response to security
TRANSCRIPT
-
7/29/2019 Response to Security
1/10
1
De-Westernizing Cr itical Security Studies 1
The field of social science is often seen as inherently a reflection or a disciplinary
attempt to reflect and explain the world order. If accepted as true, it would explain trend
throughout this discipline in the post-Cold War era to re-evaluate some of its basic
assumptions and theoretical frameworks. The field of Security Studies saw the creation of
a niche of security studies theorists under its auspices that claimed to represent what is
now termed as Critical Security Studies. They challenged the traditional frameworks of
the field and introduced factors that attempted to broaden its conceptual scope. One of the
major strands of critical security studies theorists, that include the likes of Mohammed
Ayoob 2, has levied the particular claim that traditional security studies lacks the adequate
theoretical tools to analyze the Third World and that it requires an alternative frame of
analysis that takes into account its (Third Worlds) particular historical, political, social
and cultural context. Others like Claire Wilkinson 3 have questioned the Westphalian
straightjacket as not only having plagued the theoretical applicability of traditional
security studies but also certain strands of critical security studies, namely the
Copenhagen School. What this study attempts to claim is that while it is true that there is
a requirement for a theoretical frame within Security Studies that is applicable to acontext beyond the west, it is overly simplistic to claim the presence of a clear distinction
between the western and the non-western social, political and cultural reality. It further
posits that the complexity lies in the fact that aspects of the west and the non-west are
present within the context of the non-Western state/country. So, the alternative theoretical
framework, instead of attempting structure a framework around the notion of the
western/non-western dichotomy, should rather attempt to reflect the struggle that exists
between these, supposedly, opposing features (i.e. of the west and non-west) within the
non-Western context.
1 In this paper Third World states and non-Western countries are referred to as being synonymous. Whilebeing a non-Western country does not necessary mean that such state could be characterized as a ThirdWorld country, this study works on the assumption that most non-Western countries, owing to a variety of reasons, can be categorized as being part of the Third World.2 see Ayoob, Mohammed, The Third World Security Predicament (London: Lynne Rienner Publishers,1995)3 see Wilkinson, Claire, The Copenhagen School on Tour in K yrgyzstan: Is Securitization Theory UseableOutside Europe? Security Dialogue 38.5 (2007)
-
7/29/2019 Response to Security
2/10
2
Critical Security Studies, Third World and the non-Western
While the critical security studies theorists are dealing with the Third World and
the non-Western, and are responding to the supposedly western-oriented frameworks of
traditional security studies, they could also be seen as caught within the struggle between
the notions of representation and resistance. Post-colonial studies see this as an arena
within which much of the drama of colonialist relations and post-colonial examination
and subversion of those relations has taken place 4. According to Lings analysis it could
be seen as a response to cultural chauvinism 5, one that encourages the mimicry of
what is considered Western, modern, urban, industrialized, upwardly mobile and
masculine [with] nonmimicry [leaving] behind the so-called traditional sectors and
natives who are backward, rural, agricultural, socially stagnant, and feminine 6.
In lieu of this struggle of representation and resistance as articulated by Post-
colonial studies, the notion of Third World Security could be seen as a manifestation of
this within the field of critical security studies. Mohammed Ayoob in The Third World
Security Predicament defines the term Third World as describing the underdeveloped,
poor, weak states of Asia, Africa, and Latin America that together make up a substantial
numerical majority among the members of the international system7
. In the context of this definition, Ayoob cites Robert Gilpin in claiming that what characterizes the Third
World is its weakness towards the two organizing principles of international social life
the sovereign state and the international market 8. This classification of the Third
Worlds weakness is key as it is manifested at both of the levels at which the Third
World interacts with the international system: as a group, and as individual sovereign
states 9.
4 Ashcroft, Bill, Gareth Griffith and Helen Tiffin, Introduction: Representation and Resistance in Thepost-colonial studies reader ed. Bill Ashcroft, Gareth Griffith and Helen Tiffin. (London: Routledge,1995): 855 Ling, L.H.M. Cultural Chauvinism And The Liberal International Order: West versus Rest in Asiasfinancial crisis in Power in a postcolonial world: race, gender, and class in International Relations ed.Geeta Chowdhury and Sheila Nair (London: Routledge, 2002): 1156 Ling, 1217 Ayoob, Mohammed, The Third World Security Predicament (London: Lynne Rienner Publishers, 1995):128 Ayoob, 19 Ibid , 1
-
7/29/2019 Response to Security
3/10
3
Drawing an analysis similar to that of Ayoob, Amitav Acharya in The Periphery
as the Core: The Third World and Security Studies, sees the emergence of the Third
World as [challenging] the dominant understanding of security in three important
respects 10 :
1. Its focus on the interstate level as the point of origin of securitythreats.
2. Its exclusion of non-military phenomena from the security studiesagenda.
3. Its belief in the global balance of power as the legitimate andeffective instrument of international order. 11
Caroline Thomas in, In Search of Security , sees this challenge as rooted in the fact thatsecurity in the context of the Third World states does not simply refer to the military
dimensions, as is often assumed in the Western discussions of the concept, but to the
whole range of dimensions of a states existence which are already taken care of in the
more-developed states, especially those of the West 12 . Thomas further lists search
for the internal security of the state through nation-building, [and] the search for secure
systems of food, health, money and trade 13 as some key examples. While food, health,
money and trade seem obvious factors that draw a correlation between social well-being
and security, the notion of nation-building and internal state security provides for a
complex problematique . Thomas claims that unlike the West where society is often seen
as coherently structured to be compatible with the boundaries of the state, in the Third
World context this process has been particularly problematic. The author notes that
owing to arbitrary creation of state boundaries by European colonizers the resulting
[t]erritorial boundaries pay insufficient attention to ethnicity, indigenous historical
divisions or even at times geography 14 . What this has meant for the Third World is the
need for a process of nation-building among a greatly heterogeneous population.According to Thomas it is then this heterogeneity that has been the major cause of
10 Acharya, Amitav, The Periphery as the Core: The Third World and Security Studies in CriticalSecurity Studies ed. Keith Krause and Michael C. Williams (London: UCL Press, 1997): 30111 Acharya, 30112 Thomas, Caroline, In Search of Security (Boulder: Lynne Rienner Publishers, 1987): 113 Thomas, 114 Thomas, 10
-
7/29/2019 Response to Security
4/10
domestic, regional and international instability, as well as being a source of massive
human suffering through repression and displacement of persons 15 .
Ayoob, elaborating on the notion of nation-building in the Third World concept,
representing what he terms as subaltern realism and, in a way, alluding to Lings notion
of cultural chauvinism, sees the international normative framework on state making
and nation building 16 to have had a particular impact on the Third World. According to
the author, what this has meant is the Third World states insistence on maintaining the
essential norms of the Westphalian system to protect themselves from unwanted external
intervention 17 . This insistence has, of course, often manifested into extreme levels of
suffering and repression at the hands of the political elite.While Third World Security theorists have critiqued the foundations of traditional
security studies as western-centric, similar criticisms have been levied on critical security
studies as well. The Copenhagen School has, within critical security studies, been
particularly targeted by those theorists that see it as having an incomplete theoretical
framework. Holger Stritzel in Towards a Theory of Securitization: Copenhagen and
Beyond claims that while theorists within the Copenhagen School have adequately
defined securitization as a successful speech act 18 , which allows one to characterize
something as an existential threat thus permitting urgent and exceptional measures to
deal with the threat 19 , they have failed to transform this notion into a coherent
theoretical framework 20 . The author further posits that within the Copenhagen School, the
primacy of the speech act renders it inadequate and vague 21 . Instead, according to
Stritzel, the focus should be on the dynamics of causality involved within the trilogy of
speech act, actor and audience 22 . As further criticism of the Copenhagen School, Stritzel
posits the need to
15 Ibid , 1016 Ayoob, Mohammed. Inequalities and Theorizing in International Relations: The Case for SubalternRealism International Studies Review 4.3 (Autumn, 2002): 4817 Ayoob, 4818 Stritzel, Holger. Towards a Theory of Securitization: Copenhagen and Beyond European Journal of International Relations 13.3 (2007): 35819 Stritzel, 35820 Ibid , 35821 Ibid , 35822 Stritzel, 364
-
7/29/2019 Response to Security
5/10
5
conceptualize securitizing speech acts and securitizing actors as embedded inbroader social and linguistic structures. [This would further mean] that the actorcannot be as significant as a social actor and a speech act cannot have an impact
on social relations without a situation that constitutes them as significant 23 .
A similar argument is made by Thierry Balzacq in The Three Faces of Securitization:
Political Agency, Audience and Context. He claims that since securitization is not a
self-contained process 24 we could make three assumptions (i) that an effective
securitization is that an effective securitization is audience-centered; (ii) that
securitization is context-dependent; (iii) that an effective securitization is power-laden 25 .
Like Stritzel, Balzacq too can be seen as positing the primacy of the particular social
context as a key factor in determining the success of the speech act.What both Stritzel and Balzacq have engaged in is a critical analysis of the
Copenhagen School that attempts to take it beyond its conceptual inadequacies in order to
move it towards becoming a more comprehensive theory. While not specifically delving
into the western-centric assumptions of security studies, one could claim that both these
authors analyses reflect a perspective that marginalizes the non-western and Third World
context, especially that of non-democratic societies. If one claims the primacy of the
social context in determining the success of a speech act, an untoward level of power and
political significance is accorded to the society in question. While this could be seen as
reflective of democratic societies where the population plays a key role in political
decision-making, and often in the act of securitization, it could also be subsequently
perceived as incompatible with the non-democratic. In such societies it is often the
securitizing actor, namely, the political elite, that plays a key role in determining the
social and political context that would make the a particular brand of speech act
successful. Here, unlike in democratic societies, it is the securitizing actor that could be
seen as demanding primacy than the context. What this would further mean is that whilebeing critical of a particular brand of critical studies, both Stritzel and Balzacq have
effectively marginalized the political reality (non-democratic societies) of significant
23 Stritzel, 36724 Balzacq, Thierry The Three Faces of Securitization: Political Agency, Audience and Context European
J ournal of International Relations 11.2 (2007): 17125 Balzacq, 171
-
7/29/2019 Response to Security
6/10
6
sections of the non-western world, thus failing to make their response to the Copenhagen
School as effectively comprehensive.
A more explicit criticism of the Copenhagen Schools western-based analytical
frameworks is made by Claire Wilkinson in The Copenhagen School on Tour in
Kyrgyzstan: Is Securitization Theory Useable Outside Europe? While criticizing the
universal applicability of the speech act, through the analysis of the case of Kyrgyzstan,
Wilkison claims that inherent to the Copenhagen School is what Buzan and Little defined
as the Westphalian straitjacket [which is] the strong tendency to assume that the
model established in seventeenth century Europe should define what the international
system is for all times and places26
. Drawing from this, the author further claims that theEuro-American assumptions about concepts such as society, identity and the state,
combined with the presumption of Western democracy and primacy of the speech-act,
mean that, particularly in a non-Western setting, security dynamics are edited and
Westernized through the application of the theoretical framework 27 . This, for Wilkinson,
remains the primary hindrance of the Copenhagen School that impedes its attempt to
create a universal and multilevel framework for empirical analyses of security 28 .
Having thus discussed some of major criticisms of both traditional security
studies and critical security studies as being western-oriented we can articulate the
following as some of the major claims of this particular perspective:
1. From the perspective of Third World theorists, traditional security studies are
rooted in a Western-based understanding of societies, states, and the international
system. A study of Third World states would thus demonstrate the need for an
alternative theoretical framework that truly reflects the institutional, societal and
political realities of Third World states.2. While Stritzel and Balzacq criticized the theoretical inadequacies of the
Copenhagen School and proposed the primacy of the imbedded context in
determining the success of a particular speech act, this analysis could also be seen
as drawing from a particular understanding of the interaction between the state
26 Wilkinson, Claire, The Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory UseableOutside Europe? Security Dialogue 38.5 (2007): 727 Wilkinson, 2228 Ibid , 22
-
7/29/2019 Response to Security
7/10
7
and society. This, being orientated to a Western notion of democratic society
where it often has the power to determine the compatibility of a certain speech
act, marginalizes a large section of the non-western, non-democratic world where
the society cannot be accorded such a level of primacy
3. Finally, Wilkinson explicitly critiques the Westphalian straitjacket, that is at a
core aspect of the Copenhagen School, as limiting its analysis to a Western
understanding of the society, state and the international system.
De-Westernizing Critical Security Studies
What critical security studies have attempted to do is challenge our traditionalunderstanding of the dynamics of societies, states and the international system. Those
challenging the Western-centric notions of (critical) security studies can be broadly
divided (for the purpose of this study) into two groups. The first proposes an alternative
theoretical framework that solely engages in the non-Western perspective (e.g. Third
World Security). The second group of theorists (namely, Wilkinson and to an extent
Stritzel and Balzacq) propose a critical engagement within the frameworks of critical
security studies attempting to disentangle it from the remnants of the traditional western-
centric assumptions of security studies. While both perspectives attempt to provide a
comprehensive solution in significantly different manners, they can be seen as drawing
from a common empirical assumption, i.e. the presence of a clear dichotomy between the
western and non-western, where the western is seen as encroaching from beyond the
borders of Third World/non-Western states while the non-Western reality remains an
internal force against this external/incompatible threat. I would claim that the weakness
of these perspectives lays solely on the acceptance of this assumption. While it is true that
the dynamics of non-Western societies are vastly different from that of the West, it wouldbe nave to assume that institutionally and structurally they are completely incompatible
with Western notions of society, state and the international system. One must first realize
the creation of Third World states was primarily a Western/colonial project. Whether it
was the Sykes-Picot Agreement for the Middle East, the carving of the continent of
Africa among the European colonial powers or the partition of the Indian subcontinent,
the arbitrariness of this colonial project transcended the particular needs of any particular
-
7/29/2019 Response to Security
8/10
8
social, cultural, political and geographical context. Instead what it has left behind was a
institutional structure that, whether compatible or not, remains till today the primary
configuration around which the Third World interacts with the international system. The
problem remains in the fact that while a Third World country remains officially
committed to this structure (of the Westphalian straitjacket), its underlying society
remains incompatible to the institutional structures. So, what we have is a dichotomy but
not between the external and the internal but one that is within the Third World/non-
Western state. It is a struggle between the institutional constrains imposed by the west
and the societal context that is often inherently incompatible to it. The complexity lies in
the fact that both these contexts remain and struggle within the boundaries of the ThirdWorld state. What this internal dichotomy and struggle further manifests is the creation of
a societal division between those that are committed to the institutional constraint and
those see them incompatible to the societal structure of the particular state in question.
Two extreme examples of the presence of this struggle have been Yemen and Pakistan.
Both countries have had to contend with a western-imposed state structure while also
having to accommodate a significant tradition of tribalism on its territorial boundaries.
What this has meant is a continuous struggle between the centre and periphery within
the non-western context and demonstrates that, more than a clear division between the
western and the non-western sphere, what exists is a complex struggle among these
spheres within non-Western states. While one can claim the Western roots of the
institutional constraints forced on the Third World, it cannot be ignored that these
structures have seen a deep commitment from these countries. The problem rather lays in
the incompatibility of it to the societal context. This is where I would claim that any
attempt to de-westernize critical security studies should start. Rather than focusing on the
difference between the West and the non-Western, this perspective would inherentlyprovide for a reflection of the social reality of Third World states and the societies they
encompass. Providing this frame would in fact be the only way one can reflect the non-
Western perspective. Failure to do so would only see the theoretical perspectives of
critical security studies as still drawing on some of the traditional conceptual assumptions
rooted solely in the West.
-
7/29/2019 Response to Security
9/10
9
Conclusion
While the process of decolonization ended the territorial control of the west over the
Third World, it is clear that this control has remained within the analytical frameworks
that have been used to comprehend the dynamics of the non-Western. Drawing from the
post-colonial notion of cultural chauvinism, Critical Security Studies through the likes
of Ayoob, Thomas, Acharya and Wilkinson, has attempted to break away from the
constraints of the western paradigms in order to truly understand the security concerns
and their manifestations outside the West. Unfortunately, the outcome of this attempt has
been a flawed understanding of the problematique . Notions of Third World security and
Wilkinsons critique of the Copenhagen Schools Westphalian straitjacket have created a
conception based on the assumption that there exists a clear dichotomy between the non-
western reality and the Western institutional/structural assumptions. This could be seen as
essentially flawed as it fails to recognize that in the post-colonial context, where Third
World institutional/structural realities have strong western roots, the relationship with
non-western societal reality is far more complex. Moreover, often owing to its societal
incompatibility these structural realities are frequently engaged in a struggle within non-
Western countries. This is where this paper claims lies the security problematique , i.e. inthe struggle between the Western institutional constraints implemented by the colonial
west and the often incompatibility of it with the society it encompasses. Furthermore, it is
the reflection of this struggle that can truly incorporate the non-western within the
theoretical frameworks of the critical security studies, thus paving the way towards
comprehensively de-westernizing the discipline.
-
7/29/2019 Response to Security
10/10
10
Works Cited L ist
1) Acharya, Amitav, The Periphery as the Core: The Third World and SecurityStudies in Critical Security Studies ed. Keith Krause and Michael C. Williams(London: UCL Press, 1997)
2) Ashcroft, Bill, Gareth Griffith and Helen Tiffin, Introduction: Representationand Resistance in The post-colonial studies reader ed. Bill Ashcroft, GarethGriffith and Helen Tiffin. (London: Routledge, 1995)
3) Ayoob, Mohammed, The Third World Security Predicament (London: LynneRienner Publishers, 1995)
4) Ayoob, Mohammed. Inequalities and Theorizing in International Relations: TheCase for Subaltern Realism International Studies Review 4.3 (Autumn, 2002):27-48
5) Balzacq, Thierry The Three Faces of Securitization: Political Agency, Audienceand Context European J ournal of International Relations 11.2 (2007): 171-201
6) Ling, L.H.M. Cultural Chauvinism And The Liberal International Order: Westversus Rest in Asias financial crisis in Power in a postcolonial world: race,gender, and class in International Relations ed. Geeta Chowdhury and SheilaNair (London: Routledge, 2002)
7) Stritzel, Holger. Towards a Theory of Securitization: Copenhagen and BeyondEuropean J ournal of International Relations 13.3 (2007): 357-383
8) Thomas, Caroline, In Search of Security (Boulder: Lynne Rienner Publishers,1987)
9) Wilkinson, Claire, The Copenhagen School on Tour in Kyrgyzstan: IsSecuritization Theory Useable Outside Europe? Security Dialogue 38.5 (2007):5-25