insurgents (Richani 2007: 408). Despite the paramilitary groups being an extension of the state

military, in terms of counterinsurgency at least, they are contributing to the fragmentation of the

government‟s public authority and conventional ideas concerning sovereignty. Alongside the

insurgents and the present-day caudillos, the paramilitaries create their own pockets of sovereignty

in which they enforce their own ideologies and practices of governance.

6.4. Foreign Extraction Companies and Fragmented Sovereignty

The question of sovereignty is something foreign investors and corporations consider before

investing in Colombia. In fact, Colombia was considered a costly place to invest in for many years

(Deheza 2012). Yet despite the costs and the risks involved in investing in Colombia, there was still

a strong foreign interest in the resources Colombian has to offer, as risk and first-mover high returns

seldom discourage entrepreneurial investors. And the mining industries are important to the

Colombian economy. In 2006, the former President Uribe initiated new mining polices to encourage

foreign investment in the sector, and his successor, President Santos, even proclaimed the mining

sector to be the most important driver of the Colombian economy (Moor 2014: 16). As of 2013,

exploitation of mines and quarries contributed $20.3 billion to the country‟s GDP, or 7.7% of the

total (Wacaster 2013: 1).

In the same year, Colombia produced 103.9 megatonnes of coal, with the majority being produced

in the Cesar and La Guajira Departments (ibid.: 5). In the Cesar Department, the biggest producer is

the American coal-mining company Drummond. Despite the accusations described in the

introduction to this chapter, Drummond remains the largest producer of coal in Colombia and

accounts for a third of the country‟s entire production (ibid.). Prodeco, the company that got DONG

Energy into trouble, also mines in the Cesar Department. Drummond operates two mines in the

Cesar Department, the La Loma mine and the smaller El Descanso mine, while Prodeco runs the

Figur 2. The mentioned mines in the Cesar Department. Adapted from Google Maps with our own additions.

Page 62: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 62 of 86

Calenturitas and the La Jagua mines (Wacaster 2013; Moor 2014). These mines are portrayed in the

map above.

As part of its counterinsurgency activities in 1996, the AUC20

sent sixty paramilitary soldiers into

the Cesar region to protect the established economic elite and caudillos in the region from left-wing

insurgent attacks. In the following years, the number of paramilitaries present in the region rose into

the hundreds, which, according to testimonies given by a former paramilitary commander, was

encouraged by a request by Drummond (Moor 2014: 22). In late 1999, the Juan Andrés Álvarez

Front (JAAF) was formed by the AUC to combat insurgencies specifically around the Drummond

and Prodeco mines in the Cesar region (ibid.: 23). The Cesar Department was, like the rest of

Colombia, plagued by violence before the paramilitaries arrived, but this intensified, and the AUC

and JAAF alone are reckoned to be responsible for the displacement of an estimated 59,000 people

and the killings of at least 86521

(ibid.: 22). According to the PAX report mentioned in the

introduction to this chapter, these figures are based on testimonies given often by ex-paramilitaries

affiliated with either the AUC or specifically the JAAF. One of the testimonies given was by José

Alvarracín, alias El Canoso, an undercover army intelligence sergeant stationed in Prodeco‟s

security department between 1996-1998 (Moor 2014: 115). He testified in a US Court in 2009, as

part of the lawsuit against Drummond brought by families of the victims of violence near their

mines in Colombia, that:

Most of the homicides that were committed during that time were done at the hand of

the paramilitaries who arrived at El Silencio [...] With the arrival of this group to the

area [...] a crime wave swept the area at night and in the Justice and Peace process22

it

is being confessed that back then the commando ordered the daily murder of 30 to 40

people. (Moor 2014: 26)

Another testimony was given to the same court by the former leader of JAAF, Jhon Cuadrado, alias

El Tigre, who was an officer in the Colombian army before joining the paramilitary forces. He

stated that:

Up to the year 2009, I had confessed to 720 killings. [...] There have been many more

versions where I have accepted responsibility for many more killings, but I can‟t give

you a count right now. But I would venture to say that it‟s around a thousand to fifteen

hundred killings approximately by the JAA Front. (Moor 2014: 26)

20

AUC was effectively an umbrella organization for right-wing paramilitary groups across Colombia. It was formed by

the ACCU (Autodefensas Campesinas de Córdoba y Urabá), a local paramilitary group, around the time the

paramilitaries entered the Cesar Department (Moor 2014: 22). Therefore, it was technically the ACCU who deployed its

troops in Cesar, but it is unclear how many of the troops were deployed under the auspices of AUC or ACCU. So for

the sake of simplicity, we will refer to the umbrella organization, AUC.

21 865 is the number of killings that the PAX report was able to verify, but they estimate that 2,600 killings took place at

the hands of the paramilitaries in the period between 1996 and 2006.

22 The Justice and Peace process was introduced by the Colombian authorities to try and bring truth to the families of

the victims and shed light on the methods and structures of paramilitary forces in Colombia (Moor, 2014: 14).

Page 63: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 63 of 86

These atrocities were committed in the near vicinity of the Drummond and Prodeco mines, and the

area El Canoso refers to, El Silencio, is located just a few kilometers south of the La Loma mine. As

mentioned earlier, the AUC entered the region to counter the insurgency, and in particular FARC,

and not necessarily to provide security for the two coal companies. However, the distinction

between ideology and private company security is not clear cut.

Formally, FARC fought for opposing ideologies and against what they believed to be harmful

injustices in their society, where foreign investors together with national elites exploited Columbian

farmers. This thus made FARC a socio-political risk to the coal companies, combatting which

would involve the civilian population as well as FARC insurgents themselves. In his testimony, El

Tigre recalls a meeting with Alfredo Araújo Castro, the Manager of Community Relations in

Drummond Colombia,23

and Rodrigo Pupo, alias Jorge 40, a high commander in AUC and founder

of JAAF, the purpose of which was to discuss the FARC‟s presence around the Drummond mines.

In his written testimony, El Tigre suggested:

„In order to comply with the purpose of subduing the guerrillas and providing security

to Drummond in its mine and railroad line, my Front needed 200 men that were

armed, equipped, and trained. Araújo was in agreement. He said the following words

to us: “Drummond is willing to provide a sum of money so that your group can

strengthen itself with men and arms, as long as you commit to providing security to

the railroad line and the coal operations in the mine.” By “security” I mean that we

were told by Araújo that the areas along the Drummond rail line that had a FARC

presence had to be attacked and pacified. We all understood this. (Moor 2014: 53; El

Tigre 2009: 4).

Whether or not the AUC moved into the Cesar Department solely to combat FARC or they had

intentions of making money out of the volatile situation between FARC and the coal-miners is

difficult to assess. But in terms of mitigating socio-political „risk‟, both Drummond and Prodeco

have actively benefitted from the AUC counterinsurgency in the area surrounding their mines, as it

pushed FARC out of the region, making it difficult for FARC to carry out operations in the area.

The companies also actively promoted counter-insurgency or „security‟ activities. El Canoso

testified that Drummond and Prodeco consulted each other when it came to paying the

paramilitaries:

After we contacted Drummond, we held a joint staff meeting of Prodeco and

Drummond‟s security teams at the casino within Drummond‟s facilities. From

Drummond‟s security team the following people attended: Rafael Peña Ríos, a retired

General; Luis Carlos Rodriguez, a retired Colonel; some retired officials named

Carlos Sastre, Mario Otero, Cesar Agudelo, Néstor Rodriguez, Wilmer Aguerre and

Orlando Ramirez. There was also an American present who was part of Drummond‟s

23

A 100% controlled subsidiary of Drummond.

Page 64: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 64 of 86

security team, Jim Adkins. From Prodeco´s security team the following people

attended: Manuel Gutierrez; Luis Hernando Ochoa; Javier Recaman, a retired military

official who currently works in the Calenturitas mine as Security Chief; and myself.

At this meeting we discussed and we all agreed that we would support the AUC with

money for arms and supplies. We also agreed that we would give the AUC a monthly

payment to cover the salaries, food, and costs of the AUC troops. We also agreed to

buy the AUC some vehicles and supply them with fuel. There was no objection to any

of these agreements from anyone present (Moor 2014: 57; El Canoso 2011: 4).

Running a 200-man paramilitary group is not cheap, and El Canoso claims that the monthly

payment made to the group was approximately $100,000 at the time (Moor 2014: 57). Obviously,

paying for security is not the same thing as accommodating murders and forced displacements, but

James Adkins, the head of security at Drummond (and former CIA agent accused of participating in

human rights violations in Nicaragua), allegedly told the management of Drummond that funding

paramilitary groups „would bring with it egregious human rights violations‟ (Moor 2014: 30). The

same kind of concern was shared by the US Embassy in Colombia. WikiLeaks intercepted cables

sent from the embassy in Bogotá to the US Department of State suggesting that the embassy had

concerns with Drummond‟s approach to environmental issues, labor issues and links to paramilitary

death squads (El Espectador 2011). At the same time, the embassy noted that security in

northeastern Colombia (the Cesar Department) had been improved since Drummond and Prodeco

began hiring paramilitaries to provide it (ibid).

Thus, the security situation in the Cesar Department and the region surrounding the mines was

greatly affected by the presence of the mining companies. Without the mining companies, the

FARC insurgency would probably still have manifested itself, as the struggle was also a territorial

struggle, and therefore the counterinsurgency of AUC would likewise have happened regardless of

the mining companies. But the direct funding of the paramilitary forces impacted the situation in the

region, as it empowered the counter-insurgent groups financially. The volatile security situation in

the region made it a socio-political and economic risk to invest in for the mining companies, but the

latter still took advantage of the fragmented and contested question of sovereignty in the country

and region. Even if the government forces had been able to provide adequate security in the region,

it would probably not have been able to help Drummond and Prodeco out in the same way as the

paramilitary forces were. The forced displacement and the killings of civilians were all part of a

counterinsurgency doctrine that was supposed to terrorize the civilian population into not

supporting the insurgency, but it ended up improving the security situation for the mining

companies as well. However, the PAX report is full of further testimonies that indicates that

Drummond and Prodeco officials gave direct orders to the paramilitary forces to kill union leaders

and civilians, as well as undertake forced displacement (Moor 2014). Regardless of how one

interprets these testimonies, it is clear that both Drummond and Prodeco have had a severe impact

on the security situation in the Cesar Department of Colombia and that the contested notion of

public authority and state sovereignty has represented both risks and opportunities for the

companies to forge new alliances.

Page 65: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 65 of 86

6.5. Security Assemblages

The fragmented and contested organization of sovereignty in Colombia makes it complex to map

out the security assemblage that is being created in and around the coal mines in Cesar as authority

is dispersed among multiple groups. One could argue that the different groups that are committing

violence and engaging in providing security in the region are a sign of how the monopoly of

violence is being contested and is clearly not controlled by the state. Instead, groups like AUC,

while acting as an extension of this fragmented monopoly, utilize the violence for their own ends

outside the sphere promoted by state regulation. On the other hand, the FARC insurgency, a

challenge to the state‟s monopoly on violence, was kept at bay by the counter-insurgency. The laws

enacted to allow the formation of paramilitary groups can be seen as an attempt by the state to use

unconventional means to try to regain its monopoly of violence by promoting non-state actors to

counter the insurgency. When the counterinsurgents, the paramilitaries, became (too) powerful, the

state again tried to regain control the situation by banning the formation of paramilitary groups once

again.

This puts the Colombian government in the middle of the two schools of assemblage theory that we

defined in Chapter 3. On one hand, the Colombian government is losing its authority due to the new

configuration of security that is being created by insurgents (and subsequently the

counterinsurgents), while on the other hand it is trying to reconfigure the enacting of its monopoly

of violence to keep its sovereignty centralized. So we can see that when the coal-mining companies

began to interfere with the security situation in the Cesar Department, this merely reinforced the

state‟s dilemma over matters of sovereignty. On one side, the companies represent a source of

income and the potential for economic growth, but the government cannot provide sufficient

security measures, so they draw on other sources of security provision. On the other side, the

measures of security that are taken by the companies are seen from the perspective of more

conventional understandings of sovereignty, thus weakening the authority of the state by letting

non-state actors perform acts of violence in their place. The attempts to regulate the paramilitary

forces are a sign of the Colombian state trying to reconfigure itself in accordance with the

developing security situation in the country. But the lack of ability to contain both FARC and the

paramilitaries suggests that the authority of the Colombian government is being decentered.

In this thesis, we argue that the second of the two schools of assemblages we defined in Chapter 3 is

the most significant for analyzing the example of Columbia. Even though the Colombian state has

seemingly been „weak‟, with its sovereignty fragmented, ever since the country‟s independence, we

argue that the laws enacted (and later repealed) indicate how the state has tried to reconfigure itself

according to events both within and external to it. The formation of paramilitary forces is an

example of what, from a reified Weberian perspective, are considered to be the conventional

security functions were disassembled in accordance with Sassen‟s theory of assemblages described

in Chapter 3 and partly transferred to non-state actors. In this case, we argue that paramilitary forces

were created as an extension to the already existing security apparatus of the state, but without a

centralized or direct control or command. When the coal-mining companies entered Cesar, a new

demand for security was created, which the paramilitaries stepped in to fulfill. In doing so, they

Page 66: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 66 of 86

received an influx of financial support from the TNCs in order to expand on their capacities as

counterinsurgents and security providers. The strengthened paramilitary forces cooperate with their

foreign financiers to uphold security based on the coal-miners‟ demands, which in turn re-assemble

the security functions in the region. The paramilitaries and the coal-mining companies become the

new actors in the (re)-configuration of the security assembly, but the state is still present, as the

mining companies need licenses to operate the mines, and the paramilitaries still have ties to the

Colombian army. This local security assemblage becomes globalized through the coal-mining

companies, as they are not only foreign24

companies but TNCs trying to supply a global demand for

coal.

As described in Chapter 3, an assemblage implies a set of norms and values, as well as shared

knowledge and technologies. In terms of values and norms, the coal-mining companies are

capitalistic ventures, while, as described earlier, the AUC is a self-proclaimed defender of

capitalism. The Colombian state, in adhering to a conservative and liberal form of governance, is

also a part of the capitalistic set of norms, as it not only allows but also encourages foreign and

private corporations to invest in the country‟s earth-extraction industry. On this note, the Colombian

government is seemingly going for a rentier-state25

approach to exploiting the natural resources in

the country economically by taking royalties for the extraction of exhaustible resources. This

economic process creates revenues that do not affect any domestic production and thus do not

encourage even economic growth (Mahdavy 1970). On the other hand, FARC opposes these ideas

of capitalism and fights for land reforms and redistribution of wealth. This direct opposition to the

norms and values underpinning the security assemblage created by the above-mentioned actors is

what makes FARC the common enemy and source of the socio-political risk incurred by the coal

mining companies when operating in the Cesar Department.

The socio-political risk that FARC constitutes is what brings together and connects the coal-mining

corporations, the paramilitary forces and the government in the security assemblage. The

implication is that FARC should also be considered part of the assemblage. In terms of the

knowledge and technologies that are shared in the assemblage, there is not much indication of any

kind of traditional „technology‟ as a technical device having a central role in the assemblage. There

is, however, clear knowledge dissemination related to how the counterinsurgency doctrine was

organized and implemented. The doctrine, then, can be seen as a technology of power that seeks to

govern a specific set of actors, namely left-wing insurgencies. The law that allowed for the

formation of the paramilitary forces was, for example, drawn up in accordance with a Cold War

24

Drummond in Colombia is technically Drummond Ltd. Colombia and is registered as Colombian, though in fact it is

a 100% controlled subsidiary of Drummond Ltd. based in Alabama, USA. The same goes for Prodeco, which is a

subsidiary of Glencore, the Swiss mega-corporation.

25 Not in the sense Lenin described it, but in its present-day usage postulated by Hossein Mahdavy (1970).

Page 67: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 67 of 86

doctrine26

on counterinsurgency originally formulated by the US (Richani 2007: 406). This doctrine

had already been implemented by the Colombian military through its training by the US at the

School of Americas,27

but the law made it an official doctrine of the Colombian state, at least until it

was repealed (ibid.). As such, already before the coal companies meddled with the security situation

in Cesar, there was a sharing of knowledge between Colombia and the US on how to conduct and

organize counterinsurgency. Three of the persons described earlier in this chapter all exemplify (and

embody) this shared knowledge and how it helped configure the assemblage. James Adkins, the

head of security in Drummond, was a former CIA agent and must have been well aware on the

utilities of the counterinsurgency doctrine in question. El Canoso was an undercover sergeant in

Prodeco‟s security division and had thus been trained by the military, which had implemented the

doctrine. Lastly, El Tigre, the former leader of JAAF, was an officer in the Colombian army before

joining the paramilitary forces. All three shared the knowledge and technology of countering

insurgencies in accordance to the same doctrine and are connected through the assemblage, each

representing their own segment of the actors involved. Additionally, this shared knowledge and

technology also exemplifies marketized security as described in chapter 4, specifically the aspects

of financialization that is concerned with everyday knowledge. It is the knowledge gained through

the experiences of the three abovementioned actors that constitutes the shared knowledge and the

technology of power that the counterinsurgency doctrine becomes. The experience James Adkins

brings from his time as a CIA agent is valuable to Drummond as he brings a particular everyday

knowledge on how to, in a particular way, manage the socio-political risk encountered by the

company. The nature of El Canoso’s job makes it difficult to relate his role to financialization.

While he also do provide a particular everyday knowledge he does so under the auspices of the

Colombian army and thus do not contribute with any value creation to the assemblage. Similarly,

one could argue that El Tigre has ideological reasons for his participation and sharing of his

everyday knowledge, but the fact that the coal mining companies paid JAAF suggests that his role

could be seen as marketized security. As he is being paid to contribute with his knowledge he

creates monetary value for the JAAF by supplying a demand raised by the coal companies.

6.6. The Danish Connection

As mentioned earlier, the assemblage became global not only through its international connection

between the US and Colombia, but also through the coal-mining companies‟ global presence on the

market for thermal coal. This is where DONG Energy comes into the picture. The overall interest in

Colombia in this thesis was sparked by the newspaper articles described in the introduction to this

chapter. Having mapped out the security assemblage that DONG inadvertently became a part of, we

26

The doctrine worked on the assumption that an insurgency is rooted in the local population, so in order to combat it,

one would need to subvert the locals against the insurgency. This is easiest done by terrorizing the population,

according to the doctrine (Richani 2007: 406-407).

27 Its current name is Western Hemisphere Institute for Security Cooperation (WHINSEC).

Page 68: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 68 of 86

can now focus on how a localized security situation in Cesar, Colombia, has affected this Danish

energy company through an unforeseen and so far unaccounted for form of socio-political risk.

When we first read the articles related to the DONG controversy, we set out to get an interview with

a representative from DONG Energy, but when we contacted them we were just referred to a

document DONG had released regarding the company‟s coal procurement practices (DONG Energy

2016). We were somewhat baffled as to why DONG did not want to give us their side of the story,

but in all fairness the document did provide a lot of answers to the questions we would have asked.

The document describes how suppliers undergo risk-based investigations to make sure they

accommodate DONG‟s own CSR policy (ibid). DONG also acknowledges that events dating back

even ten to twenty years need to be accounted for and that a barrier to involvement is created if such

past events violate their CSR policies (ibid.). Obviously such considerations were taken into

account after their business relationship with both Drummond and Prodeco began, but the document

also testifies to an increase in awareness concerning historical events as well (ibid.). This suggests

that the question of socio-political risks has travelled from being related to the here and now event

to include the past as something that may stimulate a concern for risk-analysis. The issue of a time

„discrepancy‟ is prevalent in this entire chapter as well. The events depicted in the Cesar

Department primarily happened from 1996 to 2006, making it difficult to analyze what parts of the

assemblage still function today. However, the PAX report suggests that some of the crimes

perpetrated in 1996-2006 are being repeated today despite an attempt to de-mobilize the

paramilitary forces (Moor 2014). Furthermore, it has been difficult (impossible even) to gather any

information on the CSR policies of the mining companies involved in that time period. In fact,

Prodeco‟s website there is no mention of any form of CSR initiatives until 2014 (Prodeco 2014). On

Glencore‟s website, the first mentions of CSR initiatives dates back to 2010 and includes some

examples of initiatives related to Colombia (Glencore 2005-2016). On Drummond‟s website, both

for Drummond and its Colombian subsidiary, they highlight a variety of CSR-related initiatives but

give no timeline on when these initiatives were introduced (Drummond 2016).

In terms of CSR as a practice of governance, then, it is difficult to determine what direct impact it

may have had on the assemblage described in this chapter because of the time discrepancy. It is,

however, safe to say that the historical events that happened in Cesar hasaffect DONG Energy

negatively due to a lack of a due diligence in terms of the company‟s CSR. Even though the

negative externalities were perpetrated by other companies, it still affected DONG‟s reputation to

such a degree that it had to ramp up its CSR policy in response. Taking into consideration the fact

that the coal-mining companies involved seem to have only recently begun to emphasize CSR-

related initiatives, this could suggest that a change has happened in how corporations regard the

relevance of CSR. Furthermore, as our interviewees indicated (see Chapter 4), risk management and

CSR policies have become intertwined in recent years to such a degree that CSR has become a form

of risk mitigation. As such, the recent CSR policies introduced by the companies involved are an

indication of how they are trying to mitigate the socio-political risks differently from how this was

done in earlier periods (principally 1996-2006). For Drummond, most of the initiatives it has

undertaken are related to providing for education in the Cesar Department, as well as for the proper

Page 69: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 69 of 86

resettlement of those directly affected by the coal mines (Drummond Ltd. 2016). Resettlement of

the population is also the subject of Prodeco‟s only CSR initiative (Prodeco 2014).

These kinds of initiative are far from the brutal counterinsurgency doctrine strategies and

technologies of power utilized in 1996-2006, which included forced displacements, disappearances

and killings. The CSR initiatives are apparently an attempt to obtain a social license to operate in

the region surrounding the coal mines rather than terrorizing the population into compliance. As

discussed in Chapter 4, obtaining a social license to operate is a way to mitigate any socio-political

risk that the local population might impose. In Cesar, Colombia, the local population posed a risk in

terms of the counterinsurgency doctrine, but the peace negotiations with FARC have lessened this

risk, as local populations no longer play a direct role in the insurgency. As such, the risk that the

local population poses today is of a different character than during the FARC insurgency. As the

various initiatives indicate, it is much more about winning over local populations in order to ensure

free-running and effective production at the mines than forcing the population away and „rooting

out‟ FARC units.28

However, it is difficult either to verify or disprove the claims emerging from the PAX report

regarding the persistence of the atrocities committed by the paramilitaries today, and the same goes

for verifying whether the different CSR policies are actually having any effect. The Colombian

government denies that paramilitary forces are still in operation in the country, but various NGOs

and news outlets report that incidents involving right-wing paramilitaries are still happening despite

the demobilization process (Hanson 2008; Brodzinsky 2016; Alsema 2016). But it does seem as if

both FARC and the paramilitary forces have reduced their presence in the security assemblage

related to the coal mines in Cesar (and maybe the rest of Colombia). As such, the assemblage

described previously in the chapter is probably no longer constituted in the same manner with

paramilitary units taking on the same functions or configuration as they did during 1996-2006.

At the same time, the CSR initiatives implemented by the coal-mining companies showcase a

different approach to socio-political risk management, which also alters the configuration of the

assemblage that surrounds the coal mines. Despite the differences between the past and today‟s

configurations of security, we will look at the assemblage that includes the coal-mining companies,

the Colombian government and the paramilitary forces to see how this configuration has affected

the right to security described in Chapter 3. After all, it was this configuration that landed DONG

Energy in trouble, and not what is going on today.

6.7. Interim Conclusion to the Chapter

To conclude this chapter, we will consider how the assemblage has reconfigured the right to

security. We have already identified the core actors in the assemblage as the coal-mining

28

The current US counterinsurgency doctrine has followed a similar development where winning hearts and minds has

become a central part of the doctrine, so it is no longer a purely violent response to a violent insurgency.

Page 70: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 70 of 86

companies, the Colombian government and the paramilitary forces, namely the JAAF. But DONG

Energy, like any other corporation that buys coal from either Drummond or Prodeco, also plays a

significant role in the assemblage, as they create the demand for Colombian coal. And the civilian

population and FARC are also playing their parts as representing the opposition. It should come as

no surprise that the right to security (as described by the UN – see Chapter 3) was grossly

disregarded in the region around the mines. The violations might have been committed by the

JAAF, and the AUC committed similar atrocities elsewhere in Colombia as well, but the funding

for them came from the coal-mining companies. It is impossible to say whether the violence in

Cesar would have happened regardless of the coal-miners‟ presence. Instead we argue that the

payments to and direct involvement with the counterinsurgency is enough to assume a significant

impact on the re-configuration of sovereignty in the area. The people who suffered were primarily

FARC members and civilian supporters of FARC, but in fact anyone who happened to reside in the

area around the mines fell victim to the paramilitaries‟ crimes.

As such, the attempts to eliminate the socio-political risk posed by these people became a form of

exclusion. The paramilitary forces were essentially civilians as well, but the shared interests of both

the coal-miners and the government legitimized them as part of the assemblage. Therefore, the

attempt to eliminate the socio-political risks surrounding the coal mines was a form of inclusive

exclusion that sought to diminish the influence of the forces that did not share the values and norms

of the coal-miners and the government by including the forces that did. The question of sovereignty,

then, is related back to the history of Colombia and how its sovereignty seems perpetually

fragmented because this is the case here as well. The coal-mining companies seemingly became the

sovereign by enabling the paramilitary forces, though these forces were only an extension of the

government. And this extension was made because the Colombian government was not able to

contain the left-wing insurgency itself. As a result, sovereignty was highly fragmented by the three

primary actors.

The inclusive exclusion performed by the assemblage was essentially what got DONG Energy into

trouble, as it did not comply with what was expected of a CSR and as such, CSR becomes

something that governs the assemblage. Obviously, the coal-mining companies did not care about

CSR in the period from 1996 to 2006, nor SLO for that matter, but in 2016 CSR is what defined the

mistakes made by DONG. The time discrepancy in this case makes it difficult to pinpoint exactly

what practices were governing the actors in the assemblage. Furthermore, the example of DONG

Energy‟s problematic connections with Drummond and Prodeco indicate that an assemblage

potentially transcends historical context, as DONG was linked to something that supposedly ended

a decade earlier. The CSR of a company, then, does not only apply to what it does in the present,

but also to its connection to historical events and assemblages.

In sum, this Colombian example proved complex for two reasons. First, Colombian sovereignty has

seemingly been fragmented historically between the central government, caudillos, private militias,

criminal organizations and insurgents. Secondly, the events involving Drummond and Prodeco

primarily took place from 1996 to 2006, but had consequences even in 2016. We argue that, in the

period from 1996 to 2006, an assemblage was created in Cesar, Colombia, with the main actors

Page 71: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 71 of 86

being the coal-mining companies, the paramilitary forces and the government, which were all

connected by shared values, norms and knowledge. The assemblage was put together in order to

mitigate the socio-political risks imposed primarily by the FARC insurgency. The assembly

essentially functioned as an inclusive exclusion where the forces of opposing values and norms

were reduced by including forces that had similar values and norms. In this case, the right-wing

paramilitary force of JAAF was included, and enabled, to combat the FARC insurgency that

presented opposition to the coal-miners and the government. Following this argument, the coal-

mining companies became part of the fragmented sovereignty in the region alongside the

government, which in turn extended its sovereignty to the paramilitary forces. Furthermore, the type

of opposition that the assemblage was an attempt to counter seems to be significant, begging the

question of whether or not the opposition is an actual part of the assemblage. This is something we

will discuss further in the discussion chapter below.

Page 72: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 72 of 86

Chapter 7. Discussion

This chapter seeks to answer the sub-question: „How do security assemblages effect the

configuration of sovereignty and the right to security?‟

7.1. Similarities and differences

In this chapter, we will look back at the two case studies and discuss their differences and

similarities in order to define possible tendencies of a global nature. Nigeria and Colombia are both

former colonies and have vast amounts of natural resources buried in the soil. Both states have

struggled to assert their authority since their independence. In Nigeria, a very young country,

instability, corruption and military coups have meant that the government has never effectively

gained sovereign control over the vast territory and the immensely diverse ethnic composition of the

population. Colombia, whose independence goes further back than in the case of Nigeria, is also

embedded in violence. The country has a long history of struggling with civil wars, landowners

claiming sovereignty, and insurgencies. Comparatively, both countries have been subjected to what

is today often described as „weak‟ or „fragmented sovereignty‟ (Richani 2007; Kasali 2011).

Furthermore, both countries have arguably developed rentier-based economies based on their

natural resources, which in turn has created a dependency of foreign extraction companies. When

combining this dependency with the fragmentation of sovereignty, both countries have been unable

to provide adequate security to meet the demands of the foreign extraction companies, as is evident

from the number of kidnappings, thefts and sabotage the TNCs have experienced in the past. This

lack of security provision has resulted in both governments making attempts to reconfigure their

authority by outsourcing their monopoly of violence to non-state actors. The Nigerian state utilized

private security contractors in cooperation with government forces, whilst the Colombian state

legally allowed the formation of paramilitary forces in the period between 1968 and 1989.

While the two approaches are significantly different, they nonetheless share the common notion that

neither was a direct attempt to please the foreign extraction companies, but rather an instrument

used by the governments to battle civilian uprisings. For the Colombians, it was a matter of

combatting a left-wing insurgency, while the Nigerians simply tried to maintain law and order in the

country. However, we argue that the foreign extraction companies took advantage of this attempt to

reconfigure authority in order to provide security for themselves in both countries. This paved the

way for the foreign extraction companies to construct what we have depicted as their own security

assemblages. There are multiple similarities between the assemblages that were constructed in the

two countries. First, foreign extraction companies worked together with the national government.

Such cooperation has provided an extension of state authority to private actors in order to contain

the level of risk posed by the civilian population. Secondly, disputes over land and resources are

other essential examples of similarities between the two cases, as these are the root causes of the

disassembly of the previous configuration of security in both countries.

In Colombia, the FARC insurgency was primarily based on „giving the land back to the people‟ and

defending the land from capitalistic exploitation, while the local Niger Delta population in Nigeria

perceived the land used by the extraction companies as having been stolen due to the absence of

Page 73: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 73 of 86

compensation. Common to both cases is the fact that the struggle over the disputed land was what

made the re-assembly possible. The similarity identified in the re-assembly is noteworthy in terms

of how both assemblages have been re-assembled in the response to local opposition to foreign

extraction corporations. In both cases, we argue that the re-assembly creates a form of exclusion of

this opposition that happens by including the actors that portray shared values and norms – a form

of „inclusive exclusion‟. This begs the question as to whether or not the opposition is actually a part

of the assemblage rather than something that exists purely “on the outside”. To understand the

implications regarding the opposition being part of the assemblage, we will discuss how resistance

and opposition are connected to the power relations that govern the assemblage.

In both cases, the resistance provided by the opposition is what caused the disassembly of the power

configuration that was in effect before the TNCs came into play. But this „resistance‟ is also the

focal point of the re-assembly, as it is the very resistance that the re-assembled assemblage is trying

to reduce. In our cases, the resistance poses as what can be conceptualized as socio-political risk,

and we suggest that the reconfiguration of security, which includes CSR and SLO initiatives, is

being conducted to mitigate that socio-political risk. Without any resistance there would be no

disassembly and no re-assembly, thus making the opposition immanent in the assemblage. Our

theoretical approach to power relations is built upon Foucault‟s conceptualization (through

Agamben) and the idea of the opposition as immanent is pertinent to the criticisms of some scholars

of a deterministic tendency among „Foucauldians‟ (Flohr 2016:2; Heller 1996: 78-79). Rather than

regarding resistance as deterministic, and in some cases even futile, Florh and Heller interpret

resistance as immanent in all power relations in Foucault‟s conceptualization (2016: 13; 1996: 98-

100). In our two cases, this means that the opposition is immanent in the assemblage, as it is the

possibility of resistance that determines the way security is configured by the TNCs. As such, the

actors in our two cases who are directly involved in providing security, the „foot soldiers‟, are also

defined by the immanence of socio-political risk. In Colombia, the actors directly involved are the

paramilitary forces, and the nature of the opposition, FARC, made it a necessity (seen from the

perspective of both the Colombian government and the coal-mining companies) to bring in such

actors with knowledge of combatting insurgencies. In Nigeria, the opposition was less organized in

nature and became framed as a „criminal‟ kind of resistance, with a focus on local youth gangs

involved in sabotage, theft, kidnappings for ransom, etc.

Furthermore, in the Nigerian case the direct involvement of security actors in combatting „crimes‟

was effected through a combination of PSCs and government troops, whose approach is more

related to policing than the highly militarized type of security provision seen in Colombia (this may

now be changing after the peace accord). The difference in the type of resistance is equaled by the

difference in the type of actors involved in the assemblage. The type of opposition, we argue, is

important for understanding how the assemblage is configured, as it defines the actors and the

knowledge and technologies they use.

Regarding the opposition as a part of the assemblage begs the question if assemblages have no

boundaries? In assemblage theory, where the „borders‟ of such assemblages actually are or if they

can be defined at all is contested (Sassen 2006). But even with this limitation to consider, we argue

Page 74: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 74 of 86

that this provides a more profound insight into how contemporary security relations and

arrangements are possibly configured. The answer is that „borders‟ cannot easily be defined as they

are in constant motion – if they are not fluent and capable of adaptation, they would quickly become

redundant or less effective (this is obviously also the case where laws and rules that are often less

flexible provide particular challenges for such security assemblages, as discussed below).

7.2. Conflicting security practices

If we take this a step further in the direction of fluid borders, it becomes clear that the stakeholders

involved are not confined to Nigerian or Colombian territory (see definition of stakeholder

communities in chapter 2). This includes those who are connected to the TNC in indirect ways, such

as the Danish company DONG, which had previously bought coal from Prodeco. This also means

that DONG‟s stakeholders, which means that both the Danish government and its citizens have

become active actors in the security assemblage. By this statement, we mean that through increased

global awareness of Prodeco‟s involvement in human rights violations, Danish stakeholders have

put immense pressure on DONG to „cut all ties‟ with the TNC. DONG, as shown in Chapter 6,

hesitated for a while but eventually had to give in to the media pressure to save its image and

reputation. We argue that the same type of global stakeholder pressure is currently forcing Shell and

Prodeco to incorporate new practices which counter the socio-political risks posed by the

stakeholder community into their security provision in both the Niger Delta and the Cesar region.

However, these new „soft‟ preventative security practices (CRS and SLO) seem to conflict with the

historical implementation of „hard‟ security practices by the two TNCs as portrayed in the case

studies. As already shown in Chapters 5 and 6, there are many examples of how these security

practices have disregarded the local population‟s right to security of the person, and instead

constructed a hierarchy of rights by placing their own right to security at the top.

On the other hand, these soft security practices have also increasingly been incorporated into the

image of these companies, and therefore they have become integrated aspects of the company‟s

product. An example of this could be a company promoting itself as sustainable, which many

western stakeholders want to be associated with, thus choosing these products over non-sustainable

ones. This means that there is a market for soft practices that deal with socio-political risks, which

we argue has had a significant impact on the global security and risk industry. Our argument

therefore is that, even though it represents a large financial cost for Shell, Prodeco and Drummond

to invest in local improvement initiatives, these TNCs are increasingly realizing that contemporary

market forces dictates the incorporation of soft practices over hard ones.

7.3. Implementing soft security and practices

In Nigeria, resistance to the oil companies has primarily been labeled as criminal activities.

Therefore, initiatives such as job-creation programs and education, are likely to be the most

effective way of obtaining SLO. On the other hand, in Colombia, where the resistance has largely

Page 75: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 75 of 86

been labeled as political violence, CSR initiatives such as education, the settlement of land disputes

and environmental initiatives would be most effective in acquiring SLO in the area. Social license

to operate transcends the two levels of home and host country, as it needs to be obtained at both,

though each level sets up its own requirements for such a license. In the host country it relates back

to the CSR initiatives and whether or not they suffice in mitigating any opposition to the TNC‟s

presence. In the home country, it is apparently more geared towards ensuring the public that what

the TNC is doing in the host country accords with the values and norms of the general public. As

such, the social license to operate is what connects the two levels of home and host country, as it is

required at both levels, while being deeply interdependent between the two levels.

The fact that the contemporary practices of CSR and SLO are being utilized in both examples

indicates a certain level of flexibility in the practices, as they are trying to govern two very different

types of opposition. What is left undefined in the practices leaves room for them to be adapted to

any situation they might be applied to. However, the two examples discussed in this thesis indicate

that the concrete formation of the practices is defined by how the assemblages in which they are

applied are configured. This means that the soft contemporary practices are adaptable to the type of

resistance they are supposed to govern and are thus defined by the immanent resistance in the

assemblage. However, how these practices are used is not a given in a security assemblage set up by

a TNC, as it is very much a voluntary choice whether a corporation chooses to create any initiatives

under the pretext of the practices. There are no laws that directly require TNCs to incorporate CSR

or SLO as practices in their businesses. But as we showed in Chapter 4, there has been an increase

in the usage of these practices and an awareness of the financial benefits of including them in a

firm‟s transnational ventures. There is, however, also a difficulty in measuring the effectiveness of

the practices in terms of their function as modes of governance due to their flexibility and voluntary

nature. To understand how the practices are being used as modes of governance properly, one must

examine the configuration of the given assemblage, including the immanent resistance.

7.4. Thesis shortcomings

Examining the two cases has, however, also brought out a clear shortcoming in our methodological

approach. It has proved difficult to examine properly what the two security practices – CSR and

SLO – have meant for power relations within the assemblages, especially in the host countries,

which narrows our understanding of how marketized security affects the configuration of

sovereignty. To better understand the actual consequences and effects of these practices, one would

probably need to approach the field with a more ethnographic methodology, particularly when

examining the consequences in the host country. This would allow for a first-hand examination of

the type of opposition that exists to a given assemblage and how the immanent resistance process

actually unfolds. Additionally, it would allow one to determine the effects of the CSR, DOC and

SLO initiatives enacted by the TNCs and to show how they affect the power relations between the

primary actors in the assemblage and those who stand in opposition to it. This would also provide a

more profound insight in how rights and sovereignty are configured in the host countries.

Page 76: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 76 of 86

Another aspect we discuss in both our case studies is the question of whether the host state is weak

or resilient when security is being reconfigured to meet the demands of foreign TNCs. In both

cases, there is arguably a gap in state-controlled security provision, which, as already described, is

the root cause of the disassembly and re-assembly of the security configuration. But the question is

whether this willingness to reconfigure its own security provisions and monopoly of violence is an

indication of a weak and desperate authority, or a sign of a resilient way of adapting to its

surroundings. It might be difficult, maybe even unfair, to label them as weak in comparison to the

Westphalian states of the west, as both countries have not evolved into Westphalian-type states the

same way western countries have. Instead, we argue that the reconfigurations that are happening in

these two cases are an expression of states trying to adapt to the changing demand for security

provision. Both states have chosen a rentier-based approach to building their earth extraction

industries, an approach that allows for foreign TNCs to make more specific demands, including the

demand for security provision. Nonetheless, as both cases have shown, the attempts to reconfigure

security have had various effects, as they have created better security provisions for the foreign

TNCs, though at the cost of losing authority in particular geographical areas.

Page 77: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 77 of 86

Chapter 8. Conclusion

The questions posed in this thesis are:

How can we conceptualize the marketization of security and risk, and what are the

consequences of this marketization for how transnational corporations affect

sovereignty and rights in weak states?

We argue that our findings regarding the practices in these cases illustrate a global tendency in how

these practices are influencing marketized security. Through our case studies, we see how it is only

in recent years that the two practices have been implemented by the TNCs we have examined, a

tendency that also emerged strongly in the interviews. Another tendency exposed in our interviews

was how these practices have been incorporated into risk management, which is something both our

case studies confirm to one degree or another. As such, we argue that there is a tendency in how

TNCs regard security and risk management that has been influenced by market forces, the two

practices all being examples of this influence.

When reviewing our answers to the research question from a broader perspective and in

determining the future usage of our findings, we argue that this can be understood in two ways: first

as a framework for corporations operating in multiple countries to better understand their relations

with the societies they encounter, and secondly how the practices can be understood as neo-colonial

modes of governance. Our theoretical framework serves as a way to understand power relations in a

more complex manner, as our understanding of assemblages and Agamben suggests incorporating

the „opposition‟ into the analysis. Only by properly understanding the role and type of resistance

can a corporation manage the socio-political risk in a truly optimal way. This understanding

determines the kind of CSR-related initiatives that are the most likely to lead to the granting of a

social license to operate. It is the same immanence of resistance in the assemblages that leads us on

to the neo-colonial argument. We argue that these contemporary practices are not only a way to

mitigate risk, as they also help control the local population by creating an inclusive exclusion that

determines whether or not one is posing a risk to the authority concerned. Furthermore, by diffusing

the sovereignty of the host countries, the assemblages allow transnational corporations to influence

the authorities involved, or even to act as the sovereign authority themselves. Our thesis, then,

reveals a double-edged sword that dissects the morality of incorporating social responsibility into

capitalistic ventures while also exposing it as a logic of profit maximization and a neo-colonial

mode of governance.

Page 78: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 78 of 86

References

Books:

Abrahamsen, R. & Leander, a. (2016) „Routledge Handbook of Private Security Studies‟. New

York, NY. Routledge.

Abrahamsen, R. & Williams, M. (2010) „Security Beyond the State: Private Security in

International Politics‟. Cambridge University Press.

Agamben, G. (1998) „Homo Sacer: Sovereign Power and Bare Life‟, translated by Daniel Heller-

Roazen, 1998, Stanford University Press – Originally published as „Homo Sacer: Il potere sovrano e

la nuda vita‟, 1995, Giulio Einaudi editore s.p.a.

Aitken, R. (2011) „Financializing security: Political prediction markets and the commodification of

uncertainty.‟ Special Issue on The Global Governance of Security and Finance. Sage. Security

Dialogue 42(2): 123–141

Ake, C. (1997) 'Political Ethnicity and State- Building in Nigeria' in Global Convulsions: Race,

Ethnicity and Nationalism at the End of the Twentieth Century, Albany: State University of New

York Press.

Aras, G., & Crowther, D. (2010) „A Handbook of Governance and Social Responsibility‟, Gower

Publishing, UK

Beck, U. (2009) „World at Risk. Polity Press.‟ Translated by Ciaran Cronin.

Douglas, M. (2013) „Collected works', Volume XII, Risk and Blame. Essays in cultural theory.

Routledge, London & New York.

Epstein G.A (2003) Introduction: Financialization and the world economy. In: Epstein GA (ed.)

Financialization and the World Economy. Cheltenham: Edward Elgar, 3–16.

Foucault, Michel (1978) “The History of Sexuality”, translated by Robert Hurley, Random House

Inc. – Originally published as “La volonté de savoir”, 1976, Editions Gallimard

Guéhenno, J. M. (1995) The End of the Nation-State. Minneapolis: University of Minnesota Press.

Hansen, T. & Stepputat, F. (2005) „Sovereign Bodies‟ Princeton University Press

Herring, R. (1983). Managing international risk. Cambridge, Cambridge University Press.

Jarvis, D. (2007) Risk, Globalisation and the State: A Critical Appraisal of Ulrich Beck and the

World Risk Society Thesis. Routlegde. Global Society, Vol. 21, No. 1.

Krahmann, E (2010) States, citizens and the Privatization of Security. Cambridge University Press.

New York.

Kvale, S. & Brinkmann, S. (2009) „InterView – Introduktion til et håndværk.‟ 2. udgave. Hans

Reitzel.

Page 79: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 79 of 86

Levi, M (2002) The State of the Study of the State. In Katznelson & Milner, Political Science: the

State of the Discipline, New York: 40

Lupton, D. (1999) Risk. London, Routledge.

Mahdavy, H (1970) "The Pattern and Problems of Economic Development in Rentier States: The

Case of Iran", in Studies in the Economic History of the Middle East, ed. M.A. Cook. Oxford

University Press, Oxford

Mandrup, T. (2012) Privatization of Security: the Concept, it History and its Contemporary

Applications. Conference Proceedings. Royal Danish Defence College. Chapter 1.

Martin, R . (2002) Financialization of Daily Life. Philadelphia, PA: Temple University Press.

Mayhew, Susan (2004) (ed) A Dictionary of Geography (Article: Governmentality) Oxford

University Press

Moran, T. H. (1998). Managing international political risk. Malden, MA, Blackwell.

Mullerat, R. (2009) International Corporate Social Responsibility, Kluwer Law International,

Netherlands.

Obi, C. & Rustad, S. A. (2011) Oil and Insurgency in the Niger Delta: managing the Complex

Politics of Petroviolence. London. GBR. Zed books.

Ohmae, K. (1995) The End of the Nation State: the Rise of Regional Economies. New York: Free

Press.

Purpura, P. (2011) “Security: An Introduction”. CRC press. Taylor and Francis Group: 206

Sassen, S. (2006) Territory, Authority, Rights: From Medieval to Global Assemblages. Princeton

University Press, New Jersey.

Weber, M. (2015) in Weber's Rationalism and Modern Society, translated and edited by Tony

Waters and Dagmar Waters. Palgrave Books

Academic articles:

Abrahamsen, R. & Williams, M., (2011). Security Privatization and Global Security Assemblages.

Brown Journal of World Affairs, Fall/Winter 201, volume xviii, issue 1.

Abrahamsen, R. & Williams, M (2008) (Review) Selling Security: Assessing the Impact of Military

Privatization. Taylor & Francis. Review of International Political Economy, Vol. 15, No. 1: 131-

146

Akapan, N. (2010) Kidnapping in Nigeria‟s Niger Delta: An Exploratory Study. Department of

Sociology & Anthropology, University of Uyo, Uyo, Akwa Ibom State, Nigeria. J Soc Sci, 24(1):

33-42

Page 80: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 80 of 86

Arowosegbe, J. (2009) Violence and National Development in Nigeria: The Political Economy of

Youth Restiveness in the Niger Delta. Review of African Political Economy, Volume 36Volume

36, Issue 122Issue 122.

Baxter, B. &J Jack, S. (2008) „Qualitative Case Study Methodology: Study Design and

Implementation for Novice Researcher.‟ The Qualitative Report Volume 13 Number 4: 544-559

Benhabib, Seyla (2009) Human Rights Across Borders: International Human Rights and

Democratic Sovereignty. American Political Science Review 103 (4): 701

Bigo, D. (2002) Security and immigration: Toward a critique of the governmentality of unease.

Alternatives. 27(2): 63–92

Boele, R., Fabig, H., Wheeler, D. (2001) The Story of Shell, Nigeria and the Ogoni People –

Environment, Economy, Relationships: Conflict and Prospects for Resolution. Sustainable

Development. 9:74-86.

Carroll, A.B. (1999). Corporate social responsibility – evolution of a definitional construction.

Business and Society, 38(3), 268– 295.

Deheza, E & bet, U. (2012) Latin America's Mining Boom, The RUSI Journal, 157:5, 22-31.

Finnemore, M. & Sikkink, K. (1998) International Norm Dynamics and Political Change.

International Organization, vol 52, NO. 4, International Organization at fifty, Exploration and

Contestation in the study of World Politics: 887-917

Froud J, Johal S and Williams K (2002) Financialisation and the coupon pool. Capital and Class 78:

119–151.

Frynas, J. G & Mellahi, K (2003) Political risks as firm-specific (dis)advantages: Evidence on

transnational oil firms in Nigeria. Wiley Periodicals, Inc.Thunderbird International Business

Review, Vol. 45(5) 541–56.

Frynas, J. (2005). "The False Development Promise of Corporate Social Responsibility: Evidence

from Multinational Oil Companies."International Affairs 81(3):581-598.

Frynas, J. G. (2000) Oil in Nigeria: Conflict and litigation between oil companies and village

communities. Münster, LIT: 31-32

Godechot, Olivier. (2015).‟ Financialization Is Marketization! A Study on the Respective Impact of

Various Dimensions of Financialization on the Increase in Global Inequality‟. MaxPo Discussion

Paper. Paris

Hayek, F. (1945) The use of knowledge in society. American Economic Review 35(4): 521.

Hood, J. &Nawaz, M. S. (2004) Political Risk Exposure and Management in Multi-National

Companies: Is There a Role for the Corporate Risk Manager? Palgrave Macmillan Journals Risk

Management, Vol. 6, No. 1

Hönke, J. (2010) New Political Topographies: Mining Companies and Indirect Discharge in

Southern Katanga (DRC) Politique Africaine, vol 120, no. 4: 105-127

Page 81: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 81 of 86

Humphreys, M. (2005) Natural Resources, Conflict, and Conflict Resolution. Uncovering the

mechanisms. Sage Publications. Journal of Conflict Resolutions, Vol. 49 No. 4: 508-537

Ipsos (2011) „Your Stakeholdersand Your Reputation‟ Ipsos Global Reputation Centre Point of

View. Ipos Public Affairs.

Jarvis, D. (2007) „Risk, Globalisation and the State: A Critical Appraisal of Ulrich Beck and the

World Risk Society Thesis.‟ Rutledge. Global Society, Vol. 21, No. 1: 26

Levy, J. (2008) „Case Studies: Types, Designs, and Logics of Inference.‟ Routledge. Conflict

Management and Peace Science, 25:1–18

Leyshon, A. & Thrift, N. (2007) „The capitalization of almost everything: The future of finance and

capitalism.‟ Theory, Culture and Society 24(7/8): 97–115.

Lund, C. (2014) „Of What is This a Case? Analytical Movements in Qualitative Social Science

Research.‟ Human Organization 73(3): 224–234

Kalejaiye, P.; Adebayo, K. & Lawal, O. (2013) „Deregulation and privatization in Nigeria: The

advantages and disadvantages so far.‟ Review. African Journal of Business Management. Vol. 7(25)

Kasali, M. A. (2011) „Analyzing the Evolution of Private Security Guards and their Limitations to

Security Management in Nigeria.‟ African Journal of Criminology and Justice Studies: AJCJS,

Vol.5, Nos. 1 & 2.

Kansal, V. (2015) „Political Risk: Conceptualization, Definition, Categorization, and

Methodologies.‟ Journal of Political Risk, Vol. 3, No. 4.

Kobrin, S. (1979) „Political Risk: A Review and Reconsideration. Journal of International Business

Studies.‟ Vol. 10, No. 1, pp 67-80

Krahman, E. (2013) „United States, PMSCs and the States Monopoly on Violence: Leading the

Way towards Norm Change.‟ Department of Politics and History, Brunel University. Security

Dialogue, Volume 44: 55-57

Kvale, Steinar (1983). „The qualitative research interview: A phenomenological and a

hermeneutical mode of understanding‟. Journal of Phenomenological Psychology, 14, 171-196.

Matuleviciene, M & Stravinskiene, J. (2015) „The Importance of Stakeholders for Corporate

Reputation.‟ Inzinerine Ekonomika-Engineering Economics, 2015, 26(1), 75–83.

Nelsen, N. (2006) „Social license to operate.‟ International Journal of Mining, Reclamation and

Environment, 20:3:161-162

Noruwa, A. I. (2012) „Deregulation and Privatisation of the Upstream and Downstream Oil and Gas

Industry in Nigeria: Curse or Blessing?‟ International Journal of Business Administration. Vol. 3,

No. 1; January 2012.

Obi, C. I (2008) Enter the dragon? Chinese oil companies and resistance in the Niger Delta. Review

of African Political Economy, 35, (3): 417 – 434.

Page 82: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 82 of 86

Parsons, Lacey & Moffat (2014,) "Maintaining legitimacy of a contested practice: How the minerals

industry understands its „social licence to operate,‟" Resources Policy 41: 83–90

Prno, J. & Slocombe, S. (2011) Exploring the origins of „social license to operate‟ in the mining

sector: Perspectives from governance and sustainability theories. Resources Policy 37(3):346–357

Richani, N. (2007). Caudillos and the Crisis of the Colombian State: Fragmented Sovereignty, the

War System and the Privatisation of Counterinsurgency in Colombia. Third World Quarterly, 28(2),

403-417

Rochlin, James (2015) Boom, bust and human security in the extractive sector: The case of

Colombia, The Extractive Industries and Society 2 (2015) 734–745

Rosenberg, M. J. (1 April 2002). "Review of Misguided Virtue: False Notions of Corporate Social

Responsibility"."Review of Misguided Virtue: False Notions of Corporate Social

Responsibility". International Affairs.

Schouten, P (2013) Security in Action: how John Dewey can help us follow the production of

security assemblages. Re-assembling International Theory: Assemblage Thinking and International

Relations. Acuto, M. & Curtis, S. (eds.). Basingstoke: Palgrave Macmillan, p. 85-92

Shamir, R. (2011). Socially Responsible Private Regulation: World-Culture or World-

Capitalism? Law & Society Review 45 (2): 313–336

Sassen S. (2008) Neither global nor national: novel assemblages of territory, authority and rights.

Colombia university, USA. Ethics and Global Politics, Vol. 1, no. 1-2, pp 61-79

Sassen, S. (2013) Land Grabs Today: Feeding the Disassembling of National Territory.

Globalizations, Volume 10Volume 10, Special Issue: Land Grabbing and Global

GovernanceSpecial Issue: Land Grabbing and Global Governance

Sottilotta, C. E. (2013). Political risk: Concepts, definitions, challenges. Working Paper Series,

Roma, LUISS

Smith, D. & Richards J. (2015) Social License to Operate: Hydraulic Fracturing. Related

Challenges Facing the Oil & Gas Industry. Oil and Gas, Natural Resources, and Energy Journal

Vol. 1, no. 2

Thomson,I. & Boutilier, R. (2011) Modelling And Measuring The Social License To Operate:

Fruits Of A Dialogue Between Theory And Practice

van der Hoeven, R & György Sziráczki, G (1997). Lessons from Privatization. International Labour

Organization: 101

Watts, M. (2004) Resource curse? Governmentality, oil and power in the Niger Delta, Nigeria.

Geopolitics, Routledge. 9:1, 50-80

Yates, B. & Horvath, C. (2013) Social License to Operate: How to Get It, and How to Keep It. 2013

Summit Working Papers. Pacific Energy Summit.

Page 83: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 83 of 86

Reports and surveys:

Abrahamsen, R. & Williams, M., (2005).The Globalisation of Private Security: Country Report:

Nigeria. University of Wales, Aberystwyth

http://users.aber.ac.uk/rbh/privatesecurity/country%20report-nigeria.pdf

Amunwa, B. (2011) Counting the Cost. Corporations and human rights abuses in the Niger Delta.

Platform London: http://platformlondon.org/nigeria/Counting_the_Cost.pdf

Amunwa, B. (2012) Dirty Works: Shell‟s security spending in Nigeria and beyond. Platform

London: http://platformlondon.org/wp-content/uploads/2012/08/Dirty-work-Shell%E2%80%99s-

security-spending-in-Nigeria-and-beyond-Platform-August-2012.pdf

Berndtsson, J. (2009) The Privatisation of Security and State Control of Force. Changes, Challenges

and the Case of Iraq. Doctoral Dissertation in Peace and Development Research School of Global

Studies University of Gothenburg

Human Rights Watch Briefing Paper (2005) Rivers and Blood: Guns, Oil and Power in Nigeria‟s

Rivers State. https://www.hrw.org/legacy/backgrounder/africa/nigeria0205/nigeria0205.pdf

Moor, Marianne & van de Sandt, Joris (2014) The Dark Side of Coal: Paramilitary Violence in the

Mining Region of Cesar, Colombia A publication by: PAX, The Netherlands

file:///C:/Users/Gitte/Downloads/pax-dark-side-of-coal-final-version-web%20(1).pdf

Oxfarm (2015) „207 Oxfarm Briefing Paper. Community Consent Index 2015. Oil, gas, and mining

company public positions on Free, Prior, and Informed Consent.‟

https://www.oxfam.org/sites/www.oxfam.org/files/file_attachments/bp207-community-consent-

index-230715-en.pdf

UN Human Rights (2011) Guiding Principles on Business and Human Rights. Implementing the

United Nations “Protect, Respect and Remedy” Framework. New York and Geneva.

http://www.ohchr.org/Documents/Publications/GuidingPrinciplesBusinessHR_EN.pdf

WAC Global services (2003) Peace and Security in the Niger Delta. Conflict expert group baseline

report working paper for SPCD. http://www.npr.org/documents/2005/aug/shell_wac_report.pdf

Wacaster, Susan (2013) The Mineral Industry of Colombia, U.S. Geological Survey 2013 Minerals

Yearbook

Web sources:

Alsema, A. (July 10. 2015) „The FARC‟s biggest fear: Colombia‟s paramilitary groups‟ Colombia

Reports http://colombiareports.com/the-farcs-biggest-fear-colombias-paramilitary-groups/

DrummoBrodzinsky, S. & Watts, J. The (June 23. 2016) Colombia and Farc rebels sign historic

ceasefire deal to end 50-year conflict. The Guardian

https://www.theguardian.com/world/2016/jun/23/colombia-farc-rebel-ceasefire-agreement-havana

CSR.dk (2015) ‟PKA‟ http://csr.dk/pka

Page 84: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 84 of 86

Davies, R. (August 16. 2013) „Shell in Nigerian arms controversy as campaigners accuse it of doing

little to prevent weapons falling into the wrong hands.‟ This is Money.uk

http://www.thisismoney.co.uk/money/news/article-2395897/Shell-Nigerian-arms-controversy.html

DONG Energy (2016) „DONG Energy's coal procurement practices.‟

http://www.dongenergy.com/en/sustainability/behind-our-work/approach/dong-energys-coal-

procurement-practices'

DONG Energy (April 11. 2016) „DONG Energy response to letter from PAX, Urgewald and

Colombia Solidarity of 1 March 2016‟ http://www.paxvoorvrede.nl/media/files/160411-response-

letter-dong-to-pax-urgewald.pdf

DR.DK (May 21. 2015) ‟Du kan ikke længere trække bestikkelse fra i skat.‟

https://www.dr.dk/nyheder/penge/du-kan-ikke-laengere-traekke-bestikkelse-fra-i-skat

Donovan, J. (August 22. 2012) „Demand an end to Shell‟s human rights abuses .‟ Royal Ducth Shell

plc.http://royaldutchshellplc.com/2012/08/22/demand-an-end-to-shells-human-rights-

abuses%E2%80%8F/

Drummond Company INC (2016) „Our commitment: to Communities´´

http://www.drummondco.com/our-commitment/to-communities/

Drummond LTD. Colombia (2016) Social Responsibility. Resettlement Process.

http://www.drummondltd.com/social-responsibility/resettlement-process/?lang=en

El Espectador (March 16. 2011) „Exparamilitares daban seguridad a la Drummond‟

http://www.elespectador.com/noticias/wikileaks/exparamilitares-daban-seguridad-drummond-

articulo-257173

Epstein-Reeves, j. (2010) „Consumers Overwhelmingly Want CSR.‟ Forbes.

http://www.forbes.com/sites/csr/2010/12/15/new-study-consumers-demand-companies-implement-

csr-programs/#12e27b585e1d

Fagbladet 3F (November 22. 2007) ‟DONG-leverandør frikendt for mord i

Colombia‟http://www.fagbladet3f.dk/nyheder/internationalt/4058f727b92e4eefb830df347a6cc175-

20071122-dong-leverandoer-frikendt-for-mord-i-colombia

Google Finance (2016) ‟Royal Dutch Shell plc‟

https://www.google.com/finance?q=NYSE:RDS.A&fstype=ii&ei=zbBdU5C-L8TVqQGPRg

Glencore (2005-2016) „Case studies: Exampels of Our sustainablility incentives from around the

world.‟ http://www.glencore.com/sustainability/case-studies/filter

Godwin, A. (May 31. 2016) „FG deploys 5 warships, 100 gunboats, fighter jets to battle Niger Delta

Avengers.‟ Daily Post. http://dailypost.ng/2016/05/31/fg-deploys-5-warships-100-gunboats-fighter-

jets-to-battle-niger-delta-avengers/

Guardian Security Risk Management (2016) „ About‟ http://www.guardian-srm.com/about/

Page 85: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 85 of 86

Hanson, S (January 11. 2008) „Colombia‟s Right-Wing Paramilitaries and Splinter group.‟ Council

of Foreign Relations: http://www.cfr.org/colombia/colombias-right-wing-paramilitaries-splinter-

groups/p15239#p4

Hirsh, A. & Vidal, J. (august 19. 2012) Shell spending millions of dollars on security in Nigeria,

leaked data shows. The Guardian. https://www.theguardian.com/business/2012/aug/19/shell-

spending-security-nigeria-leak

Human Rights Watch (no date available) „Summary‟

http://pantheon.hrw.org/reports/1999/nigeria/Nigew991-01.htm#P190_8265

IBTimes (2012) „Niger Delta Oil Infrastructure‟ http://www.ibtimes.co.uk/royal-dutch-shell-pay-

55m-over-nigerian-oil-spills-1482259#slideshow/1417650

Maerskoil (no date available) ‟About us‟ http://www.maerskoil.com/about-us/Pages/about-us.aspx

Oxford Dictionaries (2016) ‟marketization.‟

http://www.oxforddictionaries.com/definition/english/marketization

PAXforpeace (April 18. 2016) „Breakthrough: Danish energy company suspends blood coal

imports.‟http://www.paxforpeace.nl/stay-informed/news/breakthrough-danish-energy-company-

suspends-blood-coal-imports

Platformlondon (no data available) „Who we are‟ http://platformlondon.org/about-us/

PKA (2016) ‟Sådan investerer vi‟ https://www.pka.dk/om-pka/sadan-investerer-vi/

Premium Times (July 22. 2013) „NSCDC closes 25 illegal private security companies in Lagos.‟

http://www.premiumtimesng.com/regional/ssouth-west/139305-nscdc-closes-25-illegal-private-

security-companies-in-lagos.html

Principles for Responsible Investments (no date available) „What is responsible investment?‟

https://www.unpri.org/about/what-is-responsible-investment

Prodeco. En Pro de Colombia. (2014) „Our History‟ http://www.prodeco.com.co/index.php/en/who-

we-are/our-history/

Shell Nigeria 1 (2016) „Environment & Society‟ http://www.shell.com.ng/environment-society.html

Shell Nigeria 2 (2016) „Shell at a Glance‟ http://www.shell.com.ng/aboutshell/at-a-glance.html

Shell Nigeria 3 (2016) „Shell Petroleum Development Company of Nigeria (SPDC)‟

http://www.shell.com.ng/aboutshell/our-business/bus-nigeria/e-and-p/spdc.html

Shell Nigeria 4 (2016) „Security in Nigeria‟ http://www.shell.com.ng/environment-society/safety-

tpkg/secure-operations.html

StakeholderDemocracy (no date available) „About the Niger delta‟

http://www.stakeholderdemocracy.org/about-the-niger-delta/

The Journal of Political Risk (April 5. 2015) Political Risk: Conceptualization, Definition,

Categorization, and Methodologies. http://www.jpolrisk.com/political-risk-conceptualization/

Page 86: Master Thesis Marketized Security The Impact of Trans-National Corporations on how Sovereignty and Rights are Configured

Page 86 of 86

Tran, M (June 11. 2004) Shell 'may have to leave Nigeria. The Guardian.

https://www.theguardian.com/business/2004/jun/11/oilandpetrol.money

United Nations Human Rights (September 2013) „Free, Prior and Informed Consent of Indigenous

Peoples‟ http://www.ohchr.org/Documents/Issues/IPeoples/FreePriorandInformedConsent.pdf

VesperGroup.se (2016) ‟About‟ http://www.vespergroup.se/

Court documents:

Written statement (April 2. 2000) El Tigre in Balcero et al vs Drummond Ltd et al

http://www.iradvocates.org/sites/default/files/12.03.09%20Decl%20%20El%20Tigre%20ENG-

SPA%20%2B%20Exhs%20FINAL.pdf

Written statement (November 21. 2011) El Canoso in Balcero et al vs Drummond Ltd et al

http://www.iradvocates.org/sites/default/files/11.21.11%20Albarracin%20signed%20Decl%20Com

bined.pdf

Interviews:

Østerby, Frederik (2016) Analytis Officer. Guardian Security Risk Management.

Kalhøj, Bruno (2016) Head of security and crisis management. Maersk Oil.

Andersen, Johnny (2016) Team leader. Vesper Group

Mandrup, Thomas (2016) PhD. The Royal Danish Defence College.

Maher, Rajiv (2016) Phd. Copenhagen Business School.

Nellemann, Michael (20116) investment director, PKA.