SAGE LIBRARY OF INTERNATIONAL RELATIONS
INTERNATIONAL SECURITY VOLUME I11 Widening Security ite
Barry Buzan and Lene ...
27 downloads
809 Views
22MB Size
Report
This content was uploaded by our users and we assume good faith they have the permission to share this book. If you own the copyright to this book and it is wrongfully on our website, we offer a simple DMCA procedure to remove your content from our site. Start by pressing the button below!
Report copyright / DMCA form
SAGE LIBRARY OF INTERNATIONAL RELATIONS
INTERNATIONAL SECURITY VOLUME I11 Widening Security ite
Barry Buzan and Lene Hansen
@SAGEPublications Los Angeles
London New Delhi Singapore
Introduction and editorial arrangement 0 Barry Buzan and Lene Hansen 2007 First published 2007 Apart from any fair dealing for the purposes of research o r private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act, 1988, this publication may be reproduced, stored or transmitted in any form, or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction, in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publishers. Every effort has been made t o trace and acknowledge all the copyright owners of the material reprinted herein. However, if any copyright owners have not been located and contacted at the time of publication, the publishers will be pleased to make the necessary arrangements at the first opportunity. SAGE Publications Ltd 1 Oliver's Yard 55 City Road London E C l Y 1SP SAGE Publications Inc. 2455 Teller Road Thousand Oaks, California 91320 SAGE Publications lndia Pvt Ltd B 111 1, Mohan Cooperative Industrial Area Mathura Road New Delhi 110 044 SAGE Publications Asia-Pacific Pte Ltd 33 Pekin Street #02-01 Far East Square Singapore 048763
British Library Cataloguing in Publication data A catalogue record for this book is available from the British Library
ISBN: 978-1-4129-2139-8 (set of four volumes)
Library of Congress Control Number: 2006938798 Typeset by Televijay Technologies (P) Limited, Chennai Printed on paper from sustainable resources Printed and bound in Zrinski d.d Croatia
VOLUME I11 Widening Security 43. What is Security?
Einnza Rothschild
44. A Genealogy of the Chemical Weapons Tahoo
1
Richard Przce
45. Securitization and Desecuritization O l e W m e r 46. Secur~tyStud~esand the End of the Cold War Davzd A. Baldwzn 47. Ident~tyand Secur~ty:Buzan and the Copenhagen School Bzll McSzuecney 48. Broaden~ngthe Agenda of Secur~tyStudm: Pol~tlcsand Methods Kezth Krause and Mzchael C. W~llzanzs
35 66 99
121
135
49. Collective Identity in a Democratic Community: The Case of NATO Thomas Rissc-Kappeiz 50. Insecurity and State Format~onin the Global Military Order: The Middle Eastern Case Keith Krazise
202
5 1. Constructing National Interests Jutta Weldcs
233
52. Multiple Ident~tles,Interfacing Games: The Social Construction of Western Act~on~n Bosn~a K.M. F w k e 53. Competmg V ~ s ~ o nfor s U.S. Grand Strategy Barry R. Posen and Andrew I,. Ross 54. Imagined (Security) Communities: Cognitive Regions in International Relations E m m u c l Adlcr
271 297 340
What is Security?' Emma Rothschild
P
rinciples or definitions of security are a well-established institution of international politics. They are of great importance, in particular, to the ceremonials of reconstruction after large international wars. When Descartes died in Stockholm in the winter of 1650, he had recently completed the verse text for a ballet called "The Birth of Peace," which was performed at the Swedish court in celebration of the Treaty of Westphalia, the birthday of Queen Christina, and the "golden peace" that was to follow the Thirty Years' War.' All the great postwar settlements of modern times have since been accompanied, at Vienna in 1815, at Versailles in 1919, and at San Francisco in 194.7, by new principles of international security. One principle has been thought to echo to the next, across the turbulent intervening times. Harold Nicolson set out in 1919 for the Conference of Paris with a "slim and authentic little volume" about the Congress of Vienna; he addressed his own account of the Versailles proceedings, some years later, to "the young men who will be in attendance upon the British Commissioners to the Conference of Montreal in 1965." The Cold War was also a large international conflict. Like the two world wars and the French Revolutionary and Napoleonic Wars, it came to an end with momentous changes in the political configuration of Europe, and it, too, has been followed by a new political interest in principles of security. The principles of the incipient post-Cold War settlement have no Woodrow Wilson (or no Castlereagh) and n o imposing Congress. But they already have an epigram in the idea, much discussed since 1989, of the security of individuals as an object of international policy: of "common security" or "human security." This essay will look at the proposed new principles in a historical and critical perspective. They are not conspicuously new, as will be seen, and they suggest troublesome questions about what it means to have (or to act on) a "principle of security." They are neither concise statements of received wisdom (like Castlereagh's "just equilibrium"), nor inspirational (like the self-determination for "well-defined national elements" of Woodrow Wilson's Four Principles); they have not been embodied in new international organizations (like the
'
Source: Dadrrlus, 124(3 ) ( 1995): 5 3-98,
2
Widening Security
settlement of 1945).But this disorderliness is also a strength; the international politics of the post-Cold War world is itself disorderly, verbose, and only intermittently inspirational. It is closer, in this respect, to the politics of the Congress of Vienna than to Versailles or San Francisco; it is particularly close, as will be seen, to the pluralist politics of the generation that preceded the new world order of 1815. The war against the French Revolution has been taken as a standard, at least since Henry Kissinger's encomium to Metternich and Castlereagh, for the long Cold War. But it is the ideas of the Revolution itself, or at least of its early and liberal supporters, that have become newly conspicuous in the post-Cold War settlement. The "liberal internationalism" of the 1990s - a liberalism disengaged, in Stanley Hoffmann's words, from its nineteenth-century "embrace of national self-determination" - is close to the liberalism of Kant, Condorcet, or Adam Smith.4 So is the commitment to an international "civil so~iety."~ "The essence of a revolutionary situation is its self-consciousness," Kissinger wrote; "principles," in such a situation, "are so central that they are constantly talked a b o ~ t . "My ~ objective is to describe the distinctively self-conscious principles of the 1990s, and their possible political consequences. These principles are evocative, as will be seen, of the liberal ideas - including ideas of security - of the end of the eighteenth century. But they also hold out the promise of a different liberal theory; of a theory that is freed, in particular, from the dichotomies so characteristic of the, 1815 settlement, of English versus French liberalisms, or of domestic versus international politics.
Extended Security The ubiquitous idea, in the new principles of the 1990s, is of security in an "extended" sense. The extension takes four main forms. In the first, the concept of security is extended from the security of nations to the security of groups and individuals: it is extended downwards from nations to individuals. In the second, it is extended from the security of nations to the security of the international system, or of a supranational physical environment: it is extended upwards, from the nation to the biosphere. The extension, in both cases, is in the sorts of entities whose security is to be ensured. In the third operation, the concept of security is extended horizontally, or to the sorts of security that are in question. Different entities (such as individuals, nations, and "systems") cannot be expected to be secure or insecure in the same way; the concept of security is extended, therefore, from military to political, economic, social, environmental, or "human" security. In a fourth operation, the political responsibility for ensuring security (or for invigilating all these "concepts of security") is itself extended: it is diffused in all directions from national states, including upwards to international institutions, downwards to regional or local government, and sideways to nongovernmental organizations, to public opinion and the press, and to the abstract forces of nature or of the market.
'
I
i What is Security?
3
The geometry of the proposed new principles is in these terms of dizzying complexity. But something close to this scheme has become virtually a commonplace of international political discussions in the 1990s. The emphasis on the security and sovereignty of individuals, for example, was of conspicuous importance in the Eastern European revolutions, and in particular to Vaclav Havel (following John Stuart Mill); "the sovereignty of the community, the region, the nation, the state," Havel wrote, "makes sense only if it is derived from the one genuine sovereignty - that is, from the sovereignty of the human being."' The foreign policy speeches of the Clinton administration contained repeated references in 1993 and 1994 to extended or "huniau" security, including to "a new understanding of the meaning and nature of national security and of the role of individuals and nation- state^."^ The international Commission on Global Governance was the exponent, in 1995, of vertically extended security: "Global security must be broadened from its traditional focus on the security of states to the security of people and the planet."' The United Nations Development Program took as the principal theme of its 1994 Human Development Report the transition "from nuclear security to human security," or to "the basic concept of human security," defined as safety from "such chronic threats as hunger, disease and repression," and "protection from sudden and hurtful disruptions.""' The United Nations Secretary-General called in 1995 for a "conceptual breakthrough," going "beyond armed territorial security" (as in the institutions of 194.5) towards enhancing or protecting "the security of people in their homes, jobs and comnlunities." I ' These ideas of extended security are hardly new in the 1990s. They are a development, to take one example, of the idea of common security put forward in the 1982 Report of the Palme Conlmission. Common security was understood, in the Report, in a quite restricted sense. It was presented as a way for nations to organize their security in the presence of nuclear weapons: "states can no longer seek security at each other's expense; it can be attained only through cooperative undertakings." Rut the Report also pointed towards several more extensive conceptions. One was that security should be thought of in terms of economic and political, as well as military objectives; that military security is a means, while the economic security of individuals, or the social security of citizens "to chart futures in a manner of their own choosing," or the political security that follows when "the international system [is] capable of peaceful and orderly change" were ends in themselves. Another was that lasting security should be founded on an effective system of "international order." As Cyrus Vance wrote, "the problems of nuclear and conventional arms are reflections of weaknesses in the international system. It is a weak system because it lacks a significant structure of laws and norins of behaviour which are accepted and observed by all states." A third conception was that securlty is a process as much as a cond~tion,and one in whlch the participants are individuals and groups - "populx and political" opinion, Olof Palme wrote In hi\ mtroduction to the Report - as well as governments and states. I'
4
Widening Security
The new security ideas of the early 1980s were the reflection, in turn, of many earlier discussions. "Over the past decade or so a vast array of public interest organizations have begun to put forward alternate conceptions of national security," Richard Ullman wrote in 1983 of the debate in the United States over extended or redefined security.13 Such proposals were indeed an intermittent feature of the entire Cold War period, and even of the preceding postwar settlement. The historian E.H. Carr had thus argued in 1945, in Nationalism and After, for a "system of pooled security" in which "security for the individual" was a prime objective, and in which it would become possible to "divorce international security and the power to maintain it from frontiers and the national sovereignty which they represent." Carr's view of the previous 1919 settlement as "the last triumph of the old fissiparous nationalism" - "we shall not again see a Europe of twenty, and a world of more than sixty, 'independent sovereign states"' - was hardly prescient; nor was his confidence in the diminution of national sentiment in existing "multinational" states (the United States, the British Commonwealth, and the Soviet Union). But his "social" or "functional" internationalism is strikingly close, nonetheless, to the extended security of the 1990s: its premise is a "shift in emphasis from the rights and well-being of the national group to the rights and wellbeing of the individual man and woman ... transferred to the sphere of international organization. " l 4
Principles of Security
The new political preoccupation with these old ideas corresponds, in the 1990s, to new political interests. "It is not profitable to embark on the fine analysis of a definition unless we have decided on the purpose for which the definition is wanted," John Hicks once said of the economists' dispute over the definition of capital.ls One purpose of principles or definitions of security is thus to provide some sort of guidance to the policies made by governments. Principles of security may be derived or described by theorists, but they are followed or held by officials. This is what could be described as the "naive" view of the debate over principles of security, in that it assumes that principles are indeed important in the organization of policy. It is this view that was dismissed with condescension by Castlereagh in his famous State Paper of 1820 about the "principles" of intervention by one European power in the internal affairs of another (in this case, the constitutional revolution in Spain). Great Britain, Castlereagh said, "is the last Govt. in Europe which can be expected, or can venture to commit Herself on any Question of an abstract character. ... This country cannot, and will not, act upon abstract and speculative Principles of Precaution."16 A second purpose of principles of security is to guide public opinion about policy, to suggest a way of thinking about security, or principles to be held by the people on behalf of whom policy is to be made. Castlereagh gave as the reason for his prudent "maxims" the peculiar circumstances of
r \ i ~ i l i ~ l i iWhat i ( ~ is Security?
5
British politics: "a System of Government strongly popular, and national in its character," and one in which "public opinion," "daily Discussion in our Parliament," and "the General Political situation of the Government" are of decisive importance for foreign policy." But public opinion is itself influenced by principles or concepts. Some crises are "intelligible" or recognizable to the public mind, in Castlereagh's description, while others are not, and the process of recognition is influenced by ideas about security. The quest for principles or epigrams of foreign policy has for this reason (among others) been of fairly consistent interest to nineteenth and twentieth-century statesmen, and to their intellectual adjuncts. Equilibrium was "Castlereagh's favourite word," according to J.A.R. Marriott.lx Even the idea of nuclear deterrence was most compelling as a popular idea; an idea which provided "reassurance," to use Michael Howard's term." A third, related purpose of principles or definitions of security is to contest existing policies. To dispute the foundations of policy is one way - an often effective way in a strongly popular system of government - to subvert public support for policies to which one is opposed. The interest in new concepts of security was thus encouraged, in the late 1970s and 1980s, by quite disparate groups. Critics of the North Atlantic Treaty Organization's (NATO) nuclear weapons policies, for example, questioned whether current deployments and doctrines provided security, even against the threat of nuclear war, and supported different and less confrontational policies (such as "confidencebuilding measures"). Other critics were opposed to all "offensive" military deployments. Yet others, particularly in the United States, favored domestic over international commitments; economic and environmental security were described as more fundamental objectives than military security, and expenditure on defense was compared to expenditure on other, civil (and often domestic) objectives. Thc politics of extended security is substantially different in the 1990s, in that it has engaged the theorists as well as the critics of military establishments. I f security is the objective of military and intelligence organizations, and if the sources of insecurity have changed in character (with the end o f the Cold War), then a condition for redefining the role of the "security forces" is redefining security: to contest old policies and to promote new ones. The fourth and crudest purpose of principles of security is to influence directly the distribution of money and power. A public interest organization concerned with environmental programs, for example, might hope that by promoting ideas of environnlental security, it would bring about a change in government policy such that less money was spent on military deployments, and more on environmental programs. A change in the objectives of policy from military to economic security would bring a change in government expenditure from ministries of defense to ministries of commerce or of foreign relations. A change in the definition of military security to include the prevention of conflicts by the deployment of peacekeeping forces would bring an increase, or prevent a decrease, in expenditure on military forces. The keenest proponents of extended security, in the 1990s,
6
Widening Security
include officials of organizations (such as the United Nations and its development agencies, or humanitarian, nongovernmental organizations) that would benefit from changes in international policy towards expenditure on civil objectives. They also include academics who have benefited from the fairly resilient support by US and European foundations for projects on extended security (including the projects for which this essay was prepared); several of these foundations, in turn, have had the objective of influencing or contesting existing security policies.20 The main concern of this essay is nonetheless with the first purpose of principles of security, as described above: with the naive, or naive idealist, position that principles, including abstract principles, do matter to international policy. Castlereagh himself, in speaking of the maxims of British prudence, was setting out the principles of a policy that repudiated abstract or systematic principles. Such principles are perhaps especially important to a government whose "general political situation" depends (in Castlereagh's words) on the "public mind." One of the presumptions of eighteenth-century liberal thought was that people tend to think in principles; Adam Smith suggested to statesmen that they "will be more likely to persuade" if they evoke the pleasure that people derive from beholding "a great system of public police."21As Friedrich Gentz wrote in 1820 of Castlereagh's memorandum, it was well suited to a government, such as England's, which "owes an account of its conduct to Parliament, and to a nation which is not satisfied with an order of business in the gazettes, which wants to know the why and the wherefore of everything ('le pourquoi du p o u r q ~ o i ' ) . " ~ ~ "Politics would be led into frequent errors, were it to build too confidently on the presumption, that the interest of every government is a criterion of its conduct," Gentz himself wrote a few years earlier. One reason was that "the true interest of a nation is a matter of much extent and uncertainty; the conception of which depends greatly upon the point of view in which it is contemplated, and of course upon the ability to choose the proper one." Another was the intertwining of the public and the private: "it must likewise be confessed, that even the immediate interests of states are oftener sacrificed to private views and passions, than is generally imagined."23There is a naive realism that is at least as misleading as the naive idealism of the unending search for principles, including principles of security.
What is Security? The idea of security has been at the heart of European political thought since the crises of the seventeenth century. It is also an idea whose political significance, like the senses of the word "security," has changed continually over time. The permissive or pluralistic understanding of security, as an objective of individuals and groups as well as of states - the understanding that has been claimed in the 1990s by the proponents of extended security - was characteristic, in general, of the period from the mid-seventeenth century to the
t
'
What is Security?
7
French Revolution. The principally military sense of the word "security," in which security is an objective of states, to be achieved by diplomatic or military policies, was by contrast an innovation, in much of Europe, of the epoch of the Revolutionary and Napoleonic Wars. But security was seen throughout the period as a condition both of individuals and of states. Its most consistent sense - and the sense that is most suggestive for modern international politics - was indeed of a condition, or an objective, that constituted a relutionship between individuals and states or societies. "My definition of the Smte," Leibniz wrote in 1705, "or of what the Latins call Respublica is: that it is a great society of which the object is common security ('la seurete c o m m ~ i n e ' ) . " ~ ~Montesquieu, or security was a term in the definition of the state, and also in the definition of freedom: "political freedom consists in security, or at least in the opinion which one has of one's security."" Security, here, is an objective of individuals. It is something in whose interest individuals are prepared to give up other goods. It is a good that depends on individual sentiments -the opinion one has of one's security - and that in turn makes possible other sentiments, including the disposition of individuals to take risks, or to plan for the future. The understanding of security as an individual good, which persisted throughout the liberal thought of the eighteenth century, reflected earlier political ideas. The Latin noun "securitas" referred, in its primary classical use, to a condition of individuals, of a particularly inner sort. It denoted composure, tranquillity of spirit, freedom from care, the condition that Cicero called the "object of supreme desire," or "the absence of anxiety upon which the happy life depends." One of the principal synonyms for "securitas," in the Lexicon Tucitcum, is "Sicherheitsgefuhl": the feeling of being s e ~ u r e . ' ~ The word later assumed a different and opposed meaning, still in relation to .. the inner condition of the spirit: it denoted not freedom from care but carelessness or negligence. Adam Smith, in the Theory of Moral Sentiments, used the word "security" in Cicero's or Seneca's sense, of the superiority to suffering that the wise man can find within himself. In the Wealth of Nations, security is less of an inner condition, but it is still a condition of individuals. Smith indeed identifies "the liberty and security of individuals" as the most important prerequisites for the development of public opulence; security is understood, here, as freedom from the prospect of a sudden or violent attack on one's person or p r o p ~ r t y . ~It' is in this sense the object of expenditure on justice, and of civil government itself." There is no reference to security, by contrast, in Smith's discussion of expenditure on defense ("the first duty of the sovereign, that of protecting the society from the violence and invasion of other independent societies")." The only security mentioned is that of the sovereign or magistrate as an individual, or what would now be described as the internal security of the state: Smith argues that if a sovereign has a standing army t o protect himself against popular discontent, then he will feel himself t o be in a condition of "security" such that he can permit his subjects considerable liberty of political "remonstrance."
"'
8
Widening Security
The security of individuals in this sense - the sense of freedom from the prospect, and thus the fear, of personal violation - has been of decisive importance to liberal political The word "security" in fact assumed a new public significance in the early, liberal period of the French Revolution. The natural rights of man, in Tom Paine's translation of the Declaration of the Rights of Man of August 1789, consisted of Liberty, Property, Security, and Resistance of Oppression. Security - or "szirete"' - was still a condition of individuals: it was a private right, opposed, during the Terror, to the public safety (salut) of the Committee for Public Safety. In Condorcet's outline of a new Declaration of Rights in 1793, "security consists of the protection which society accords to each citizen, for the conservation of his person, his property, and his rights." Security was conceived, still, in terms of freedom from personal attack; the constitutional scholar Alengry explained Condorcet's conception of security, in 1904, as "close to the Anglo-Saxon idea of habeas corpus."32It was to be ensured, henceforth, by society: by the "social pact" or the "social guarantee" of a universal civil society. The guarantee of security was extended, in the reform proposals of the same period, to include protection against sudden or violent deterioration in the standard of living of individuals. Leibniz had urged the rulers of Germany after the Peace of Ryswick in 1697 to turn, once the (military) "security" of their countries was ensured, to a project of social insurance against accidents, an "Assecurations-Casse"; a republic or a civil society, he said, was like a ship or a company, directed towards "common welfare."33 Condorcet's project of social security, almost a century later, had a wider political objective. The new schemes for social insurance, to be provided either by public or by private establishments, were intended to prevent misery by increasing "the number of families whose lot is secured," to bring about a different sort of society, or "something which has never before existed anywhere, a rich, active, populous nation, without the existence of a poor and corrupted class."34 The economic security of individuals was itself of political significance, as the condition for an active political society. The central idea of liberalism, in Judith Shklar's description, is that all individuals should be able to take decisions about their lives "without fear or favor."35 Fear, and the fear of fear, were for Condorcet the enemies of liberal politics. If people were so insecure as to live in fear of destitution, in his scheme, then they were not free to take decisions, including the decision to be part of a political society. Individual security, in the liberal thought of the Enlightenment, is thus both an individual and a collective good. It is a condition, and an objective, of individuals. But it is one that can only be achieved in some sort of collective enterprise. It is quite different, in this sense, from the inner and introspective security of Roman political thought. It is different, too, from the security with which individuals can be endowed, by a benevolent or charitable or humanitarian authority. It is something that individuals get for themselves, in a collective or contractual enterprise. The enterprise is in turn something to be endlessly revised and reviewed. Security is not good in itself, without regard to the process by which it is achieved. The state (together
Gothit
hitl
What is Security?
9
with powerful small collectivities such as guilds or communities, operating under the protection of the state) can be a source both of insecurity and of a security that is itself o p p r e s ~ i v e . 'Its ~ most important function is to ensure justice for individuals: "of all the words which console and reassure men," Condorcet wrote before the Revolution, "justice is the only one which the oppressor does not dare to pronounce, while humanity is on the lips of all tyrants." '' The new idea of security as a principally collective good, to be ensured by military or diplomatic means - the idea that came into European prominence in the period of the Revolutionary and Napoleonic Wars - was strikingly different. Individuals and states had been seen as similes for one another, at least since Grotius's earliest writings on natural rights; individuals were thought to security of states be like states, just as states were like individuals.'"he against external, military attack, too - the "Sicherheit" or the assecuratio pacis of the Miinster deliberations before the Treaty of Westphalia - had been a commonplace of political discussion in Germany throughout the eighteenth c e n t ~ r y . Herder '~ indeed spoke sarcastically, in 1774, of the continuing preoccupation with "Order and Security," with the security of Europe and the world ("Ordnung ~nzdSicherheit der Welt"),and with "Uniformity, Peace and Security" ("Einfonnigkeit, Friede und Sicherheit")."'But in France, as in England, the collective sense of the words "surett," "securite," and "security" was an innovation, most conspicuously, of the very end of the eighteenth century. It was in the military period of the French Revolution, above all, that the security of individuals was subsumed, as a political epigram, in the security of the nation. Rousseau described the social contract, much like Locke or Montesquieu, as the outcome of the desire of individuals for security of life and liberty: "this is the fundamental ~ r o b l e mto which the institution of the state provides the solution."" But the ensuing collectivity was itself like an individual, with a unique or individual will. International order - like war, in Kousseau's description - was a "relation between states, not a relation between men."" For Kant, both individuals and states seek "calnl and security" in law: in the case of states, in the public security ("iiffentlichen Staatsicherheit") of a cosmopolitan system.4zCondorcet himself, who was profoundly opposed to Kousseau's conception of a general will as the foundation o f political choice (and to his idea of national education to inculcate patriotic virtues), was caught up in the new rhetoric o f military security. He too spoke by 1792 of the security or "surett" of the collectivity: France would accept peace, he said, if it were compatible with "the independence of national sovereignty, with the security of the state."44 Paine's translation of the Declaration o f the Rights of Man in 179 1 can be seen, indeed, as one of the last great uses o f the word in the old sense. The great public uses of "security" in the new, national sense can be dated even more precisely. Before the Congress of Vienna assembled in 1814, the victorious Allies signed the First Peace of Paris with the newly restored King of France. In the words of the Treaty, France was once again to become,
10
Widening Security
under the "paternal government of its Kings," a guarantee of "security and stability" ("un gage de securite' et de stabilite'") for Europe. The object of the coming negotiations, the new French government stated at the formal opening of the Congress, was to "ensure the tranquillity of the world"; the epoch was now one in which the great powers had joined together to restore, in the "mutual relations of states," "the security of thrones" ("la stirete' des t r 6 n e ~ " ) . ~ "
International Security
The new security principles of the end of the twentieth century constitute a rediscovery, of sorts, of this late eighteenth and early nineteenth-century politics. One of the celebrated political metaphors of the post-Cold War period is Gunter Grass's, of the unfreezing of the germs of European nationalism, conserved for half a century in the ice of Cold War confrontation. But there is another, less biotic metaphor, in which it is the politics of liberal internationalism that has been unfrozen: not after half a century, but rather after two centuries of confrontation, between militant (and military) revolution and militant conservatism. "It was the Revolutionary power more particularly in its Military Character," Castlereagh said in 1820, that was for the Alliance the "object of its constant solicitude," and against which, exclusively, "it intended to take precaution^."^^ The identification of revolution with its military character, or with its prodigious and offensive military success - the memory of Custine's and Napoleon's armies, and the transposition of this memory into the identification of Revolutionary France and Soviet Russia - has been a continuing preoccupation of subsequent politics. It is only with the final disintegration of Soviet military power, or rather with the disengagement, in the early 1990s, of Russian military power from the Soviet rhetoric of revolution, that the long militarization of continental political confrontation has come to an at least temporary end. It was "the problem of peace and war," for Franqois Furet, that in the course of the French Revolution "prohibited, in people's minds and in events, any liberal solution to the political cri~is."~' The political prospects of 1791 are poignantly incongruous in the retrospect of two centuries of militarized or militaristic revolution: the proposed governments, for example, in which Condorcet was to be Minister of Finance, and Talleyrand Minister of Foreign affair^.^^ But the liberal solutions envisaged in the early 1790s are perhaps more convincing now, at least in international relations, than they have been for much of the intervening period. This seems to be the opinion, in any case, of liberalism's opponents, if not of its (characteristically) muted supporters. "Liberalism is the real enemy" was the title of an article in 1992 by the English conservative critic Peregrine Worsthorne, in which he recounted the "regimental reunion" in East Berlin of "the remaining old guard of Encounter": the conclusion, he said, was that "worrying about communism intellectually - as against militarily - was a gigantic red
i\ i
What is Security?
II
herring, deflecting intellectual attention from liberalism, which was a much more dangerous enemy of ~ivilisation."~' The two principal constituents of "human security" or "common security" in the 1990s - the insistence on human rights and the preoccupation with the "internationalization" of politics - were also the preoccupations of late Enlightenment liberalism. For Janos Kis, t o describe something as a question of human rights is to identify it as of concern to the international community: "as human rights of a particular kind, minority rights belong under the protection of the community of nations.""' "Our policies - foreign and domestic," Vaclav Havel says, "must grow out of ideas, above all out of the idea of human rights."" The opponents of such policies present then1 as the outcome, or last hurrah, of a half century of Western hegemony, of the epoch that began, for one leading political figure in Singapore, with the imposition on a temporarily powerless international society of the Universal Declaration of Human Rights of 1948." But the human rights of 1948 are also the rights of the American and French Revolutions, or what Condorcet, speaking of the influence of the American Revolution in Europe, described as "the natural rights of humanity." These rights hegin with "the security of one's person, a security which includes the assurance that one will not be troubled by violence, either within one's family or in the use of one's faculties," and proceed, through "the security and the free enjoyment of one's property," to the right of political participation.i3 The new political rhetoric of human security in the 1990s is also the old rhetoric of natural or international rights. The politics of "internationalization," in the post-Cold War period, is also oddly evocative of older political discussions. One o f the preoccupations of liberal thought in the late Enlightenment was with the extension of rights to individual security, or rights of humanity, to individuals who were not citizens of the state in which the rights were being asserted: to women, to children, and to the propertyless and dependent within the territory of the state. Laborers, shop assistants, or women, in Kant's account, could not be citizens or "co-lawmakers." But they were nonetheless free (as human beings) and equal (as subjects); they were entitled to the protection of law as "co-beneficiaries," or partners in protection.'" The next stage, in this extension of rights, or at least of the right to protection, was its further enlargement to individuals outside the state or political territory. If the public security of the state, in Kant's phrase, was to he achieved only in a cosmopolitan ( a "tueltburge~lichen") system, then individuals in one state must be co-citizens or co-partners, in some sense, with individuals elsewhere. The international politics of individual security was indeed seen, much as it has been seen in the 1990s, as the consequence of an exorable "internationalization" of political, economic, and social life. If one thinks of the half century from the 1770s to the 1820s as a single epoch - the epoch of Condorcet and Talleyrand, for example, and not the epoch in which the Revolution "cut time in two" -then it was a period of intense interest in new international relationships of different sorts."" It was a time, for example, of
12
Widening Security
tremendously increased information about events in other countries, and of quite self-conscious reflection on the political consequences of this inform a t i ~ n The . ~ ~ dissatisfaction of the English public with cursory official gazettes - their interest in "le pourquoi du pourquoi" - was an essential element in Castlereagh's politics, as Gentz wrote. In Germany, too, the last quarter of the eighteenth century saw an explosion of journals concerned with "the internal affairs of states and with international relation^."^' Condorcet himself spent much of the Revolution as a journalist, for which he was excoriated by Robespierre: "hack writers hold in their hands the destiny of peoples," Robespierre said, and Lafayette, supported by Condorcet, would have risen to power surrounded "by an army of journalists," and lifted on "a pile of p a r n p h l e t ~ . " ~ ~ A second preoccupation was with the increase not only in international information - the knowledge that people in one country had of events in other countries - but also in international influence. The actions of people in one country actually caused events in other countries. Herder, in his denunciation of the international culture of information (what he described as the "Papierkultur!"), spoke of the "shadow" of Europe over the entire world, and of the "power and machines" of modern times: "with one impulse, with one movement of the finger, entire nations can be c o n v u l ~ e d . "It~ was ~ not only princes and sovereigns who exercised new, distant influence, but ordinary citizens (or ordinary trading companies) as well. "The prodigious increase of the commercial and colonial system in all parts of the world," Gentz wrote, was the most significant development "in the political world since the Treaty of Westphalia." It had transformed continents, and it also transformed Europe itself: "it has even been the groundwork in the interior of states, of a great revolution in all the relations of society."60 A third concern was with the increased effectiveness, in international relations, of official policy. Castlereagh concluded that the Spanish crisis of 1820 did not constitute "a practical and intelligible Danger, capable of being brought home to the National Feeling," and was not sufficient, therefore, to justify military intervention by the British. But he emphasized that Britain could indeed have undertaken such an effort if she had wished to do so. Britain had "perhaps equal power with any other State" to oppose an intelligible danger: "she can interfere with effect."61 One source of this new power was Britain's own military superiority, following the defeat of France. But for other states, too, the possibilities of international interference were greatly increased. Condorcet, looking ahead in 1792 to the formation of an independent federation of small German states, pointed out that new canals would make possible the rapid movement (if requested for the defense of the new federation) of "troops" and "munitions" from France. He also foresaw a fearsome world of multiple military interventions: "There would be no more freedom or peace on earth, if each government thought it had the right to employ force to establish in foreign countries the principles which it considers to be useful to its own interest^."^^
The fourth and most evocatively modern concern was with the increased scope of international politics itself. Castlereagh insisted on the intelligibility of international problems as a precondition for international interference - on the requirement that they should mean something to what he describes repeatedly in his state paper as "public sentiment," "public opinion," "the public mind."h' To have information about some foreign event is a necessary condition, evidently, if an individual (or "the puhlic") is to recognize that event as being of political importance. To have the possibility or power to "interfere with effect" is also necessary; political obligations, like moral obligations, are bounded by the limits of the possible, or of what Castlereagh called the practical. TO have the sentiment that one stands in some sort of causal relationship to the event in question - the relationship of influence, for example - is of further political importance. We are inspired to passion, Hume said, by that which "bears a relation to us" or is in "some way associated with us"; "its idea must hang in a manner, upon that of o ~ ~ r s e l v e s . " ~ ~ The societies for the abolition of slavery in the 1780s and 1790s Condorcet's Awzis des Noirs, for example, in which the pamphleteer William Playfair saw "the first step" to revolution - provide a good illu~tration.~' Slavery, even outside the colonial territory, was recognized as a political problem by British and French public opinion in part because it was so evidently related to British and French policy, to British and French laws and commerce, and even to the tastes of British and French consumers (the taste for sugar, which British abolitionists - or "Anti-Saccharites" - refused in one of the first political revolts of modern c o n s u ~ n e r s )This . ~ ~ recognition of the political in~portance,or at least of the political intelligibilit): of the destinies of distant individuals was indeed a principal indicator, in some of the greatest liberal thought, of political enlightenment itself. "The spectacle of a great people where the rights of man are respected is useful to 311 others," Condorcet wrote in his observations o n the influence of the American Revolution in E ~ ~ r o p e : "It teaches us that these rights are everywhere the same.""' Kant used the same image of a spectacle, a few years later, in speaking of the French Revolution. An "occurrence in our own times," he wrote, has revealed a view "into the unbounded future." The occurrence was a disposition; it was the sympathy of disinterested spectators for the French Revolution, in which "their reaction (because of its universality) proves that mankind as a whole shares a certain character in c o n ~ m o n . " " ~
Extended Security and Extended Policies The obvious shortcoming of the new ideas or principles of security of the 1990s, as was suggested earlier, is their inclusiveness: the dizzying complexity of a political geometry ("tous azinzttts") in which individuals, groups, states, and international organizations have responsibilities for international organizations, states, groups, and individuals. This inclusiveness,
14
Widening Security
or incoherence, was also a characteristic of the earlier liberalism of international (and individual) security. One much discussed problem was that of psychological incoherence. If the individual is expected to recognize the rights of all other individuals, however remote, then she may disregard other, less remote individuals, or find herself so overburdened by the process of (political) recognition that she does nothing about anything: this is the old charge against liberalism (Edmund Burke's charge, for example), of coldness, or irresolution, or both. The second and more serious problem is of political incoherence. The principal connotation of individual security in modern political thought, as has been seen, is as a relation between the individual and the state: security is an objective of individuals, but one that can only be achieved in a collective or political process. Even the idea of national or state security, in the sense that became widespread after 1815, refers to a collective process in which the participants are themselves states: the Westphalian settlement, or Kant's cosmopolitan federation, or the equilibrium of Europe. But the "human security" of the new international principles seems to impose relations that are only tenuously political. The security of an individual in one country is to be achieved through the agency of a state (or a substate group, or a suprastate organization) in another country. The individual is thereby very much less than a co-lawmaker, in Kant's sense, in the political procedure that ensures security. She is less, even, than a co-beneficiary (like a wife or a shop assistant); she is not even a partner in being protected. The nonpolitical character of the new principles poses evident problems. To have a right means very little, in the liberal political theory with which we have been concerned, if one is not conscious of the right. Adam Smith, like Hume, criticized the theory of a tacit or original contract for individual security on the grounds that it ignored the consciousness of individual political subjects: "they are not conscious of it, and therefore cannot be bound by it."69 For Condorcet, if individuals were not conscious of their rights, or did not understand them, then their rights were not "real"; this was one of his princiBut the beneficiaries of the pal arguments for universal public instr~ction.'~ new international policies are not especially likely to be conscious political subjects in this sense. The individual who is "troubled by violence" does not know who to ask for protection (which agency of the United Nations, which nongovernmental organization, and in what language?), and she has no political recourse if the protection is not provided. The interposition of poorly understood and only incipiently political rights is even more insidious, in some circumstances, if the assertion of a new international right has the effect of subverting a local and potentially more resilient political process. One of the charges made against the humanitarian policies of the 1990s is indeed that by depoliticizing procedures of emergency relief, they tend to subvert the local politics in which individual subjects are conscious participants, and which constitutes the only consistent source of continuing security.71 My suggestion, nonetheless, is that the new policies of individual and international security are likely to be a continuing feature of politics in the
I
1st
I
What is Security?
15
post-Cold War period. The effort to make sense of them, and in particular to make them less inclusive, is thereby of continuing importance. The changes that led in the late eighteenth century to a new preoccupation with internationalization - the increase in news, in economic and cultural interdependence, in the effectiveness of international intervention, and in the consequent political recognition of distant events - are also the preoccupations of the end o f the twentieth century. There is very little, still, that corresporlds to an international politics in which distant individuals are co-citizens, or coparticipants. But there is an international political society, of sorts, and it imposes some form of reflection on the principles of international justice. Policies for the prevention of violent conflict provide one illustration. The idea of the prevention of nuclear war, as distinct from the deterrence of nuclear offense, was of central importance to the Palme Commission's idea of common security. A similar distinction can he made now between the cooperative enterprise of prevention and the frightening or forceful enterprise of deterrence: the deterrence of injustice or insecurity, or the enforcement of rights. The discussion of new policies for collective security has been concerned to a considerable extent, since 1991, with principles of "intervention": with the circun~stancesunder which (in Condorcet's terms) governments should employ force to establish principles in foreign countries. If there are well-trained international forces, it is argued, prepared to intervene at the early stages of crises, then military conflicts will he less likely to begin; if conflicts do begin, they will end earlier and with less ~ i o l e n c e . ~ This ' is deterrence, of a new, enlightened, and internationalist complexion. But it is not the same enterprise as prevention, or as the effort to ensure, whether with military or nonmilitary instruments, that there will be no need to intervene. One of the distinctive characteristics of prevention is that it takes place under conditions of imperfect information, or before one knows with certainty that a particular conflict (or a particular disease, in preventive public health) will occur. This makes it a very difficult objective for international cooperation. It is easier, often, to agree that a particular international problem is intolerable - that something must be done about it - than to agree either on predictions as to the probability of future problems, or on general principles of international policy. There are different explanations for the interest of people in one country in "doing something" about injustice or insecurity in other countries: that the problem is something they know about, for example; that it is something they care about or identify themselves with; that there is something they can do about it. But these explanations, or criteria, are difficult to describe in a circumstanceless, universal idiom. One does not know that one cares about something, or reflect on what one has it in one's power to do, until one knows about some particular injustice or crisis: until the crisis, that is to say, has already been described, or until (as Castlereagh said) it is no longer a question of venturing to commit oneself on an "abstract" question, and there is something "intelligible and practicable" to be done. It is particularly difficult, therefore, for countries to agree in advance o n the "resort to force" by the international community. As Castlereagh also
16
Widening Security
said, of the prospect of "unanimity and supposed concurrence upon all political subjects" among the allies of 1820, "if this Identity is to be sought for, it can only be obtained by a proportionate degree of inaction in all the state^."'^ There is thus no evident relationship between the extent of consensus about a particular military intervention and the efficiency of the intervention in question. It is indeed often much easier to intervene efficiently at a very early stage in a conflict, or when there is considerable uncertainty about its future course; it is much more difficult, at that stage, to agree that intervention is needed. The choice or use of nonmilitary instruments is, under these circumstances, of considerable importance. It is difficult to conceive of agreeing, in advance, to have military force used against one. This was one of the (several) unconvincing features of early post-World War I1 schemes for international government, in which recalcitrant participants were to be sanctioned by the punitive use of force, including nuclear weapons. It is less difficult, perhaps, to agree on less coercive policies. National states do not, after all, rely only or even principally on the use of force to ensure security for their citizens. The incipient international society, too, should have recourse to civil policies for preventing conflict. Nonmilitary policies can be constructive as well as coercive. They include, for example, policies for recognizing (or refusing t o recognize) new sovereignties. Recognition can be made conditional on guarantees for individual rights, including the rights of members of minorities and other groups; countries can agree in advance to give themselves a space for reflection, of the sort that was missing in the early stages of the current Balkan crisis, at the time of the European Community countries' decision to recognize Croatia in 1991. They can also agree on policies to support individual rights, as distinct from punishing violations of these rights. These are policies in which people in the countries where rights are at risk are co-participants with people elsewhere. It is expensive, in many cases, to guarantee minority rights, to build schools in which children can be educated in their first language, or to provide trilingual education for all children. Such policies could also pose familiar problems of "moral hazard" (in that they would tend to reward countries in which the rights of minorities are thought to be at risk). But international expenditure on education is nonetheless an important component of policies for individual security. It would be in the spirit of the plans of the 1780s and 1790s: of Condorcet's project of public instruction, for example, in which children would be instructed in their own language, in an international lanThe international society guage, and in a third language of local imp~rtance.'~ of the 1990s should be in a position, eventually, to provide material support for these old liberal projects. Policies for demilitarization provide a related illustration. The new security principles have been presented, since the end of the Cold War, as especially suited to a period of postwar reconstruction. The problems of demobilization in the 1990s are indeed similar to, and in some respects even more serious than, those of earlier peace settlements. The period of intense economic (and political) mobilization lasted for about four years in World
.. r l
i
What is Security?
17
War I, for about seven years before and during World War 11, and for twenty-three years, intermittently, during the Revolutionary and Napoleonic Wars; the Cold War mobilization lasted for more than forty years, and it is correspondingly difficult to undo. But in other respects the present postwar period is strikingly different. The Cold War was indeed a long international conflict, but it was not a conflict that ended in the exhaustion, celehration, and revulsion from rhc use of military fol-ce that was characteristic of 18 1.5, I91 9, and 1945. The God of War is defeated in Descartes' ballet of 1649, and the personification of Earth, whose limbs have been torn apart in an early scene, reappears restored and renewed. The Cold War has been followed, in contrast, by a rediscovery of military force - by a demobilization of certain (principally nuclear) forces, and by remilitarization of international relations. On the one hand, the military forces of the two superpowers are more "usable" (in the Gulf, or in Chechnya). On the other hand, military conflicts within or between other, lesser powers are uninhibited by the prospect of an eventual superpower confrontation. The promise of the end of the Cold War has been understood, since the earliest negotiations for nuclear disartlianient, as the promise of a world of peaceful political competition." It is the demilitarization of the long conflict between a proto-revolutionary "Left" and a proto-reactionary "Kight" that has made possible the revival of liberal internationalism. But the post-Cold War conflicts have turned out to be at least as violent as the many snlall wars of the previous generation. They are newly visible to (Western) public opinion, at least in the case of the wars in Croatia and Bosnia; they constitute a new challenge to the incipient institutions of international order in that they have demonstrated the powerlessness of even a relatively united international cornmunit); undivided by the superpower competition. The process of demilitarization is, under these circumstances, of high priority for policies of human, individual, o r common security. It is of particular importance in states that are themselves at peace, but that are the source of means of violent destruction elsewhere. lnclividuals in Russia, the United States, France, or the United Kingdom "bear a relation" to distant wars (in Hunie's phrase) in that they are residents of states that license or encourage very large-scale arms exports. One way to make conflicts less violent is thus to sell and produce less military equipment. Both Somalia and the fornier Yugoslavia have been important locations, for many years, of military-industrial transactions. Yet the effort to reduce transfers of conventional arms is of strikingly little political interest in the post-Cold War world. "The right inherent in society to ward oft crimes against itself by antecedent precautions," for John Stuart Mill, included a right to impose precautions on the sale of articles, such as poisons, of which both proper and improper use could be made (or which are "adapted to be instruments of crime"). The seller, he says "might be required to enter in a register the exact time of the transaction, the name and addrcss of the buyer, the precise quantity and quality sold; to ask the purpose for which it was wanted, and record the answer he re~eived."'~There are similar precautions in 7
18
Widening Security
respect to articles that are adapted to be instruments of war: they should be an important component of government and other groups' policies for international security.
Civil Society Strategies The most troublesome illustration of the new policies has to do with nongovernmental organizations, or with what has been described rather grandly as the "civil society strategy."77The dislike of government power has been at the center of all liberal thought. Its "historic beginning," in L.T. Hobhouse's description, is to be found in protest, even in "destructive and revolutionary" protest, against the "modern State."78 Condorcet's idyll, at the height of his revolutionary career in 1792, was of the "virtual non-existence" of government, or of "laws and institutions which reduce to the smallest possible quantity the action of g ~ v e r n m e n t . "This ~ ~ dislike has been accompanied, for many liberals, by a liking for that which is not government, and in particular for elective or voluntary associations, for the "professions," "divisions," "communities," and "callings" that the not notably liberal Adam Ferguson (The electiveness, described in his Essay on the History of Civil So~iety.~~' at least for early liberals, was more important than the nonidentity with government. For Adam Smith, as for Turgot and Condorcet, the coercive nongovernmental organizations of the eighteenth century - apprenticeship guilds and corporations, for example - were even more insidious than government itself.81) Relations between nongovernmental organizations (and nongovernmental individuals) have been of central importance to the internationalization of political life in the late twentieth century, as in the late Enlightenment. The increase in news and information is the work of nongovernment, of very large private companies, very powerful individual proprietors, professional societies with their codes of conduct, public relations companies, and so forth. So also, to a great extent, is the increase in economic and cultural influence. The power of individuals in one country to cause economic and social change in other countries is the work of private companies (including the companies that export military equipment) far more than of governments: much as it was, indeed, at the time of Grotius's defense of the (Dutch and English) view "that private men, or private companies, could occupy uncultivated territory."s2 The increased effectiveness of policy is itself a characteristic of the policies of nongovernmental organizations as much as of governments and international organizations. There are private organizations who negotiate cease-fires and hostage exchanges: private charities (and large airlines) deliver emergency humanitarian relief, and compete with government agencies for public (or government) funding to do so. The novel aspect of nongovernmental organizations in the 1990s is their new political self-consciousness, or self-importance - the beginning of a
,I
1
What is Security?
19
political theory of the "NGO." The nongovernmental organization is identified, in such a theory, as the uncorrupt, the uncynical, or the unbureacratic. Relations between individuals in different societies - including the relationship between recipients and donors of foreign assistance - are supposed to be conducted, wherever possible, through NGOs rather than through governments (even when the NGOs are licensed by. governments, funded by . governments, and organized b y past and future government officials). Thc "civil society strategy," in this setting, consists of the effort to organize international relations o n the basis of exchanges hetween organizations. It "assumes that formal democracy is not enough." Its objectives include "funding independent media" as well as "judiciary and police," "developing charitable and voluntary associations," and "developing nongovernmental At its most specific, it involves matechannels" for government as~istance.~' rial support from private foundations in the United States to voluntary organizations and professional societies in Kussia." At its most imposing, it involves the effort "to provide more space in global governance for people and their organizations - for civil society as distinct from g o v e r n n ~ e n t s . " ~ ~ The new international politics of civil society, like the politics of individual security, is founded on old and important political ideas. The most profound of these ideas, and one that has been conspicuous in all the great peace processes of the twentieth century, is the idea of multiple, overlapping identities. The engagement of individuals in organizations, professions, clubs, and societies has been seen, at least since Montesquieu, as a principal sign of civilized and peaceable political life. For Turgot the characteristic "of being citizens" was to be found, above all, in the "free associations" or "societies" of which "England, Scotland and Ireland are full."x" This peaceable citizenship was thought to provide some sort of security, in turn, against international conflict. E. H. Carr spoke hefore the end of World War I1 of "a system of overlapping and interlocking loyalties which is in the last resort the sole alternative to sheer totalitarianism." His "social" or "functional" internationalism was to be founded on what was earlier (and later) described as civil society: "local loyalties, as well as loyalties to institutions, professions and groups must find their place in any healthy society. The international community i f it is to flourish must admit something of the same multiplicity of authorities and diversity of loyal tie^."^' World War I, too, was a period of anxious reflection on the politics of civil society. Leonard Woolf, in a report p r e p r e d in 1916 for the Fabian Society, saw in the "extraordinary and novel spectacle" of international voluntary associations the prospect of "true International Government." The increase in such organizations, some of which (like the "Association Internationale pour la Lutte contre le Chbmage") included as their members "states, municipal authorities, private individuals, and every sort and kind of national group, society, and association," corresponded to the newly international life of the nineteenth and early twentieth centuries. Woolf wrote that "A man's chief interests are no longer determined by the place he lives in, and group interests, instead of following geographical lines, follow
20
Widening Security
those of capital, labor, professions, etc." Like Gentz, a century earlier, he looked with some coolness at the assertion of national interest: "Over and over again, when we analyze what are called national interests, we find that they are really the interests, not of the national, but of a much smaller group." The geometry of the new international security, as in the 1990s, was to be distinctively variable. In the association against unemployment, for example, Woolf found "both forms of representation, the vertical or national and geographical and the horizontal or international, provided for."88 Woolf describes himself as trying to edge away from the "terrible precipice of Utopianism" (or from what Carr, during the next world war, identified as the "idealistic view of a functional internationalism," which "would be utopian if it failed to take account from the outset of the unsolved issue of power"). He concedes that the delineation of the "international" is a matter of practical politics, and he takes as an "actual example" the situations of "the Bosnian" and of "the Englishman" in Ireland: "it is impossible to say exactly when the Balkans became, and when Ireland will become, an international question."89 But his own political ideas, of the reinforcement of the "system" of international conferences to protect the security of national minorities, and of international cooperation to protect the economic security of individuals and groups, were themselves put into a sort of practice in the postwar settlement. One of the principal themes of reconstruction after World War I, in the words of the Peace Treaty, was to prevent "such injustice, hardship and privation to large numbers of people as to produce unrest so great that the peace and harmony of the world are imperilled"; the decision of the Great Powers to begin their Versailles deliberations by considering international labor legislation "produced a degree of surprise that almost amounted to bewilderment." The idyll of multiple, minimal identities is of poignant importance to European political thought. It is described elegiacally in Robert Musil's description of the "negative freedom" of "Kakania," or of the AustroHungarian Monarchy of 1913: "the inhabitant of a country has at least nine characters: a professional, a national, a civic, a class, a geographic, a sexual, a conscious, an unconscious, and possibly even a private character to boot. He unites them in himself, but they dissolve him. ... This permits a person all but one thing: to take seriously what his at least nine other characters do and what happens to them."9' But the innocuousness of the unserious is too slight, in the end, as the foundation of civilized life. Musil's prewar world is also the world of which Freud wrote in 1915 in "Thoughts for the Times on War and Death" that its loss was the source of "our mortification and our painful disillusionment." "The citizen of the civilized world," Freud said, must now "stand helpless in a world that has grown strange to him," with his great European fatherland disintegrated and "his fellow-citizens divided and debased." "We hqd hoped, certainly, that the extensive community of interests established by commerce and production would constitute the germ of ... a compulsion" towards morality, Freud
said of the civil society of the prewar world; he found, instead, that "nations still obey their passions far more readily than their interests. Their interests serve them, at most, as rutionalizutions for their passions."" The elective institutions of civil society were not enough, in the 191Os, to prevent the violent enmity of war, and they are not enough, in any liberal theory, to ensure the security of individuals. The new political theory of the NC;O - the self-identification of nongovernment groups as the privileged source of human or individual security - is in this respect particularly odd. The organizations that constitute international civil society can play many important political roles. They can provide the international (and local) information that is at the heart of the new politics of security; they can cooperate in the schools, museums, and rights organizations that contribute to policies for preventing violent conflict; they can put pressure on governments to reduce arms production and exports; they can make possible the process of international political discussion, which is a precondition for international politics. But one of the things they cannot d o is provide security. The essential characteristic of security is as a political relation, which is not voluntary, between the individual and the political conimunity. Security (or the opinion of security, in Montesquieu's account) is the condition for political freedom. But it is the political choice to live under the rule of law that is in turn the condition for security. The doubting mood of the late Enlightenment tends to make one skeptical, in general, of the presumption that NGOs are preternaturally otherregarding or uncorrupt. Adam Smith reserved his coolest dislike, and his most cheerful demonstrations of hidden self-interest, for the ostentatiously publicspirited: parish overseers, university teachers, or Quaker slave-owners. The new principles of security of the 1980s and 1990s have been put forward with special enthusiasm by NGOs, and they are consonant with the not particularly hidden self-interest of these organizations. The "civil society strategy," too, can be seen as the outcome of a coalition between governments that wish to disengage from foreign assistance (despite the opposition of suhstantial minority opinion) and organizations with an interest both in improving other people's lives and in their own advancement. " NGOs are also, of course, a kaleidoscopically heterogeneous politic:11 form. "Independent media" are identified as a suitahle object of support in a civil society strategy, and the presumption (in the case of assistance to the former Soviet Union) is that they are to be independent of the state. Rut are they also to be indcpendent of large international oligopolies? O r of large and powerful proprietors? "War between two nations under modern conditions is impossible unless you get a large number of people in each nation excited and afraid," Leonard Woolf wrote in 1916.94 News media, dependent and independent, are rightly thought (as Chndorcet thought, and as Robespierre denied) to constitute the core of a free civil society. They play a central role in (for example) the prevention of famine. But they play a central role, too, in the frightening process whereby very large numbers of people become excited and afraid.
22
Widening Security
The main objection to NGOs as a source of security is even more foundational. It may be reasonable to assume that individuals in NGOs are more public-spirited, in general, than individuals in the public or the private forprofit sector (if only because of the relentless vilification of public service in the 1980s and 1990s, and the similarly relentless glorification of the pursuit, within the private sector, of individual profit). But the serious problem with the new political theory of NGOs has very little to do with the psychological circumstances of individuals. It is a political problem, and it follows from the defining characteristic of the NGO as a voluntary organization. There is a stark inequality of voluntariness, in particular, between the "donors" and the "recipients" of security. An international relief charity operating in the zone of a civil war or a distant famine, for example, is made up of individual volunteers (including people who have volunteered to be employed at low salaries) and funded by voluntary contributions (including voluntary contributions, from governments, of tax revenues). The individuals who receive relief are in circumstances of the most extreme lack of voluntariness; they are as far as one can be from the self-sufficiency of the individual will that is at the heart of, for example, Kant's political theory. The oscillation between the public and the private is a continuing and prized quality of civil society. The new, multiple woman of late twentiethcentury political thought (the new mulier civilis) is a doctor, let us say, as well as a Belgian, a Protestant, a volunteer, a mother, a member of an international organization, a Walloon, a professional in private practice. Her theory, above all, is to be found in Albert Hirschman's Shifting Involvements, with its evocation of public action, overcommitment, and private disappointment.95 But the richness of her public life is juxtaposed, under certain circumstances, to the impoverishment of politics in very poor countries (or even in very poor parts of rich countries). African Rights, in its harsh criticism of international "humanitarianism" in Somalia, contrasts the public accountability of official agencies with the voluntariness of NGOs: "while agencies such as UNICEF and WHO have a duty to be present, the presence of NGOs is a privilege." The relationship between people who provide and people who use "social services and health care" is thus one of "goodwill" rather than of "contract." Individuals become "passive recipients" of charity, and they are thereby made even more insecure: "the insecurity of the relationship that results can also undermine the effectiveness of the p r ~ g r a m m e . " ~ ~ The resilience of the metaphor of the political contract is associated, in eighteenth-century liberal thought, with the implied equality of the contracting parties, with the circumstance that the parties to the contract or agreement are all more or less the same sort of men, whose "intentions" and "reasonable expectations" can be the subject of reasoned di~cussion.~' The earlier world of "status" (or of security as something to which one is entitled by virtue of one's status) was a world in which men were unequal by their birth. In the imagined world of Condorcet and other late eighteenthcentury liberals, men and women are equal at birth, and their subsequent equality as reasoning parties is made possible by public instruction. This is
I
1
i
What is Security?
23
enlightenment in the most literal sense, or freedom from the darkness in which one cannot see through other people's intentions. But the world of "goodwill," or of security as something that people enjoy not through status, and not through contract, but rather through the good offices of civil society, is inimical to this politics of enlightenment. The insidious characteristic of guilds, for Adam Smith, was that they were protected by "public law," yet were impervious to public scrutiny. Only a beggar, he said, "chooses t o depend chiefly upon the benevolence of his fellow-citizens." y8 The international civil society, in a liberal theory of this sort, is a source of enlightenment, civility, or of the investment in schools and museums that might tend to prevent conflict, hut not of individual security. To the extent that civil society and the politics of states (or empires) are opposed to each other, as strategies or as models of postwar reconstruction, then security, both individual and collective, belongs to the domain of the political. "Civil society and markets alone did not assure the stabilization of Western democratic societies after 1945," as Charles Maier has said, and "they seem increasingly unlikely to do so after 19X9."Y' They are even less likely to assure the invention of democratic society, or the common security of individuals.
Free a n d Equal Discussion
Liberalism is a political theory, not an idiom of political discussion. The word "liberalism," according to Judith Shklar, "refers to a political doctrine, not a philosophy of life. ... Liberalism has only one overriding aim: to secure the political conditions that are necessary for the exercise of personal freedom.- loo The new politics of individual security (of "personal security" for Boutros Boutros-Ghali) is in this sense a perfectly liberal enterprise. It is most new, and most odd, in its international extent, in its insistence that the persons whose freedom is to be secured include very remote persons, or political foreigners. The liberal wishes to secure certain political conditions for himself, and for persons whom he recognizes to be co-participants in a political enterprise (to be the same sort of men). The international liberal has the same objective, but he recognizes the oddest sort of people - here, there, and everywhere. It has been suggested that the "civil society strategy" is an insufficient source of individual security because it is insufficiently political. The civil society is (by self-definition) norgovernmental; individual security is (by the definition of liberal political theory) both the objective of and the justification for government. The civil society is the domain of the voluntary; individual security is the justification for coercion. But the nongovernmental society is itself of notably increased political importance in the post-Cold War world. The new political theory of the NGO is indeed the assertion of a new politics: the assertion that the "we" of civil society, or the nongovernmental and the noncoercive, is a constituent, and even a defining constituent of political life.
24
Widening Security
The presumption of this essay has been that the idea of an international politics is, if not straightforward, at least recognizable in a general sense. But the connotation of the political - and thereby of the "political conditions" that Judith Shklar refers to as the overriding aim of liberalism - is the subject of familiar, persistent disagreement. In one sense, the political is indeed the domain of organizations, individuals, and their political discussions. This is the sense asserted in the new theories of civil society; it is Cicero's sense, too (or one of Cicero's senses), of society as a place of teaching, learning, communicating, discussing, and reasoning, and of citizenship as a matter of public places, temples, streets, laws, voting rights, friendships, and business contracts.lOl In a different sense, however, the political is the domain of formal (and coercive) political arrangements, of the "formal democracy," which in the civil society strategy is "not enough," and of the state more generally, with its laws, treaties, and declarations. In a further sense, the political is the domain of political power, or the extent of what states can do, or can arrange to have done. A great deal of modern political thought is concerned, as it was between the 1770s and the 1820s, with the relations between these three domains: with the circumstance that the different domains of politics are not coextensive, but change in extent over time. The fundamental characteristic of the state is as the location of political homogeneity; the nation is defined by homogeneity of birth, race, blood, culture.102But political homogeneity is a matter of (political) culture, of discussing and reasoning, as well as of formal political arrangements. The extent of political power is very much less than the extent of formal political arrangements, for some states, and very much greater for others. Condorcet's prospect of governments that impose principles by force in other countries was made possible by the new political power of several European governments. This power had rather little to do with formal political engagements. It was instead a consequence of technologies (such as canals), economic circumstances (such as the power to raise taxes or borrow money), and political and military conditions (such as the absence, at the time, of powerful opponents). Castlereagh proposed to limit Britain's policies of intervention - her ~oliciesbeyond the domain of formal political arrangements - to the "intelligible and practicable." The intelligible corresponds to the political in Cicero's sense, of the subject of discussion and concern within a political society. The practicable is the political in the sense of present power, or of that which corresponds to the circumstances of political power, at the present time and as understood by the presently powerful. The great liberal theory of the nineteenth century assumed a more orderly relation between these three domains of the political. John Stuart Mill argued, in support of "free and popular local and municipal institutions," that "the management of purely local business by the localities" should be subject only to the most general superintendence by "general government," including the provision of information and the residual power of "compelling the local officers to obey the laws laid down for their guidance"; the result should be "the
greatest dissemination of power consistent with efficiency." Formal political arrangements were to be organized in an orderly hierarchy of interests and duties, and the domain of these arrangements was co-extensive with the domain of political power. The wider political culture, too, was both influenced by and an irlfluence on formal political arrangements. Mill was uncompromisingly opposed - and in this he followed closely Condorcet's arguments on public instruction - to the idea of political education. But he saw in the practice of local politics the source of the "llabits and powers" that are the foundation of a "free constitution." "" Mill's conception of political order has been o f profound importance to subsequent liberal thought. It is even reflected, in the European law of the 1980s and 1990s, in the idea of "subsidiarity." There is an orderly and liberal core to this turgidly obscure notion: there are different levels of government, of differing generality, and each political function is to be undertaken at the lowest (or least general) level that is compatible with efficiency or practicability.'""t is this hierarchy of political processes that has broken down in the new international politics of the 1990s. There are two reasons, in English political thought, to respect some version of the principle of subsidiarity. One is the Burkean or historicist respect for convention; certain functions have in the past been performed by certain levels of government, and the costs o f constitutional change are likely to be prohibitively high. The other, which is closer to Mill's, is founded o n reason: the functions of government should be subject to continuing review in the light of changing circumstances, and they should be assigned to the least general level that is efficient in these conditions. The rationalist view of subsidiarity is the more compelling one. Rut it imposes an unending reflection on constitutional principles, much as Leonard Woolf's system of conferences imposed an unending reflection on the delineation of the international. It also imposes a great deal of reflection on changing international circun~stances;on the circumstances that have changed so prodigiously in the 1980s and 1990s. The politics of individual securit); inside and outside Europe, is a case in point. O n the one hand, because of the increase in international information, the general interest in the security of distant individuals is great; people know about distant horrors while they are still happening, or while there is still rime to prevent them from happening. O n the other hand, because of increased information, again, and because international interventions are no longer inhibited by the prospect of intercontinental military conflict, the power o f distant states is also relatively great in relation to these horrors. The power of local states, meanwhile, is very much diminished in many modern local conflicts. The distant states may therefore he more "efficient" in protecting personal freedom, to use Mill's term, than the local, formally constituted political authorities. The counterpart of the mulier civilis (the new political woman of civil society) provides a dismal illustration. If one is a Bosnian Muslim woman, then one's security is n o t protected by virtue of one's political identity as a resident of a local con>munity, as a citizen o f the old Yugoslavia, or as a citizen of the new Bosnia.
26
Widening Security
One's other identities - as a European, as a member of an international religious community, as an individual with rights, or as a woman with rights provide weak protection. But the European Union, NATO, the International Committee of the Red Cross, or the UN High Commission for Refugees may actually have more power to ensure one's personal security than any local or municipal political institutions. The difficulty, in very general terms, is of a divergence between the different domains of the political. The extent of international political discussion and power has increased enormously. But (formal) political institutions the hierarchy of international, national, regional, and local government have increased only minimally, and in many cases have become, as in Bosnia, Somalia, Rwanda, and Chechnya, drastically less efficient. One prospect, therefore, is of an extension and improvement in the formal institutions of international government. This is the point of policies for the prevention and demilitarization of conflict, and it is of particular importance in relation to policies for individual or common security. Formal (contractual) commitments to international programs of political and educational investment, formal restrictions on military transactions, formal agreements in respect of the recognition of sovereignty, and formal procedures for the protection of internationally recognized rights constitute the germ (to use Freud's word) of a compulsion to international government. I am not referring to Leonard Woolf's "true International Government" of 1916, made up of voluntary associations; I mean something even more currently unfashionable, in the form of international laws and international authorities with the power of compelling other officers to obey those laws. The state, including the incipient international state, has been the object of criticism in the 1980s and 1990s by an imposing political coalition of the Right and the Left. Its commitments are very often no more than scraps of paper; there is "overwhelming evidence that modern national governments cannot and will not observe international treaties or rules of international law when these become burdensome or dangerous to the welfare or security of their own nation," E.H. Carr wrote in 1945.1°' But there is little alternative, at least in policies for individual or common security, to the reconstruction of state authority. The single most important element in this reconstruction, for international state institutions, would be the power to raise tax revenues, or at least to receive, "automatically," some share of the revenues raised by national, regional, or local governments. The most important form of coercion, in the historical development of national states, was the coercive power of fiscality; it would be the most important power of international institutions as well. In The Man without Qualities, Musil says that the timid diplomat Tuzzi "regarded the state as a masculine subject one did not discuss with women," and the political objective of rediscovering the state is quite remote from the objectives of the new, multifarious civil society.lo6 But the state itself is distinctively multifarious in the post-Cold War world. One consequence of the extension of international political society, or of political discussion, is thus
1
I ,
What is Security?
27
a new disrespect for the prior wisdom of states and their officers. When Castlereagh speaks of different policies as "practicable" or "impracticable" o r when Mill speaks of the "efficient" dissemination of power - the tone is of privileged insight into government finances and opportunities. This tone of effortless self-confidence has been repressed, perhaps beyond recovery, in the past decades of criticism of all the nonmilitary activities of the state (at least in England, the United States, a n d the former Soviet Union). The state is also a largely and increasingly feminine institution a t the end of the twentieth century. The traditionally masculine functions of collecting taxes and organizing wars have heen conspicuously in retreat. It is the traditionally feminine state functions of local government, education, and social security that are most resilient; it is these functions, too, that would be reproduced in the new institutions of international government. The international politics of individual security would be more orderly, in some respects, if the institutions o f formal political commitment were extended in this way. Rut the international political society will still impose a new and prodigious tolerance for political disorder. There is some interest, among the theorists of civil society in the 1990s, in the Stoic metaphor of political identity as an array of concentric circles, in which the individual feels progressively less committed to her progressively more general political identities (as a member of a family, a local community, a region, a nation, an international community, and so forth). Adam Smith took some interest in this metaphor, too, a t least a s a way of questioning the Stoic idea of universal political benevolence.'"' B u t the modern identities with which we have been concerned suggest that the array of commitments is very much less orderly than the metaphor would indicate. I t is a set of ellipses, perhaps, o r a n Epicurean universe, in which the location of the "I" swerves and lurches over time. It leads t o a politics, in turn, that is subject in a quite novel respect to whim and t o chance. "Men are vain of the beauty of their country, of their county, of their parish," Hunle says in his account of the relation hetween objects and passions; they are also vain of climate, of food, "of the softness o r force of their language," of the qualities of their friends, of the beauty and utility of distant countries (based o n "their distant relation t o a foreign country, which is formed by their having seen it and lived in it"). But the modern politics of relatedness is more disordered, or more accidental, than in even Hume's imagination. For Hume, "a beautiful fish in the ocean, an animal in a desert, and indeed anything that neither belongs, nor is related to us, has n o manner of influence on our vanity.""'Vn the modern theory of international (environmental) security, even the beautiful fish is related t o international politics. It is quite plausible, for example, that the individual participants in the new civil society should feel related, and even passionately related to far-off fish in distant oceans. It is plausible, too, that these voluntary passions should come and g o with the accidents of information. One joins the society for the protection of fish because one happens t o have lived, as a child, near the zoo. O r one votes for a party that supports
28
Widening Security
environmental assistance because one saw a television program about fish the night before the election. The accidental politics of the 1990s poses new and serious difficulties for political theory and practice. Some of these difficulties were anticipated in earlier periods of political turbulence: Condorcet, for example, devoted great ingenuity to devising constitutional schemes whereby decisions could be drawn out, delayed, or reversed. Other difficulties are very largely new: they are such as to set the impartial regulation of broadcasting and of the new television, communications, and newspaper oligopolies at the very center of present politics. But the most disturbing of the new requirements is to discover a new tolerance for the accidental in politics. This is a very Humean politics, and Hume indeed observed (in his account of accidents from the point of view of the theory of knowledge) that "the custom of imagining a dependence has the same effect as the custom of observing it would have."lo9 Politics, like everything else in life, is a kingdom of emotions and customs, of the aesthetic and the accidental. A politics of this sort is profoundly disconcerting in the terms of even the most minimal liberal thought. For liberalism, like the new politics of the 1990s, is about security: about ensuring the conditions for personal liberty. And security requires the predictability and repetitiveness that are the endless propensities of the state. That is why the rediscovery of the (international) state is at the heart of the politics of individual security. But the state to be rediscovered will be a very different sort of state - more Humean and more complicit in an unpredictable political society. "All the Gods who are deliberating on peace" in the last part of Descartes' ballet about the Treaty of Westphalia decide that Pallas, or wisdom, is their only recourse: "Our interests are so diverse1 That we are not to be believedl In anything to do with glorylAnd the good of the entire universe." Pallas is the personification of Queen Christina, and she combines "prudence" with "valour," and is thereby free of the risk of "too much assurance" or "too much warmth."l1° These quite minimal political virtues are also the useful virtues of the present postwar world. It is the disengagement of politics from militarism, or from military assurance, that has disengaged the old liberalism of the late Enlightenment. There is a "crisis of liberal internationalism" in the 1990s, and there is an even more serious crisis of conservatism, which revered nothing in the state, excepting only its military power. The disorderly world of the new international politics - of politics in the sense of an international political society - is full of danger for this sort of conservatism. But it is full of hope for liberals. Franqois Guizot, one of the great nineteenth-century liberals (and conservatives), wrote of the "epoch of transition" of the 1850s that democracy "is habitually dominated by its interests and passions of the moment" and is, of all social powers, the "most obedient to its present fantasies, without concern for the past or the future.""l But this disorder is also the condition for the entire, subversive enterprise of political liberalism. In Mill's famous words, "liberty, as a principle, has no
I ? ~ t l . i iihiti
What is Security?
29
application to any state o f things anterior to the time when mankind have become capable of being improved by free and equal discussion."'12 We have very little idea, still, o f what free and equal discussion amounts to, between groups and societies as well as between individuals. But we are in the process of finding out.
Notes 1 . Earlier verslons o f thi\ p.lper were presented at the initi'll meeting of the Cornmon S e c u r q Forum in 1992, and at the 1993 Oslo meeting of the <:ommis\ion o n Global Governance. I am grateful for comments fronl James C:ornford, A~nartyaSen, arid (iareth Stedman Jones. m d for discuss~o~is with Lincoln Chen, Marianne Heiherg, Mary Kaldor, and the late Johan Jdrgcn Holst. I would a l w l ~ k eto thank the John I).and Catherine T. MIicArth~1rFoundat~onfor wpport to the Centre for History and Fconomics and to the Common Secur~tyForum. 2. (:hLlrles Ad;im, "Vie de Descnrres." in i:li,~rlcs Adam, ed., O c u ~ w stie L)escnrtes. vol. u ~ (Paris: i I.6opold Cerf, 19 IO), ,542-44. 3. Harold N~colson,I'alcc~ninkrn~191'1 (1.ondon: C o n ~ t ~ ~ h19331, le, 32. 4. St,lnley Hoffmann, "The Cr1si5o f 1.iheral Intern,ir1onal1\111,"Foreign Policy ( 9 8 ) (Spr~tig 199.5): 163. 5. M ~ c h a e lIg~utieff,"On <:rvil Soc~ety," Forri,y~lAfjLlirs 7 4 ( 2 ) (MarchiApril 199.5): l i.5-36. 6. Henry A. Kis\inger, 11 \Yrorld Restored ( N e w York: (;ros\rr and Dunlap, 19641, 3. 7. Viclav H.~vel,Sunrn~c~r M c d ~ t i ~ t i o n(New s York: Alfred A. Knopf, 1992), 33. hlill t ~ l k s of "the sovereignty of the ind~wdu,tlover himself," a n d of thc condition t h ~ "over t Ii~mself, over his own hody .lnd mrnd, the i~idividu,il is sovereig~i." Sec John S t ~ ~ aMill. r t O w /.ihwt?' (1.ondon: Pengu~n,1 Y74), h9,14 1. 8. See, for e u m p l e , tlie \peeell hy President Clinton at the United N a t ~ o n so n 2 7 September 19'1.3, and speeihe\ hy Under Secretary of State Timothy F.. W~rtlia t the United N,lrion\ o n 30 March 1994, and at the N,ltionc~lI'rcss <:lub in WSlsh~ngton,I).(.. on 12 July 1994. 9. The <:ornmiss~ono n (;loh,ll <;overn,lnce, O ~ r (r ; l o / ~ lNcighbourhood (Oxford: ( ~ h f o r d Lln~versityI'rcss, 1995), 78. 10. Ilnired S.lt~ons1)evclopnlent Progr.lrn, t-11trm711I ) ~ ~ l o p n i c 1094 ~ i t (Oxford: Ouforci University Press, 1994), 3. 22-2.3. I I. "The Ut~ltrdNations was founded 50 year5 go to ensure the territorial wcurit) of nie~nherstates. ... What i\ now under \lege is so~netli~tig d~ttcrenr,"or "personal security" Boutros Koutro\-<;hali, "l.ct3s get togetlicr to halt tlie unr.lvelling o f society." lntc~rrii~trort~rl H e r ~ ~ lTrrhurw, ti I 0 Febr~1.1ry1 995. 12. The Independent <.onimis\ion o n Ihs,lrlnamenr and e c u r ~ t yIssues, Commor7 Srrrlrrty: A B l ~ r r p ~ r nfor t S~irtvviil(New York: S~iiionand Schusrcr, 1982), ix, xvi, 4, 1 .?9. The word "survival" was evidently t h o ~ ~ g htot h'ive partict~ldr~ p p e in ~ l the United States, slnce the eci~rionpublished In Engla~itihad ,I different title: Conrnzori Sr(-ztrity: A I'rogri7mme f;)r 111sizrmirwtcnt (I.ondori: Pan Kooks, 19831. 1.3. R i c h ~ r d H. Ullman, "Redefining Security," 111 Sean M. Lynn-Jones ,lnci Steven E. Miller, eds., (;lobnl Dizn,qtvx (,'hilnging D r n ~ m s i o n sof Irrtr~~rmtional S ~ c r ~ r i (C~~rnhridge, ty Mass.: MlT Pre\s. 1995), 38. 14. E. H. Carr, N~ltio?ztz/rs~~~ mii Aftrr (London: hlr~crnillan,I94.5), 36, 5 8 , .5 I, 67-7 I . 15. John Hicks, "Maintaining (:.ipiral Intact: a F ~ ~ r t h Suggest~on," er Economics IX (New Ser~es)( 3 4 ) (May 1942): 175, a Begrrffsgc~sc/~irhtr,or a history o t concepts, is also ,I hi\tory of w h o it IS who Ihs the concepts. 16. Lord Castlereagh's <.onfidenr~.llStatc Paper ot May itli, 1820," in Sir A.W. W,lrd and ~ 178j-1919. vol. I1 G.I? Gooch, cds., T l ~ rC'ln~brlri~c.Hlstory of British F o r c i g ~Policy ((:alnhridge: C,imhrrdge U n ~ v e r s i tPress, ~ 19231, app. A. 632. 17. Il)~d.,627-29, 632.
30
Widening Security
18. Sir J.A.R. Marriott, Castiereagh: The Political Life of Robert, Second Marquess of Londonderry (London: Methuen, 1936), 299. 19. Michael Howard, "Reassurance and Deterrence," Foreign Affairs 61 ( 2 ) (Winter 1982-1983). Common security, too, was presented as a "slogan," a "way of thinking about security," or as a source of "the words that convince and reassure"; see Emma Rothschild, "Common Security and Deterrence," in Stockholm International Peace Research Institute, Policies for Common Security (London: Taylor and Francis, 1985), 92, 101. 20. See Stephen J. Del Rosso Jr., "The Insecure State: Reflections on 'the State' and 'Security' in a Changing World," Dadalus 124 (2) (Spring 1995): 187-93. 21. Adam Smith, The Theory of Moral Sentiments, ed. D.D. Raphael and A.L. Macfie (Oxford: Clarendon Press, 1976), 184. 22. Letter of 15 June 1820, in DipGches intdrtes du Chevalrer de Gentz aux Hospodars de Valachie, vol. I1 (Paris: E. Plon, 1877), 62-63. 23. Friedrich Gentz, On the State of Europe before and after the French Revolution, trans. John Charles Herries (London: J. Hatchard, 1804), 386. 24. Letter of 1705 in Die Werke von Lezbniz, vol. IX, ed. Onno Klopp (Hannover: Klindworth, 1864-1873), 143. 25. Montesquieu, De l'esprit des lois (1748), bk. XII, chap. I1 (Paris: Garnier, 1973), vol. 1, 202. 26. "securitatem autem nunc appello vacuitatem aegritudinis, in qua vita beata posita est" Cicero, "Tusculan Disputations," V. 42; Lexicon Taciteum, ed. Gerber and Greef (Leipzig: 1903). Tacitus does also use "securitas" in something closer to the modern, collective sense when he speaks of giving "safety and security" to Italy ("salutem securitatemque Italiae"): Hist.III.liii. 27. Smith, The Theory of Moral Sentiments, 156, 290; Adam Smith, An Inquiry into the Nature and Causes of the Wealth of Nations, ed. R.H. Campbell and A.S. Skinner (Oxford: Clarendon Press, 1976), 412. 28. Civil government, so far as it is instituted for the security of property, is in reality instituted for the defence of the rich against the poor, or of those who have some property against those who have none at all." Smith, Wealth of Nations, 715. It is interesting that Condorcet, writing in the same year, had a different view: "It is not only to defend those who have something against those who do not that the laws of property are made; it is above all to defend those who have a little, against those who have a lot." Condorcet, Reflexions sur le commerce des bles (1776), in Oeuvres de Condorcet, vol. XI, ed. A.C.OIConnor and M.F. Arago (Paris: Didot, 1847-1849), 189. 29. Smith, Wealth of Nations, 689. Smith does say later, in discussing expenditure on justice, that when defense becomes very costly, it becomes necessary "that the people should, for their own security," contribute through taxes to the sovereign's costs. Ibid., 718. 30. "The security which it gives to the sovereign renders unnecessary that troublesome jealousy, which, in some modern republics, seems to watch over the minutest actions, and to be at all times ready to disturb the peace of every citizen." Ibid., 707. The individual security of the sovereign is again a Roman preoccupation: Seneca, addressing the Emperor Nero in De Clementia, commiserates with Nero for his misfortune in not being able to walk in the city unarmed, but assures him that he would be better protected by the love of his fellow citizens than by mountains and turrets; a policy of clemency would provide "more certain security," or the security that comes from a mutual contract in security ("securitas securitate mutua paciscenda est") Seneca, De Clem., I.viii.2-6, I.xix.5-6. 31. As Stephen Holmes says, "security was the idee maitresse of the liberal tradition." See Stephen Holmes, Passions and Constraint: On the Theory of Liberal Democracy (Chicago, Ill.: The University of Chicago Press, 1995), 245. 32. "Projet de Diclaration des droits naturels, civils et politiques des hommes" (1793), in Oeuvres de Condorcet, vol. XII, 418-19; Franck Alengry, Condorcet Guide de la Rkvolution Francaise (Paris: Giard and Briere, 1904), 405. 33. "Patriotische Aufsatze in Folge des Ryswycker Friedens - Assecuranzen" (1697), in Leibniz, Werke, vol. VI, 231-33.
i 34. "Sru ICS
C ~ I S S ~d S' i 7 i ~ ~ - ~ ~ n ~ t r( l1790), ~ ~ t i o i111~ "Oerivrrs
What is Security?
31
de Condorret, vol. XI, 401; see
k h m a Rothschild, "Economic security ,lnd social secur~ty,"p p e r prepared tor the UNRISD
Conference on R e t h i n k ~ n g Soci,ll Development, Centre tor History and Economics, Camhrldge, March 1995. 3.5. Judith Shklar, "The 1.iberalism of Fear," in Nancy I.. Rosenhlum, ed., L.rl~cral~snzanti the Moral l i f e (Cambridge. Mass.: Harvard University Press. 19891, 21. 16. For Condorcet or Sm~rh,as tor Hayek in The Road to Scrfdom, there is a good and a b.ld \aI-lety o f ~nd~vndnal sccug-try, a \ w c ~ a t r drr\pectivcly with "rhc c<,mnicrcial an'{ t h c rnilit.~ry tvpc of society." T'he good security, tor Hayek, includes "the certainty of a glven mminium of tustcnance for all"; the h,~dsecurity 1s "the security o f the h.~rracks." See Friedrich A. Hayck, T h e Road t o Serfifom (Chiwgo, 111.: University of C h ~ c a g oPress, 1944), 120, 126-27. 37. "Rhflrxrom srtr Ic roi~nncri-eties 111~;s"(177h), in O e u ~ w de s Condorcet, vol. XI, 167. 38. Richard 'I'uck, "'l'he Stcite System as a M ~ r r o rot the Stare of Nature," (Ientrc for History and Economics, C'lmbridge, 1989. 39. Frit7 D~ckrnann,Der Westfalrschc Frreden (Munster: Aschendorff, 1972). 40. J.G. Herder, "Philosophic iier (;rschic/~te"( 17741, in J.G. Herder, Simzmtlrd~eWerke. vol. V, ed. R. Suph'ln (Berlin: 1891), ,521, 548; see also 498, 556. 4 1. Jean-J,icques Rou\sr,lu, "Dri Contract Soc~ial"(first vers~on)In Jean-Jacques R o u s s c . ~ ~ ~ , O e c t ~ w sConzpletcs, vol. 111 (Paris: (;allimard, 19641, 290. See also Rousseau's d e s c r ~ p ~ oofn the social pact: "The first object which men have proposed to one another in thc c~vilconfederation has been their m u t ~ ~ ,security, ll that is to say the g i i a r ~ n r e eof the life and liberty ot each hy the entire comniunity." Je,ln-Jacques R o ~ ~ s s e a"Frapncnts u, I'olrtiy~res," in Rousseau, Ocrc~~res (:ornpletc,s, 486. 42. "War is thus in no respect a relation hetween men. hut a relation between St,ltrs, In whlch i n d i v i d u d ~'Ire only enemier by ,icc~dent,in n o respect as men or even as cit~zens,hut '1s soldiers." Rousscau, " D u (:ontrac-t Social." 3.57. Hume expressed doubt, considerahly e,lrlier, ahout the respects in which natlons could he considered to he l ~ k eindiv~duals:"l'oliticc~l writers tell us, that in every kind of Intercourse, a body p o l ~ t ~ISct o he considered as one person; ,ind indeed this assertioti 1s \o t,lr I L I \ t~h, ~ ditferent t n'ltlons. as well as private persons, require 11111t~1al xsistance; dt the u m e t~riicthat their selfishness and ,lmbition are perpetual sources ot war ~ n discord. d But though tiations in this particular resemhle individuals, yet ... they ‘ire very different in other respects." I>,lvid Hume, A Trratrse of Hrrmrrn Nature (1739) (Oxford: Oxtord Unlvcrs~tyPress, 1965), 567. 43. Immanuel Kant, " / d m 211 crner a l l ~ e w z ~ i n r(n; e s d ~ r i h t eIn welthiirg~~rlrc~~er i\/mc-ht" ( 1784), in Immanuel K m t , W/erkausgal~e,vol. XI, ed. W. Weischedel (Frankfurt: Suhrkamp, l9h8), 42-44; Kant's PoIrtr~-r~l Wrltiirgs, ed. Hans K e i ~ s(<:,lmbridge: C a m h r ~ d g eUniversity Press, 1 970), 47-49, 44. "Projet il'une exposrtron ( i t s motifs" (1792), in Ocrcrws tic, Condorret, vol. X , 4.54. 4.5. I'arls Peace Treaty of 30 M\il;ly I8 14, Statement of 18 October 18 14. in A(-ten des W v n c ~ (:on,yrcsses, r vol. I, ed. Kluher (Erlangen: 1819), 9, 36. 46. "F.xper~nicnts" In constitution,~l reform, ,lnd even the extension of "Dernocr,~tic l'rincipler" ("then a \ now, but too ge~~erally spread throughout Furope") were thus not in t h e n selve? a s~~fficient reason tor ~nrernationalintervention. Cxtlereagh, "State Paper," 626-27. 47. Franqois Furet, Pcirsc~la Khr~olrctlonfran~arse (Pan\: (;allinlard, 19781, 253. 48. Ell\aheth and Robert Badinter quote a manuscript note of Condorcet's from 179 1, in which the c o ~ n p o s ~ t i oont two different cabinets IS cons~dered,with reshuffling of S~eyCs, Rochefoucauld, and Roederer, but with "Talleyrand ,lnd Condorcet keeping the same portfol i o ~ . "Elisaheth B.tciinter and Rohert Badinter, Coizttorcc~t:r r i r rntellectttal el7 politiqrte (P'lr~s: F'lynrd, 19881, ,347. 49. Peregrine Worsthornc, "l.~heralismis the real enemy," Srrniiay Telegraph, 18 Octoher 1992. 50. J i n o s KIS, "Progrnn~of Action in Eavour of Hung,lrian Mlnorit~esAbroad," i l l J;inos Kls, Politics in Hungary: For a ll~nrocr~ztrc Alternatl~~e (New York: Columbia IJn~vers~ty Press, 19891, 21.3.
32
Widening Security
51. H a d , Summer Meditations, 98. 52. William Safire, "Singapoverty," The New York Times, 2 February 1995. 53. "De I'influence de la r~volutiond'Amtrique sur I'Europe" (1786), in Oeuvres de Condorcet, vol. VIII, 5-6, 14. The language o f 1948 is similar: "all human beings are born free and equal in dignity and rights. They are endowed with reason and conscience ... Everyone has the right to recognition everywhere as a person before the law." Universal Declaration o f Human Rights (December 1948) (New York: United Nations, 1986),art. 1 and 6. 54. They were "Schutzgenossen": Immanuel Kant, "Theorie und Praxis" (1793),in Kant, Werkausgabe, vol. XI, 150-51; Reiss, ed., Kant's Political Writings, 77-78. 55. The object o f the leaders o f the French Revolution, in Tocqueville's famous phrase, was to "cut in two their destiny," or to separate "by an abyss" what they were to become from what they once had been. A. de Tocqueville, L'ancien regime et la revolution (1856),ed. J.-P. Mayer (Paris:Gallimard, 1967), 43. 56. Adam Smith wrote scathingly in the Wealth of Nations o f the citizens o f prosperous empires who in wartime "enjoy, at their ease, the amusement o f reading in the newspapers the exploits o f their own fleets and armies." Smith, Wealth of Nations, 920. 57. Henri Brunschwig, La crise de l%tat Prussien a la fin du XVIlle siecle et la genese de la mentalite romantique (Paris: Presses Universitaires de France, 1947), 36-42; see also Richard van Diilmen, The Society of the Enlightenment: The Rise of the Middle Class and Enlightenment Culture in Germany, trans. Anthony Williams (Cambridge:Polity Press, 1992), 83-92, 165-72. 58. Speech o f 28 October 1792, in Oeuvres de Maximilien Robespierre, vol. IX (Paris: Presses Universitaires de France, 1958), 48-49, 53. 59. Herder, "Philosophie der Geschichte," 5 4 5 4 6 . 60. Gentz, O n the State of Europe, 38-39. 61. Castlereagh, "State Paper," 632. 62. "Aux Germains" (1792), in Oeuvres de Condorcet, vol. XIS, 155-56; "La Nation fran~aisea tous les peuples" (1793), in Ibid., vol. XII, 510. 63. Castlereagh, "State Paper," 627-29. 64. Hume, Treatise, 303, 307. 65. William Playfair, A letter to the Right Honourable and Honourable the Lords and Commons of Great Britain, on the advantages of apprenticeships (London: T.C. Lewis, 1814), 31. 66. See J.R. Oldfield, Popular Politics and British Anti-Slavery: The mobilisation of public opinion against the slave trade 1787-1 807 (Manchester: Manchester University Press, 1995), 57-58,139111,177-78. 67. "De I'infktence de la rivolution d'Amerique," in Oeuvres de Condorcet, vol. VIII, 13. 68. Immanuel Kant, "The Contest o f Faculties" (1798), in Reiss, ed., Kant's Political Writings, 182, 184-85. 69. Adam Smith, Lectures onJurisprudence, ed. R.L. Meek, D.D. Raphael, and P.G. Stein (Oxford:Clarendon Press, 1978),403, 318-21. 70. "Sur les Assemblies Provinciales" (1788),in Oeuvres de Condorcet, vol. VIII, 471-75; "Esquisse d'un Tableau Historique des Progris de 1'Esprit Humain" (1793-1794), in Ibid., vol. V I , 244. 71. See Jennifer Montana, "Human Security," Common Security Forum, Harvard Center for Population and Development Studies, June 1995; African Rights, Humanitarianism Unbound?, African Rights Discussion Paper No. 5, 11 Marshalsea Road, London SE1 lEP, November 1994. 72. See Brian Urquhart, " A UN Volunteer Military Force," The New York Review of Books, 10 June 1993. 73. Castlereagh, "State Paper," 629, 631. 74. "Sur I'instruction publique" (1791-1792), in Oeuvres de Condorcet, vol. VII, 5 3 4 4 1 . 75. This was Olof Palme's position, for example, at the signing o f the first Helsinki accords in 1975: when Giscard D'Estaing said that the countries o f Europe could now stop quarrelling, Palme argued that "now we have agreed not to kill each other, we can really begin to quarrel."
76. Mill, O n I ~ b e r t y ,167. 77. Sec Ignat~rff,"On (:ivil Society," 135-36. 78. L.T. Hohhouse, L2iherulrstn (l.ondon: Williams and Norgate, 1919), 18-19. 79. " l k 10 Nrrture dcs I'rnrl~orrs Politiqwes dans tin<. Nntron Lihre" (1792), in Oeuvres de Condorcc~,vol. X, 607. 80. Adam terguson, An E~SLIJ' rin the History of Crud Socrrty (1767) (Edinburgh: Ed~iihurghUnivers~tyPres\, 196h), 2 17-10. See also Sunil Kh~ln'lni, "The Development of C:~vtl Soc~rty,"World I n s t ~ r t i ~tor c Ocvclopmcnt Economics liescarch and Centre for History ~ n Economics, d 1994. 8 1. See Ernni,i Rothsch~ld,"Adlm Smith, Apprentice5hip and Insecurity" (Canibrldge: Centre for I iistory and Ikmomics, 1994). 82. Tuck, "'Phe State System," 8. 83. Ignatieff, "On Civil Society." 84. See Kcnnerte Benedict, "A Cold I'eace: US-Russian Rel,it~onsin a New Era," The John D. and Cnthcr~neT. MacArthul- Foundation, February 1995. 85. C.omrnis\~onon Glohal Governance, O w Global Ni,rXhbourhood, 2.76. 86. A.R.J. Turgot, 0err1~rr.sde Tnrgot et Dorumetrts le (:cmccrnunt, vol. I, ed. G . Schelle (Paris: Alc'in, 19 13-1 923). 587, 592. 87. <.,1rr, N~7tron~rlism ' Z I I ~Afier. 49, 59. 88. L.S. Woolt, lntermtron~rl Goveunrnent (New YorL: Brentano, 1916), 152, 170. 3 5 2 - S , 3.57. The Jssoclatlon ng,linst uneniploymcnt, for ex,imple, "numbers among ~ t menis her\": 8 governments, 5 9 towns, 12 ~ ~ n e r n p l o y ~ n funds, ent 8 provinces, 1.5 scientific societies, 6 eniployers' fcderat~ons,30 labor federations, m d ~ n d i v d ~ ~ from a l c 2 3 countries. 89. Woolf'5 "practical standpoint" thus leads him t o ;i\k "whether there is, t h ~ s ~ d cof the ye'ir ot our Lord 2000, the sl~ghtestpossibility of the Rririh Empire and R u s s ~ aenterlng ,In ~ntertiariotialsystem in which the future position of It~dians,I r d i ~ n e n and , F ~ n n sIn the respective Empires is to he decided , ~ some t sort of international conference." Woolf, lnterrr~tiotrill Gr~lwrnment.34-38, 357; Lirr, N~ztrorr~ilrsm anti After, 50-5 1 . 90. Quoted in Douglas G'llbi, "International Aspects of S o c ~ Reform ~l 111 the lriterwnr I'er~od" (C::irnhr~dge:Common Security t o r u m , Centre for I-li\tory and Economics, IL)93);the retere~iceto pc,lcc : ~ n dharmony I \ In the preamble to p,lrt 1.3 of the Treaty. 91. Rohert M u d , 7%? h l m ~ort/~orit C)uirlrties, vol. 1 (19,521, trans. Sophie U'ilLins (New York: Alfred 12. Knopt, 1995), 30-3 1. 92. Sigmund trcud, "T'ho~~ghtsfor the Tinics o n W,lr ,lnd Lkath" (1915), In Sigmund Freud, TIJOStizn(irrrd Edrtu~n.vol. XIV, ed. lames Strachey ( I ondon: The Hog,lrrh Press, 19.57), 280. 28.5. 288. 9.3. Afric:un R~ghrs, in I [ \ critique of "Posr-Cold WJI- Hunianitarlanism," s ~ y sthat "Western donor\' strategic . ~ n dcommercial Interest in poor countries is d e c l ~ n ~ n gtheir ; chief concern is increas~nglyt o avoid had publicity a t home from h ~ m ~ i n i t a r i acrises n once they have h ~ the r televisior ... relief 'igcncies are exp,~ndinginto a void lett hy the contracting power of host government\ ,ind the tieclin~ngpolltical interest of western powers." African Kiglits, Hunranrtarrrz~1isrl21Inl)orrntii. 0. 94. Woolf, lntcr~ratronnl<;oui~rtrtnmt,13.3. 9.5. Albert 0. Ilirschni,ln, S h r f t r n ~Int~ol~ienrc~nts: I'rrl~irtc lntrrest a n d Public A ~ t r o n (Princeton, N.1.: I'rmceton Univcrs~tyI'res\, 1982). 96. Afric:in Rights, H~rri1~7trrtnrr~ztt1s117 Unhounti?, IS, 1 3 . ( ; ~ r e t hSted~nanJones quotes the wenr of Sir <:li,lrles Trevelyan, "the doyen of relief experts a n d ,I veteran of the Irish tarnine," on charity t o the I.ondon poor in 1870: "By passlng through offici'll hands ... the gift lows the redeeming influence of per\on,ll k~ndnessand the rcc~pientreg'lrds it, not as charity hut J S a described hy Marcel M ' i ~ ~ s s"to : Iarge\sc t o which he has a right." This is also the rel,~t~onship give is to show one's supcrlorlty.... To accept without returning or repaying more, IS to face s ~ ~ b o r d i n a t i oto n , become J c l ~ e n t.ind subservient": <;areth Stedman Jones, Outc~7st1.0ndon: A Study in the Kclirtionshrp hc~tu~ren Climes in Vic-tor~mSo(-i~ty(M~ddlesex:I'enguin Rooks, 1 984), 244, 2.52-5 3. 97. See, for cu,lniple, S n i ~ t h I.cctrtres , o n /urisprcr~icncc,87-102, 318-2 1 .
34
Widening Security
98. Smith, Wealth of Nations, 27. 99. Charles Maier, "Stabilizing Europe, 1918-1945-1989: Three Post-war Eras in Comparison" (Cambridge, Mass.: Harvard Center for European Studies, paper prepared for a conference at the University of Keele, March 1995), 34. 100. Shklar, "The Liberalism of Fear," 21. 101. "docendo, discendo, communicando, disceptando, iudicando" - Cicero, De Officiis, 1.50, 1.53. 102. Istvan Hont, "State and Nation in the French Revolution" (Cambridge Centre for History and Economics, 1995); "The Permanent Crisis of a Divided Mankind: 'Contemporary Crisis of the Nation State' in Historical Perspective," in Contemporary Crisis of the Nation State ?, ed. John Dunn (Oxford: Blackwell, 1995). 103. Mill, On Liberty, 181, 185-86; on Mill and Condorcet, see Emma Rothschild, "Condorcet and the Conflict of Values," Historical ]ournal (forthcoming). 104. "Community institutions should only be given the powers they require to perform those tasks which they can carry out more effectively than the individual Member States ... subsidiarity is a principle based on political pragmatism and aimed at organizing Community activity effectively by bringing it closer to the concerns and aspirations of citizens." European Parliament, Committee on Legal Affairs and Citizens' Rights, "Report on the Commission report to the European Council on the adaptation of Community legislation to the subsidiarity principle," 29 March 1994. I am grateful to Eleanor Sharpston for discussion on this point. 105. Carr, Nationalism and After, 30-31. 106. M u d , The Man without Qualities, 211; the chapter, which is about a discussion of "the idea of a Global Austria," is called "Antagonism sprouts between the Old and the New Diplomacy." 107. Smith, The Theory of Moral Sentiments, 227-37; Cicero, De Officiis, 1.54-59. 108. Hume, Treatise, 303, 306-307. 109. Ibid., 222. 110. Descartes, La Naissance de la Paix, Ballet Danse' au chateau Royal de Stockholm le jour de la Naissance de sa Majestt (Stockholm: Jean Janssonius, 1649), 4, 11. 111. Franfois Guizot, Sir Robert Peel: ttude d'histoire contemporaine (Paris: Didier, 1856), 353. 112. Mill, On Liberty, 69.
A Genealogy of the Chemical Weapons Taboo Richard Price
There are no moral phenomena at all, but only a moral interpretation of phenomena. - Friedrich Nietzsche
A
t first glance, it may seem a platitude to state that the use of chemical weapons (CW) is a particularly reprehensible and morally unacceptable means of conducting armed conflict.' Yet how is it that among the countless technological innovations in weaponry that have been used by humankind, CW aln~ostalone have come to be stigmatized as morally illegitimate? Why have they been denied the legitimacy that is implied by the categorization of some means of warfare as "conventional," and conversely, how have those conventional weapons avoided the stigma of lasting moral opprobrium? Finally, what do these discrepancies in legitimacy mean for the practice of violence in world politics? Throughout history, numerous weapons have provoked cries of moral protest upon their introduction as novel technologies of warfare. However, as examples such as the longbow, crossbow, firearms, explosive shells, and submarines demonstrate, the dominant pattern has been for such moral qualms to disappear over time as these innovations became incorporated into the standard techniques of war. As Alfred Mahan has put it, "the objection that a warlike device is barbarous has always been made against new weapons, which have nevertheless eventually been adopted."l Are CW just another example of this process, and are the moral protests against this weapon doomed to fade? O r is there something unique about the proscription of CW? This article examines the sources of the C W taboo and investigates whether there are any grounds to suspect that the norm proscribing the use of C W differs from past restraints on other weapons - restraints that over time have yielded to the ineluctable embrace of technology. I demonstrate that neither of the usual answers to the C W conundrum - namely, the view that CW are militarily useless and the assumption that the taboo is simply Source: Interrz~ztronalOr,q~zmzat~or~, 4Y( 1 ) ( 1995): 73-1 0 3
36
Widening Security
explained by the unique physical characteristics of these weapons - suffices to provide a fully satisfactory account of how CW have been delegitimized. Before doing so directly, however, I engage the usual question asked of the phenomenon of norms by international relations scholars: in what ways can it be established that the stigma against using CW is a phenomenon that matters in international politics in the first place? After establishing the importance of the CW taboo and illustrating ways in which this norm affected outcomes, I then turn to the efforts of other scholars to account for the CW prohibition.
The Taboo and the Nonuse of CW No issue has attracted more attention in the CW literature than the important question of why CW were not used on the major fields of battle in World War 11, a conflict in which few other restraints were observed and, indeed, in which most existing prohibitions were violated. There is a virtual consensus in this literature that the nonuse of CW in World War I1 is attributable to three major factors: as summarized by one study, "the two sides warned each other not to use chemical weapons at the risk of strong retaliatory action in kind; a general feeling of abhorrence on the part of governments for the use of CB [chemicaVbiological] weapons, reinforced by the pressure of public opinion and the constraining influence of the Geneva Protocol; and actual unpreparedness within the military forces for the use of these weapons."" It is of signal importance that while some authors have privileged individual factors over others for different stages and aspects of the story, none of the major studies has dismissed the prohibitionary norm as irrelevant in the overall explanatory e q ~ a t i o nThus, .~ while some authors have argued that legal and moral restraints did not directly affect decisions not to use CW, they also recognize that the unpreparedness of the military establishments cannot be taken as an unproblematic variable, but itself must be explained. Here, normative and legal opposition to CW take their place in explaining why CW were not used in World War 11, since these restraints were vital in preventing the assimilation of CW.S Many factors contributed to the failure of military establishments to be adequately prepared for chemical warfare in the years leading up to World War 11: moral and legal constraints that stigmatized CW, the uncertain military value of CW, the resistance of tradition-bound military cultures, and the extra logistical burden of CW, to name a few.6 The argument I make here is not that the CW prohibition was an all-powerful norm that by itself determined the outcomes of nonassimilation and nonuse. Rather, I argue that the existence of a stigma against using CW was a necessary condition for the nonuse of CW. The stigma combined with those other factors to retard both the political and the military acceptance of CW and ultimately to prevent CW use during World War 11. Similar kinds of resistances often accompany new weapons technologies, but rarely do they result in total abstention from
iJri i c
Chemical Weapons
37
using the weapons in battle. In the absence of a taboo that politicized the use of C W at the highest levels, these other restraints would likely not have been sufficient t o prevent chemical warfare during World War 11. The way in which the unattractive political implications of using CW tipped the scales in allocation decisions against such armaments is but one example of how this peculiar understanding of C W worked to prevent their standardization. In Britain, the advocacy of full-scale capabilities by the Air Ministry and War Office gave way to the priorities established by the Treasury, as it was decided (by the Air Ministry) that "it would be illogical to reduce our offensive or defensive capacity in more important directions in order to include an ideal scale of provision for a weapon which it is hoped will never be used. Gas provision is therefore a direction in which some risk may legitimately be taken."' The conception of CW as a weapon that might not be used helped retard military preparedness for CW because it was held in conjunction with a determination by each of the major Allied and Axis powers that none of them would initiate the use of CW in the major theaters of battle. And after all, these convictions were in accordance with the international legal expression of the CW prohibition, the Geneva Protocol of 192.5, which in essence forbade the first use of (ZW." Moreover, at the same time as preparations were allowed to lag because of the possibility that CW might not be used, the politicization of CW also meant that the burden of proof of what counted as being "adequately prepared" to wage chemical warfare was raised to inordinately high levels, well beyond the level of justification required for other weapons. This phenomenon came into play during the German failure to employ gas during the Allied invasion at Normandy, when, as both sides recognized, the use of CW might well have been decisive.' The German decision has been attributed to two major factors: the fear of Allied CW retaliation against German cities and inadequate offensive and defensive preparations.'o The Germans made the latter assessments even though they had a six-month supply of C W at the time, including the Luftwaffe's half million gas b o ~ n b sand spray tanks." These developments all demonstrate the peculiar operation of the CW taboo. It was not the case that it was utterly unthinkable for any belligerent to countenance chemical warfare. Violations of the taboo might well have occurred had other circumstances arisen.I2 Rather, the stigma against CW raised the threshold of circumstances under which one could justify a resort to CW to situations of desperation. In 1940, for example, the British considered the possibility of having to initiate chemical warfare in the event of a German invasion; but such suggestions were put off in large part due to the sentiment that CW use would comprise a major departure from British principles and traditions. This departure would have such deplorable effects that some began to wonder "whether it really mattered which side won."" In short, while several factors in conjunction are important to understand why CW were not used, this nonevent cannot be understood without an appreciation of the necessary role played by the taboo attached to the
38
Widening Security
use of CW. And just as the nonuse of CW cannot be explained by dismissing the prohibitionary norm as peripheral, neither can it be fully explained as simply an unproblematic product of deterrence. An attempt to account for the nonuse of CW by the mutual fear of retaliation leaves unanswered the following puzzle: how could it be that the fear of retaliation against CW was any more prohibitive than the fear of other enormously destructive forms of warfare, such as strategic bombing or submarine attacks on civilian ships? Mutual deterrence - restraint issuing from the fear of retaliation in kind - could conceivably hold for any weapon possessed by both sides in a conflict. The logic of deterrence thinking is not wrong so much as indeterminate on this question, insofar as it does not address how we can account for the fact that CW came to be defined as a deterrent weapon in a way other means of destruction were not. How could bombing with CW be more feared than bombing with conventional weapons, and how was it that such categories came to be constituted in the first place? Similar points can be made with respect to the Persian Gulf War of 1991, a more recent case where CW were not used despite the expectations of some coalition members.14 The extent of Iraq's preparedness to wage a variety of chemical attacks (Iraq's arsenal included chemical aircraft bombs and Al-Hussein missile chemical warheads) indicates that Iraq's nonuse of CW cannot be attributed simply to the logistical and technical constraints of being unable to get battlefield munitions to the front.lVhe political decision not to employ these weapons seems to have been based on the understanding that initiating chemical warfare would cross a "red line beyond which all previous bets are off," according to a senior Bush administration official.16 While the threat and fear of massive retaliation for the use of CW seems to have been largely responsible for inhibiting Iraq, the point being made here is that the argument from deterrence cannot be understood without recognizing the role of a prior stigma attached to CW; this stigma set chemical weaponry apart as a symbolic threshold of acute political importance. An additional ~ r o b l e mof reducing the CW norm to a practice of deterrence arises when one considers the numerous instances when CW were not used even though their use would have been of distinct military advantage and no threat of retaliation in kind existed. For example, CW might have provided the least costly way for U.S. forces to advance against the Japanese forces that were entrenched in caves and tunnels in the Pacific islands during the latter stages of World War 11. Even though the United States faced no significant threat of retaliation, CW still were not used. This failure to use CW was in large part due to the military's lack of preparedness to wage offensive chemical warfare. In turn, a major reason for the crucial shortfall of CW capabilities was the unwillingness of theater commanders to take up valuable shipping space with equipment that was solely for retaliation against an enemy action that might not take place." Among the numerous other examples in which CW were not used by belligerents even when their opponents possessed no CW retaliatory capability are the Spanish civil war, the Korean War, the French in Indochina
I
I
Chemical Weapons
39
and Algeria, the Vietnam War, and the Soviet intervention in Afghanistan.18 These prominent cases suggest that something else has worked to restrain the use of CW as a standard weapon of war that is not fully captured by the logic of deterrence. Indeed, a case could be made that the CW stigma, by differentiating CW as an especially politicized category of weapons, was the enabling condition that illuminates how the lack o f assimilation and fear of retaliation could work together to prevent the use of CW but not other weaponry.'' This is not to argue that the fear of retaliation or military resistance to C W is wholly reducible to the CW taboo but only to stress that thc taboo was a necessary condition for the avoidance of chemical warfare in World War I1 that cannot be dismissed as peripheral. In the absence of processes that stigmatized the use of CW as anything but a routine practice of warfare - especially the international institutionalization of this prohibition - it is entirely possible or even likely that CW would have been used during World War 11. In short, the CW norm is one that matters in explaining important outcomes in international politics, a finding that leads to the central concern of this article: how is it that CW have been so successfully constituted as an illegitimate category of "unconventional" weapons in the first place? What are the meanings and purposes of the taboo? Have they changed over time? What are the implications o f any such transformations for the robustness of the taboo? Before discussing the method introduced to answer such interrogations, I will deal with other attempts to explain the CW taboo.
Sources of t h e CW Stigma
Surprisingly few studies have engaged in sufficient depth the question of how it is that C W - of all the technological innovations of warfare - have become an object of special opprobrium. Answers to this question have predominantly come in the form of brief conjectures seeking to locate an answer in those essential or unique qualities of CW that provide good logical reasons for their proscription. Thus, it is speculated that CW arouse special dread hecause they cause unnecessary suffering; because they are insidious, unseen, and secretive; because they are indiscriminate; or because the effects of choking can be s o vividly imagined.2" Such explanations, however initially plausible, ultimately are unsatisfactory insofar as a multitude of other weapons offend in comparable ways. For example, J o h n Haldane has noted that the indictment of secrecy is odd considering that high-speed bullets are no more visible before they hit their targets; and Martin van Creveld has questioned why the use of high explosives for tearing individuals apart is regarded as more humane than the use of CW.>l To be sure, this is not to say that C W are not insidious and do not cause horrible suffering - of course they do. Nor d o I argue that such qualities
40
Widening Security
have had nothing to do with the prohibition against CW. I mean simply to point out that most if not all other weapons share comparably dubious qualities and thus that these qualities alone do not provide a sufficient explanation of why CW and not other weapons have been proscribed. Few would argue that being torn apart by burning shrapnel is anything other than horrifying and inhumane. The difference is that, in contrast to CW, most conventional weapons have not had such a politically successful degree of odium attached to them, as the term "conventional weapons" itself implies. Michael Mandelbaum has authored the sole sustained account of which I am aware that attempts to address the question of the legitimacy of CW in the context of attitudes toward other weapons. In an effort to understand the differing legitimacy accorded to nuclear and chemical weaponry as tools of politics over the last forty years, Mandelbaum has sought an answer in deep-rooted cultural and institutional restraints. In the end, however, he argues that the aversion to chemical weapons may be deeply rooted in human chromosomes. Because nuclear weapons are of relatively recent origin, he argues, humankind has not had enough time to develop a genetic aversion to them.22 While Mandelbaum's approach goes beyond many of the scholarly treatments of the CW taboo in attempting to place it in the context of moral attitudes toward other weapons, his explanation is so strained and implausible as to not merit serious consideration. The reason for this inadequate explanation is instructive, however. Mandelbaum has made the error of searching for the origins of the taboo in logical reasons derived from contemporary understandings of the important characteristics of CW. He is forced into the Sisyphean position of trying to demonstrate such a rationale because of the ahistorical and apolitical structure of his argument, which treats the CW taboo as a static variable. He deductively tries to account for the present moral status of CW and nuclear weapons without reference to some of the unexpected political dynamics of the past that may have shaped subsequent attitudes. The shortcomings of these approaches suggest that factors other than some inherent aversion to the intrinsic features of CW have played an important role in establishing the political salience of restraints against CW. The Poison Taboo Still, if there is one intrinsic quality of CW that seems to provide a plausible explanation for its prohibition, it is the association with poison. Nevertheless, while it is generally assumed that the ban on poison goes back through time immemorial, more careful examination reveals that poison has been stigmatized in European civilization as an illegitimate and cruel method of warfare for only a few hundred years.23While scattered references to a disdain for poison have been noted in ancient Rome and India, the formative period for a robust and absolute prohibition against poisonous weapons in Europe appears to have been between the fifteenth and eighteenth centuries.24The prohibition
lit I!. i Chemical Weapons
41
of such weapons was advocated in 1589 by Alberico Gentili, although he treated the issue as controversial. And as Georg Schwarzenberger has noted, the use of poison and poisonous weapons was still being defended as late as 1737.2F A treatise by Grotius dating from 1625 not only offered an explanation for the prohibition on poison but also seems to have constituted a contribution to its co~lsolidation:"Agreement upon this matter arose from a consideration of the common advantage, in order that the dangers of war, which had begun to be frequent, might not be too widely extended. And it is easy to believe that this agreement originated with kings, whose lives are better defended by arms than those of other men, but are less safe from poison, unless they are protected by some respect for law and by fear of disgrace."'" Another dimension in the discrediting of poison was its association with the ideas of womanly deception and the ignominy of a death by poison (in contrast to the glory of a death achieved during an open contest of brute physical strength among men). As Margaret Hallissy has put it, "The dueller is open, honest, and strong; the poisoner, fraudulent, scheming, and weak. A man with a gun or a sword is a threat, but he declares himself to be so, and his intended victim can arm himself: may the best man win and have the public glory of heing acknowledged the best man ... Poison is an insidious equalizer of strength in the battle of the sexes. The poisoner uses superior secret knowledge to compensate for physical inferiority. A weak woman planning a poison is as deadly as a man with a gun, but because she plots is1 secret, the victim is the more disarmed."'The image of poison, then, is that of a potential equalizer in a battle tor domination that needed to he delegitimized in order that the physical contest of strength would determine political power. This process of delegitimation has been so successful that it is often overlooked; we need only recall the widespread conviction of the futility of limitations on effective weapons, noting how it seems to forget that poison is a technology of war. For example, T.J. 1,awrence writes, "The attempts which have been made to forbid the introduction o f new inventions into warfare, or prevent the use of instruments that cause destruction on a large scale, are doomed to failure. Man always has improved his weapons, and always will as long as he has need for them at all."LX This belief cum truism is so dominant that it actually has been invoked in order to explain the ban on poison. Despite the clear implications of Grotius' tract, one of his interpreters has read the accepted wisdom of weapons bans backwards i n t o that essay and has quite incorrectly surmised that the ban "probably reflected the inefficiency of poison as a weapon."" Even one of the more historically sensitive treatments of the CW ban, one that spends considerable effort analyzing the possible links between the CW norm and the prohibition against poison, was able in the same treatise to state that chemical and biological warfare comes the closest to providing an example of totally outlawing a particular means of warfare, all others having failed (excepting for means of no military utility)."' On the contrary, poison has
42
Widening Security
been delegitimized as a means of violence, and it is precisely because of its potential effectiveness and the inability to defend against it. To what extent, then, does this robust taboo against poison account for the CW prohibition? It will be recalled that Mandelbaum's attempt to explain the CW taboo took the form of trying to give an account of humanity's special psychological horror of toxic substances. As such, he simply assumed an axiomatic connection between CW and poison. Prima facie this may not seem an unreasonable assumption, for CW often are referred to as "poison gases." For the genealogist, however, the question arises whether we can attribute the rise of a norm proscribing CW to its connection with poison, a weapon believed to have been proscribed throughout the ages by the laws of civilized warfare. The normative discourse concerning CW began in earnest with the assembly of the world's major nations at the Hague Peace Conferences of 1899 and 1907.31An analysis of the proceedings of the Hague conference of 1899 reveals that the origins of the CW taboo did not issue primarily from an understanding that such weapons were just another version of poison. Indeed, the use of "poison and poisoned weapons" was "especially prohibited" by Article 23(a) of the Convention with Respect to the Laws and Customs of War on Land produced at the Hague, but no link was ever made between this prohibition and the declaration prohibiting asphyxiating shells.32 What the delegates understood themselves to ban at the Hague was the first use of a particular type of explosive shell: "projectiles whose purpose is to spread asphyxiating gases and not those whose explosion incidentally produces these gases."33 CW had yet to be developed, and at the time these weapons were portrayed as a new type of explosive that might be restricted, rather than a toxic weapon that was subject to the customary prohibitions on poison. While a few attempts were made to equate these kinds of shells with poison, such reasoning was strongly countered by other delegates. As attested to by U.S. delegate A.D. White, the discursive strategy that in the end did facilitate the attainment of a prohibition was the perception "that asphyxiating bombs might be used against towns for the destruction of vast numbers of noncombatants, including women and children, while torpedoes at sea are used only against the military and naval forces of the enemy."34 To be sure, it would be unwise to exclude unduly any legitimate influence the association with poison may have had on the early development of ideas concerning CW.35 It is clear, however, that the initial institutionalized form of the CW norm was not primarily the result of a discursive strategy that linked these weapons to a robust norm proscribing the use of poison. Rather, it was reached via a linkage between asphyxiating shells and the threat to civilians, and also because the declaration proscribing asphyxiating shells was seen to be of little significance, as these kinds of explosive shells had not yet been developed.36The galvanizing specter of CW was one of a devastating weapon against which there would be no defense for helpless civilians.
Chemical Weapons
43
While the prohibition o n poison does not sufficiently account for the origins of the C W taboo, over time the association of CW with poison and with biological weapons has become important in sustaining the CW prohibition. This has developed as the ~mderstandingof CW has been transformed from their initial assessment as a potentially devastating or at least effective fruit of technological progress wielded by the advanced powers, to the view that CW are a n insidious equalizer wielcled hy the weak. Moreover, this comparison between the two bans brings out the truly intriguing quality of the persistence of the CW taboo: unlike poison and perhaps even nuclear or biological weapons, nothing in the nature of CW would cause them to be defined as a technology against which there is little means of defense. Indeed, of all recent weapons innovations C W are probably the most susceptible to defensive measures. Nor is it simply true, however, that CW are therefore ineffective weapons. While the effectiveness of CW can be reduced due to liabilities such as defensive measures or dependence on wind conditions, CRf can be devastatingly effective in certain tactical and strategic conditions, as both sides recognized during situations in World War 11 such as the D-Day landings at Normandy. In short, it is not possible to account for the peculiar reception of gas weapons during this period simply by virtue of their objective characteristics.
The Genealogical Method As previewed above, providing an adequate account of the CW taboo requires an understanding of the meanings that have served to constitute and delegitimize this category of weapons. This "how" question of understanding meaning is different from the "why" question of causal explanation that is usually the focus of international relations scholarsl~ip.~' Given the predominantly positivist cast of the discipline, and its dominance by U.S. policy issues, scholarship in the field has been grounded in the quest for theories of causal explanation for behavioral outcomes.:' Because the discipline has been so method-driven, interesting questions posed of international political phenomena not answerable in terms of the prevailing methodological orthodoxy - that is, the types of questions often posed by plitical philosophers, social theorists, and anthropologists - have been relegated to the margins of the discipline.'" The inadequacy of previous efforts to give 311account of the CW taboo, however, makes plain the contributions of an interpretive methodology that seeks to uncover the discursive strategies employed to delegitimize the category of CW."' As was shown above, Mandelhaum mistakenly assumed that the present form of a moral interpretation c o ~ ~ account ld for its origins. As such, he committed the same error that Friedrich Nietzsche criticized in his analyses of moral institutions; namely, the error of ignoring "the specific historical and genealogical tangles that produce the contingent structures we mistakenly consider given, solid, and extending without change into the
44
Widening Security
future as well as into the past."41 The fallacy of confusing rational functions for origins was a prominent and consistent theme in Nietzsche's writings on the origins of morality.42 As a corrective, Nietzsche proffered the genealogical method, an approach that seeks to uncover the conditions under which moral institutions are devised and to interpret the value that these norms themselves possess.43 The analysis adopted in this article to untie the conundrum of the CW taboo has as its main influence insights generated from this method, one of many traditions of interpretive and constructivist social science.44 The genealogical approach, which more recently has been popularized through the writings of Michel Foucault, is particularly well-suited for an analysis of the norm proscribing CW as it is a method specifically concerned with interpreting the origins of moral interpretations. And as Nietzsche explained with respect to his own studies of asceticism, the chief contribution of such inquiries is on the "how" questions of meaning more so than the "why" questions of explanation: It is my purpose here to bring to light, not what this ideal has done, but simply what it means; what it indicates; what lies hidden behind it, beneath it, in it; of what it is the provisional, indistinct expression, overlaid with question marks and misunderstandings. ... what is the meaning of the power of this ideal? ... Why has it been allowed to flourish to this e ~ t e n t ? ~ " For Foucault, as for Nietzsche, what is most often found at the historical beginnings of things is not "the moment of their greatest perfection, when they emerge dazzling from the hands of a creator."46 Rather, the development of institutions often consists of rationally inexplicable events, "fabricated in piecemeal fashion" out of the vicissitudes of history.47AS a result of the marriage of chance occurrences, fortuitous connections, and reinterpretations, the purposes and forms of moral structures often change in such a way that they come to embody values different from those that animated their origins. As Nietzsche put it, The cause of the origin of a thing and its eventual utility, its actual employment and place in a system of purposes, lie worlds apart; whatever exists, having somehow come into being, is again and again reinterpreted to new ends, ... and the entire history of a "thing," an organ, a custom can in this way be a continuous sign-chain of ever new interpretations and adaptations whose causes do not even have to be related to one another but, on the contrary, in some cases succeed and alternate with one another in a purely chance fashion.48 Genealogy's allowance for contingency seems intuitively appropriate for the rather jumbled history of violations and resurrections of the CW norm. Indeed, the genealogical stance is quite at home with one of the more intriguing aspects
;'I
Chemical Weapons
45
of the CW story - the U.S. position. The United States moved from being the only opponent of the first CW ban (the Hague declaration) to being the primary proponent of efforts to ban CW after World War I (the Geneva Protocol), a ban which the U.S. sought and achieved but then ultimately failed to ratify. The genealogical stance is favorably placed to account for the interests and identities forged out of "the events of history, its jolts, its surprises, its unsteady victories and unpalatable defeatsn4"- a task especially apposite for the uneven record of the norm proscribing chemical weapons. The genealogy of the CW taboo thus seeks to remedy the deficiencies of essentialist and deductive approaches by making the basic move of historicizing the accepted moral interpretations of weapons technologies and the place of CW within this moral domain. This operation reflects an understanding of the role of genealogy as an effort to find history where it is not expected to he - within moral institutions and practices that are usually thought to be exempt from the contingencies of historical tangles."' Besides emphasizing the importance of historical contingency in the social construction of norms, the genealogical method influences the following analysis of the CW taboo through the employment of two of the genealogist's analytical tools: discourses and power. Discourses, the favored analytic focus of Foucault, are theoretical statements that are connected to social practices." These discourses produce and legitimize certain behaviors and conditions of life as "normal," and serve to politicize some phenomena over others. As stattd by James Keeky, discourses "also may produce behaviour defined as deviant, which is then used to justify the maintenance and development of the system intended to control or eliminate it."" For Foucault, the production of disco~~rses is a form of power, which he termed "disciplinary" power." The production ot a discourse constructs categories that then~selvesmake a cluster of practices and understandings seem inconceivable or illegitimate. This disciplinary power sets a field of conceptual possibilities that defines what is normal and natural, and what is unthinkable and r e p r e h e n s i b l e . ' ~ r o h i b i t i o n a r ynorms in this sense d o not merely restrain hehavior hut are productive in that they constitute identities and impose meanings of what is to count as legitimate reality. Norms as conceived in this constructivist account are closely tied to the formation of identities, as "we form our identities hy conforming ourselves over time to tacitly understood norms and generally accepted practices," in the words of David Couzens Hoy. Using these categories of analysis to examine international politics, genealogy injects a different dimension of power into the study of norms, an element that often seems neglected in the attempt to distance the role of norms and ideas from realism's focus on material power.jh While a Nietzschean genealogy might share with realism a focus on the power relation in human affairs, the differences between these two approaches are several and substantial. Conflicts over interpretive truths - that is, the exercise of power - are located at different sites than the power relations usually examined in international relations scholarship. As James Der Derian
"
46
Widening Security
has argued, the genealogist's focus on multiple sites of power constitutes a challenge to the state-centrism of realism while not denying the importance of power in international Moreover, Nietzsche radically questions the conception of self-interest employed by realist scholars by rendering problematic the identities that can have those interests in the first place: self-interest cannot be an unproblematic concept if the self is conceived as a set of constructed identities that need not be stable over time.58 What genealogy seeks to offer is not simply an account of the conscious intentions of actors but rather an interpretation of what kind of politics is promoted by a moral system. In this regard, a genealogy does not presume that the power interactions that forge dominant norms simply and necessarily reflect the balance of material capabilities, such as military power. In short, because the CW taboo defies rational expectations regarding weapons prohibitions,5y it plays to the strengths of interpretive and constructivist approaches such as genealogy.60The account that follows also offers empirical support against the technological determinism implied in accepting the idea that no effective weapons ever are banned. In opposition to the thesis of autonomous technology, many thinkers in the philosophy of technology have argued that technology is a social, cultural, and political construction, a position that the argument presented here support^.^' As suggested in the research program outlined by Keeley, then, an analysis influenced by genealogy involves the following more specific undertakings: (1)the identification of contending discourses and how they change over time; (2) the identification of features of CW that came to be regarded as essential in disputes over first, the definition of acceptable behavior, second, the naming and evaluation of the weapon, and third, standards of judgment to be applied; and (3) the identification of the various strategies and mechanisms to "exercise power" - that is, to create, transform, or destroy networks of relations that sustain a discourse and the political space that it orders.62 What follows is not an attempt to provide a comprehensive explanation for the CW taboo and its role at each key moment in the history of the use and nonuse of CW. Rather, the remainder of the article has the more modest objective of illuminating crucial aspects of the CW taboo that have been neglected in the literature. For example, this article contributes to the international law literature on CW by providing a more comparative dimension to the analysis of how CW were effectively distinguished from other weapons. In addition, analyzing the hierarchical ordering of violence involved in the operation of weapons discourses offers a more coherent account of violations of the CW ban, a development that has perplexed much of the literature. Even then, an account of all of the important sources, transformations, meanings, resistances, and consequences of the constitution of the taboo is beyond this article's scope.63 In what follows, I identify selected aspects of the taboo without which we cannot adequately understand how CW have been constituted as a category, how they have been delegitimized apart from
Chemical Weapons
47
other w e ~ p o n s ,and how the t ~ b o ohas pers~stedIn the f x e of o c c a s ~ o n ~ l v l o l a t ~ o n In ~ . particul,ir, the following analys~sh ~ g h l ~ g hthe t s role o t three n , resistdmenslons of the t ~ b o o- contingency, h ~ e r ~ r c h y l d o m ~ n a t l oand ance - In the operation of the C,W moral d~scourse.
T h e Political Construction of T e c h n o l o g y
An analysis ot the discourse at the Hague Conferelices reveals that the initial consideration of gas shells was fundamentally different from that of other weapons. Limitations on a number of weapons were discussed at the conferences - submarine mines, muskets, balloons, submarine torpedoes, explosives, field guns, and so on. With the exception of durn-durn bullets and asphyxiating shells, however, the limitations that were agreed upon took the form of proscribing certain uses of certain kinds of weapons. The dominant understanding within which the subject of weapons linlitations was situated was an interpretation of technology as a value-neutral phenomenon. Technologies were not regarded as in and of themselves immoral; their moral value was understood to depend upon how they were used. The unique aspect of the emergent CW norm at the Hague conference of 1899 is that it did not follow this understanding and simply ban particular uses of such shells (e.g., against civilians), while implicitly conferring legitimacy upon their use against soldiers in the field. Rather, the Hague declaration took the form of a more absolute prohibition in that any kind of first use of such weapons was to be regarded as unacceptable. In this way, the ban served to define gas shells as a particular and distinct category of weapon, a phenomenon that subsequently has proved critical in the politicization of CW. This emergent norm was unique in the sense that it anticipated the introduction of a new technology of warfare.'" The protests that accompany the introduction of a novel weapon usually represent the cries of a surprised and technologically disadvantaged victim. The preemptive proscription of a weapon, however, could lend unusual and more universal force to objections to their introduction, for such an act would constitute a breach of a formal agreement of international law reached by the civilized members of the family of nations."' An analysis of the C W discourse during the course of World War I reveals that this is in fact what occurred. To the extent that gas weapons were singled out and politicized ahove and beyond other new weapons, it was not solely because they were perceived as more cruel than other weapons but because it was understood that their use was a violation of the Hague declaration.'" And quite unlike any other weapon, the use of gas weapons was politicized even though they were used solely against combatants. This difference is indicative of the absolute quality of this carving out of a political space for CW. Again, this is not to downplay the importance of a particular moral revulsion toward gas in the development of the taboo but simply to
48
Widening Security
point out other crucial respects in which the CW experience departed from the usual revulsion toward other novel weapons. The CW experience of World War I also was anomalous in that the stipulations of the Hague declaration were adhered to until well into the war. The British development of gas weapons was fully in accord with and dictated by their understanding of the legal stipulations of the 1899 declaration. So, too, British employment of gas weapons was restrained by the nascent CW norm: they only used gas weapons in reaction to German use.67 Similarly, the decision of the French to formally authorize toxic shells was delayed for some time, as French authorities felt bound in some measure by the Hague d e ~ l a r a t i o nNormative .~~ constraints also were important in one further respect. Despite the widespread use of CW during World War I, none of the belligerents intentionally employed CW against civilians even though civilians had been attacked by other means, such as submarine attacks and air raids. This nonevent not only was the product of normative restraint but it also has subsequently helped to set CW apart as a politically potent symbolic threshold, a function these weapons have continued to serve ever since.69 Indeed, it can be speculated that had CW been used against civilians during the war, they would have been grudgingly accepted as yet another inevitability of modern warfare. (Many soldiers who had been exposed to CW resigned themselves to the similar view that CW were just one of many new weapons introduced in the war to which soldiers must accommodate t h e m s e l v e ~ . ) ~ ~ These developments are important because they illustrate significant effects of the discursive definition of CW begun at the Hague conference of 1899 that have gone neglected in CW literature. This neglect is a result of the assumption that the Hague norm could not have played any significant role in the development of the CW prohibition, given its apparent obliteration during World War I. Ann Van Wynen Thomas and A.J. Thomas, authors of one of the most judicious studies of the CW norm, have argued that even if there was a customary norm proscribing the use of CW by the time of World War I, "it did nothing to restrain the use of gas" during that conflict.71 On the contrary, the experience of CW use during World War I demonstrates that the Hague prohibition had carved out a political space for CW - the use of CW was seen as a violation of acceptable behavior, a departure from civilized conduct that needed to be dis~iplined.'~ The peculiarity of this treatment of CW was remarkably in evidence during postwar efforts to reaffirm a ban on gas weapons. At the Washington conference of 1921-22, U.S. Secretary of State Charles Evans Hughes pushed through an absolute prohibition on any first use of CW despite the unanimous recommendations of a subcommittee of experts that "the only limitation practicable is wholly to prohibit the use of gases against cities and other large bodies of noncombatants in the same manner as high explosives may be limited."73 While Hughes was prepared to accept the same kinds of limitations on CW as on other weapons if the proposal had encountered stiff opposition, the resolution was accepted as Article V of the Washington
Chemical Weapons
49
treaty.74 Its acceptance was made possible by the helief of the delegates a t the conference that such a prohibition was neither new nor terribly important. O n the one hand, they saw it as merely reaffirming previous bans (the Hague declaration, whose violation during World War I left little confidence in such treaties, and Article 17 1 of the Versailles treaty, which was essentially an anti-German provision). Furthermore, it was believed that such a treaty was not terribly important as it would not prevent preparations for c l i e ~ n ical warfare. Even though this treaty never came into effect, the clause banning C W lived o n in the sense that it served directly as the basis and even rationale for the Geneva I'rotocol of 1925, which in turn has operated as the focal point of the (:W norm for almost seventy years.-' 111 genealogical fashion, then, the invocation of an institutional tradition as a rationale for renewed efforts t o ban <:W thus obscured a less than glorious ancestry. And as Nietzsche wrote. trL1d~tlon grows more vener,~blethe farther ~ t orlgln s l ~ e sIn the past, the n trom more ~t IS torgotten; the respect p a ~ dt o the t r a d ~ t ~ oaccumulate\ generation t o gener'1tlon; f~n,illythe orlgln becomes sacred and awakeno 'l~e.-(~ These ~ n t e r n ~ t ~ o ntreatles 'll themselves were m'ide poss~bleby an Interwar hysterl'i ~ h o u (t W that was created by the over7ealous lohbymg efforts by c h e r n ~ c ~~ndustrles ~l ,lnd gas warfare dep,~rtments.Espec~,llly In B r ~ t a n and the lJmted States, these b o d ~ e smade "tot,ill\ ~ r r e s p o n s ~ b ... l e exaggeratlons of new weapons developments" In order to secure c h e m ~ c a lt m t t \ -'lnd the surv~\,llof chem~c,llwarfare department\. T h e fearful x e n a r l o s o t tuture d a n g c ~constructed around C W were \o effectwe because they ~ l too late: the same d ~ a l o g u eof dread encountered n o oppooltlon ~ ~ n~tt was w ~ bs e ~ n g~ n s c r ~ p t eby d the opponents o t gas w,i~-fare.-~ In t h ~ swa), a n l Iniclge of C W was constructed tar o u t o t proportion t o the a c t u ~ danger the\ reprewnted a t the tlme. As ,I 5IPRI report noted, "To anyone w h o was ~twould habe prepared t o c o n s d e r the p o t e n t ~ a h t mof C W d~spa\s~onately, heen clear that the chern~calthreat d ~ not d d ~ f f e markedlv r from that posed by h~gh-explos~ve weapon\. Ag,unst well-equ~ppedm d w e l l - d ~ s c ~ p l ~ ntroops, ed the chem~calwe'ipons ot the time would never he o\erwhelmlng; 1 t anyth~ng, thew eff~cacyh'id decl~nedsmce 19 18."'" In short, the C W taboo was reborn trom the 'ishes of World War I not - quite the opposite. But bccausc C W were perce~vedas n i ~ l ~ t a r r luseless y t h ~ sd e p ~ c t ~ oofn C W reveals that the p r o h r b ~ t ~ o1sn best understood as a p o l ~ t ~ c construction al whose ~ n \ t ~ t u t ~ o n a l ~ zh'is a t ~In o nturn helped t o energ17c p o l ~ t ~ c a l l'lnd v legltlm17e the threat t o w h ~ c h~t was supposed t o be a r e a c t ~ o n . ~The " p o l ~ t ~ c ~ ldleyc ~ s ~ vmscrlptlon e of that threat In part was made poss~blebv the m ~ ~ c a l c u l a t ~ oofn sa gas lobby whose strategy backt ~ r e d .t v e n so, the leg~tlmacvo t ~ n t e r n a t w n a ltre'lty law would l~kelynot t legacy of habc been ~ m p a r t e dt o the Interwar CW p r o h ~ b ~ t r own~ t h o u the the Hague d e c l , ~ r a t ~ o nw, h ~ c hu n ~ q u e l yh ~ adl t ~ c ~ p a t ethe d appearJnce o t
50
Widening Security
CW on the stage of modern industrial warfare. Due to a series of rather fortuitous events, then, the dominance of a particular interpretation of CW proved potent in providing the grounds for institutionalizing the prohibition at the level of international law. While a variety of contingencies each played a crucial role in decisive moments in the development of the CW taboo, the prohibition also owed much to the concerted efforts of a series of political leaders who sought to cultivate a public moral revulsion against CW. At the Washington conference, British delegate Balfour had argued that agreement on the prohibition against CW was desirable in order to "do something to bring home to the consciences of mankind that poison gas was not a form of warfare which civilized nations could tolerate."" Even more explicitly, U.S. delegate Elihu Root expressed his belief that, "the opinion of the people of civilized nations had tremendous force and exercised a powerful influence on the condition of the belligerents. ... The public opinion of mankind was not the opinion of scientific and well-informed men, but of ill-informed men who formed opinions on simple and direct issues. If the public could be confused, public opinion was ineffective; but if the public was clear on the fundamentals of a question, then the opinion of mankind was something which no nation could afford to ignore or defy." The purpose of the proposed treaty, according to Root, was thus "to put into such simple form the subject which had so stirred the feelings of a great part of the civilized world that the man in the street and the man on the farm could understand it."x2 During the interwar period and into World War 11, a crucial factor in the continued obloquy against CW was the existence at the highest political levels of decision makers who sought to uphold the international prohibition against the use of CW out of humanitarian concern, even if it meant giving up a military a d ~ a n t a g eThe . ~ ~ moral obloquy that has come to be associated with CW since 1925 has coalesced around these practices, which instantiated the international prohibitionary norm against CW as embodied in the Geneva Protocol.
The Discipline of Civilization Since its origins, the prohibition against CW has come to function as a symbol of the hierarchical relations of domination in the international system. It was seen above that the Hague ban was in a particular sense an absolute prohibition. It was not, however, unreservedly universal. Strictly speaking, the declaration established a discriminatory regime insofar as its language stipulated that the ban against asphyxiating shells was "only binding on the Contracting Powers in the case of war between two or more of them." Furthermore, the declaration stated that "it shall cease to be binding from the time when, in a war between the Contracting Powers, one of the belligerents shall be joined by a non-Contracting Power." Those contracting
Chemical Weapons
51
powers were the nations that would count as the members of an emerging society of civilized states. That is, one of the qualifications for gaining the status of a civilized nation was to partake in the regulation of warfare that began among the European society of states in the mid-nineteenth ~ e n t u r y . ' ~ The emerging awareness of a standard of civilization during this period is noteworthy for this study in several respects. First, part of the larger historical explanation for the origins o f the CW taboo lies in the emergcncc of concentrated and organized attacks on the institution of warfare as immoral and uncivilized during this period. While it generally was still believed at this time that war was natural and inevitable, the rise of these voices of protest led to efforts to ameliorate warfare, most notably the Hague confere~ices." Second, the brandishing of a standard of civilization in connection with the CW taboo recalls some earlier weapons bans in history. In particular, the oft-cited Lateran Council decree of 1I39 outlawed the use of the crossbow, but only against Christians; against heathens, the crossbow was deemed an entirely appropriate weapon.xhThis tendency to permit the use of otherwise outlawed weapons against an alien "other" has been observed by Robert O'Connell, who has drawn a comparison to the savagery of interspecific competition as opposed to the circumscribed rituals of intraspecific competition." To some extent, the contractual language of the Hague conterences implicates the origins of the CW taboo in such exclusionary practices. Nevertheless, the Hague ban differed from earlier bans since it was reached before any nation actually had such weapons in their arsenal. This situation permitted the circumvention of the amoral monopoly that often accon~paniesthe exclusive possession of a novel method of warfare. That is, the historical record indicates that moral qualms about the use of novel technologies of destruction issue most prominently ( i f not surprisingly) from those upon whom the weapons initially are inflicted. Moral objections may continue oncc the monopoly is lost and the initial victim incorporates the new weapon (as with the crossbow), but the overwhelming tendency is for such moral concerns to fall by the wayside as the possibilities of technology are embraced by more than one party. With asphyxiating shells this was not the case. As alluded to earlier, the moral protests that accompanied the first use of such weapons were not simply the usual cry of the unsuspecting victim but were an expression of outrage at the violation of mutually agreedupon conduct among the club of civilized nations. The significance of this feature of the prohibition, then, lies in the fact that such a ban is not so easily dismissed once the other attains the novel weapon. The unique character of the effort at the Hague to institutionalize 1 ' proh~b~t~ agalnst on the e n t m category of we'Ipon5 known as asphyx~atmg shells thu5 comes to assume more Importance than 1s usually acknowledged i n the CW I~terature. If the symbol~cconnection of CW w ~ t hthe standard of c~vrl~zed conduct has made ~t more d ~ f f ~ c ufor l t advanced natmns to employ these weapons as lust another unremarkable, u n p o l ~ t ~ c ~ z and e d , standard means of w ~ r f a r e ,
52
Widening Security
it has also played a part in the use of CW against "uncivilized" areas. The invocation of the disciplining discourse of civilization was in operation during the two most significant violations of the CW taboo since World War I: their use against Ethiopia by Italy in 1935-36 and during the Iran-Iraq War of the 1980s. The use of CW against Ethiopia led some to expect - and fear - that their employment would be a matter of course during World War 11." For others, however, the assessment was different: war among the industrialized nations of Europe was a different matter than conflicts involving less technologically advanced areas, such as the colonies.89 The surprising lack of gas warfare during World War I1 can thus be understood as implicated in a process by which the conduct of war among "civilized" nations was demarcated from that involving "uncivilized" nations. As George Quester has put it, a standard view of world affairs after Versailles was that the arenas of European war and colonial war might well have been separable.y0And the use of CW, while still abhorrent, might be less unacceptable in one area than another. This phenomenon of differentiation in the acceptability of forms of warfare has received attention from a number of authors, most forcefully perhaps by John Mueller. For Mueller, major war - war among developed states - has been subject to a gradual obsolescence that has not occurred in other areas of the globe.91The occasional ruptures of the CW taboo reflect the understanding that modern warfare between industrialized powers is qualitatively different from war involving an uncivilized country.y2 As the Italians argued, the "Ethiopians have repeatedly shown she is not worthy of the rank of a civilized n a t i ~ n . " ' ~CW signified this difference: among advanced nations they served as a potent symbol of prohibitive levels of modern destruction, pregnant with the possibility of a standoff maintained at levels of destruction lower than what was technologically possible. At the same time, they were implicated in the process of the hierarchical ordering of international politics into the civilized and uncivilized arenas. On these and other grounds there are significant parallels between Italy's use of CW against Ethiopia and Iraq's use of CW during the Iran-Iraq War. Iraq did not even admit to the use of CW until the last year of the war. Even then, Iraq's leaders stated that they supported the general rule prohibiting the use of CW and justified their use as the "right to defend itself and protect its territorial integrity and its homeland."94 One need not attribute too much credence to Iraq's claims to abide by the CW norm to notice that something significant had not occurred: a reopening of what has over time become the humanitarian core of the CW norm. During World War I, the Germans explicitly questioned the very purpose and integrity of the norm prohibiting CW by arguing that gas weapons were no less humane than the guns and howitzers, which made life in the trenches such a "terrible helLX9'And during the 1920s, so vociferous were the arguments that CW actually were more humane than other weapons that the Geneva Protocol was rejected by the U.S. Senate. Typical of such a position was the contention of Senator Reed that the CW ban would prevent the
I
Chemical Weapons
53
United States "from using gas against the next savage race with which we find ourselves in war, and would compel us to blow them up, or stab them w ~ t hbayonets, or r~ddlethem and sprlnkle them w ~ t hshrapnel, or puncture them w ~ t hmachlne-gun bullets, ~nsteadof hllnding them for an hour or so until we could d ~ r a r mthem. That IS the 'human~ty'that IS attempted to he worked out by the Geneva Protocol."'" As w ~ t hthe Ital1an5 In 1935-36, however, the Ir,~q,smade no attempt to
leglt1m17etheir use of CW on the b a s ~ sof the alleged humanltar~anqual~ties of CW. Lracl'5 u n w ~ l l ~ n g n etos ~challenge the vlem that C W are p a r t ~ c u l a r l ~ hemous is lndicatlve of a substantial strengthen~ngof the norm over tlrne. Th15 strengthen~ng1s In turn due to the acceptance of a human~tariand ~ m e n slon that has hecome ~ n ~ r e a s ~ n ley5 g l y open to quewon. The foreclos~ngof the humanltar~anchallenge to the CW taboo o n e s much to the legacy and n In ~nternat~onal law: the G e n e ~ a leg~trmacyot the CW p r o h i b ~ t ~ oemhrmed Protocol has ~nip,irted,7n ~nstttutwnalImprlrnatur to the vlew that C W are ~nhuinanethat has been denled to opponents of the taboo.
The Weapon of the Weak Another manifestation of the disciplining aspect of the CW discourse has been the characterization of these weapons as a weapon of the weak. The condescending overtones of the designation of CW as the "poor man's homh" recalls the effecti,.e moral obloquy attached to poison as a cruel and treacherous weapon and echoes its disdain for an equalizing weapon of the weak. I.ow-cost and efficient weapons of destruction are derided as an insufficient entry fee into the club of civilized warfare manned by industrial1 technological powers."This disciplining discourse has not issued solely from the developed world, however. In a July 1988 statement defending the use of CW, Iraqi Foreign Minister Tariq Aziz ventured to argue that "There are different views on this matter from different angles. You are living on a civilized continent. You are living o n a peaceful continent."" CW indeed were a symbol of unacceptable violence - at least among civilized countries. Aziz expanded upon this view a year later. In response to a comment that the parallel between nuclear weapons and (:W (implied in characterizing CW as the poor man's bomb) was a specious one, insofar as the former are deterrent whereas the latter have never prevented war, Aziz responded that "The strategic conditions prevailing in Europe cannot be applied to our region. The Eastern and western countries have achieved a balance and war has become virtually impossible. The two sides have therefore shown their readiness to take disarmament measures. The situ:ition in my region bears no resemblance to that. The causes of insecurity have not yet been elimi~lated. Neither Israel nor Iran has shown sufficient desire to live peacefully with its neighbours. It is therefore unrealistic to ask the Near East states to abandon a particular type of weapon until there is a real prospect of peace.
54
Widening Security
But I do not say that we are opposed to the Paris conference's objectives. We agree with them. We just hope that parallel disarmament efforts will be developed in both spheres - nuclear and chemical weapons."99 In short, the disciplinary implications involved in characterizing CW as the poor man's bomb have been turned on their head. The link between the two classes of weapons established by the analogy has been appropriated by some nations in the developing world - the Arab nations in particular - by situating it within a broader discourse of "weapons of mass destruction." This discursive usurpation was notably in evidence at the Paris conference of January 1989, which had been proposed by the United States to reinvigorate the norm prohibiting the use of CW in the aftermath of the Iran-Iraq War.''' At this conference, representatives of Arab and other countries requested the establishment of a link between nuclear and chemical disarmament and declared that there could be no question of applying to CW so discriminatory a rationale as that of the nonproliferation treaty on nuclear weapons. They demanded that the process of prohibiting C U must be part of a process to prohibit the entire category of weapons of mass de~truction.~Ol As Egypt's foreign minister stated at the conference, "It would not be logical for the international community to permit to some countries in the most sensitive regions of the world the nuclear option without the least international control, while the same international community demands the total prohibition of chemical weapons. We consider that the progress in the field of the prohibition of chemical weapons is linked to the realization of a parallel prohibition on the level of nuclear weapons."lo2 For the industrialized world, the category of weapons of mass destruction has served as the touchstone for efforts to curb the proliferation of advanced weapons systems in the Third World. The Arab world, however, has appropriated this discourse in a manner that has made explicit the double standard in the antiproliferation designs of the industrialized world: while the Third World is re vented from acquiring deterrents such as nuclear or chemical weapons, the Western powers are permitted to retain their weapons of mass destruction - conventional and otherwise - as legitimate tools of diplomacy.'03 Israel's undeclared nuclear arsenal is a particular concern in this strategy of linkage, and it was on these grounds that the Paris conference polarized opposition between a North anxious about proliferation and a South intent on redressing the selectivity and imbalance in the international proliferation regime.lo4 This appropriation of the mass destruction discourse is a remarkable example of an attempt at the kind of interpretive reversal that Nietzsche and Foucault had in mind in their writings on moral discourses. As Foucault wrote, "The successes of history belong to those who are capable of seizing these rules, to replace those who had used them, to disguise themselves so as to pervert them, invert their meaning, and redirect them against those who had initially imposed them." lo5 Most important to note for the purposes of this article is the effect of this attempted usurpation on the illegitimacy of CW. Taken to its extreme, the
Chemical Weapons
55
d~scursivelinkage of CW to nuclear weapons through the weapons-of-massdestruct~oncategory could have deleterious unpl~cattonsfor the robustness of the CW taboo. On b,llance, however, this oper'ltton has had the effect ot r e ~ n f o r c ~ nthe g ~ l l e g ~ t ~ m aofc yCW. Acceptance ot the leglt~macy of the weapons-ot-mass-destruct~on d ~ s iourse lnvltes the questlon of why other enormously destructive convent~onal weapons are not ~ncludcdIn t h ~ scategory."'" D u r ~ n gthe Persian Gulf W'lr, this question was in fact raised by Iraq's envoy to the llnited Nations, Ahdul Arnir Anhari. He stated that "We consider use of mass destructive weapons against Iraq would justify Iraq to use, unfortunately, mass destructive weapons," adding that if the massive bombing from high altitude continued, these bombs could then he considered weapons of mass destr~ction.'~'To this point, attention on the disjuncture between the category of weapons of mass destruction and the capabilities of modern conventional weapons has remained 3t the margins of the international agenda. So too, however, has the reverse operation of questioning why uncontested members of the delegitimized cluh - nuclear and chemical/hiological weapons - are unacceptable. On the contrary, the overall thrust of the weapons discourse has been to expand the definition of unacceptable weapons rather than to restrict or abolish it."'" In this way, inclusion of CW in this category constitutes a unique development in the history of the legitimacy of weapons technologies. Quite unlike the iisual pattern of receding moral restraints on weapons, the weapons-ofmass-destruction discourse is in one respect an unparalleled extension of the category of illegitimate weapons. One corollary of the thesis that restraints on weapons technologies are always doomed to fail is the notion that new, more destructive technologies make previous weapons somehow seem less horrible. As a result, the old weapons gradually become incorporated as standard means of warfare. Rather than banishing the moral rejection of CW into the quaint dustbin of protests against new weapons technologies, however, the invention of nuclear weapons has perpetuated and reinforced the CW taboo via the discourse of mass destruction. In other words, the advent of nuclear weapons has not made CW seem less horrible or more humane. Finally, while the linkage to nuclear weapons could serve to justify the possession of CW as a deterrent, it has not legitiniizect the actual use of CW. This is so because even though the possession of nuclear weapons is seen as a legitimate pursuit by some members of the international system, their use in warfare is not.'"' If anything, the taboo against using nuclear weapons is in all likelihood stronger than the taboo against using CW. Thus, while the coupling with nuclear weapons is not an unambiguously positive development for the robustness of the CW taboo, on balance its effect has been to distance CW from the arsenal of standard and acceptable means of warfare. The use of CW has become no less controversial a political event by virtue of the invention of nuclear weapons. The universality of this delegitimizing operation with respect to CW ultimately may be contingent upon a corresponding decrease in the allure of
56
Widening Security
possessing nuclear weapons. This has become the primary axis of contestation around which revolves the acceptability of a p r ~ h i b i t i o n a rnorm ~ against CW. The resistance of the Arab world to the Chemical Weapons Convention (CWC) is centered on this disparity.l10 By transforming the CW norm from a taboo against use into a prohibition on possession, the convention is perceived to perpetuate a discriminatory disarmament regime, which permits the possession of nuclear weapons by some nations but denies weapons of mass destruction to other nations. The argument I make here is that this shift in the site of contestation of the norm - from earlier debates over the alleged humanitarian benefits of CW to contemporary efforts to extend the nonproliferation regime of weapons of mass destruction - is indicative of the consolidation of the taboo over time. Resistance to the transformation of the norm from use to possession is restricted to a small group of nations."' In addition, the main thrust of this resistance has not challenged the unacceptability of using CW so much as it has questioned the legitimacy of possessing other weapons of mass destruction, including the definition of what counts as such a weapon.
Conclusion The origins, development, and functions of the CW taboo attest to the value of a genealogical analysis of meanings, which searches out the contingency, domination, chance, and resistances involved in the operation of a moral discourse. While it exhibits all of these things, the CW taboo is also testimony to the genuine moral rejection of a means of modern warfare that arose a t a particular historical juncture - one that questioned the untrammeled technological warfare among the advanced industrialized states of the civilized world. In addition to the factors habitually identified in the literature as explaining the CW taboo, this study has uncovered further dimensions of this prohibition that are no less important in giving an adequate account of its origins and persistence. The importance of these elements - the portrayal of CW as a weapon against which there is no defense, its symbolic connection with a notion of civilized conduct, the castigation of CW as a weapon of the weak akin to poison, the genealogical legacy of the institutionalized form of the taboo promoted and practiced by political leaders, and so on has varied at different moments in the CW experience. In total, however, all have combined to constitute a tradition of practice that forbids the use of CW and characterizes it as abnormal behavior among the society of states. Interpretive and constructivist approaches to phenomena such as norms in international relations can only enrich our understanding of the world of global politics. However, the disciplinary hegemony of neopositivist modes of inquiry in the field of international relations has in the past served to narrow the range of what counts as legitimate scholarly activity. This methodological
I'
+
Chemical Weapons
57
c o n f o r m ~ tha\ ~ been c'lrrled to such extremes that some scholars - In the d end of the cold name of defending t h e ~ rpreferred theory - have d ~ s m ~ s s ethe war as an ~ n s r ~ n ~ f ~data c a n polnt t that does not fals~fyw e n t ~ f theory, ~c rather t h , ~ nallowing that other modes of lnqulry may contrrbute t o the accumulatlon of knowledge by the community of scholars. I \ thus a welcome develThe recent Influx of " p o s t p o s ~ t ~ v ~ methods st" o p m e n t for thc field."' On the other hand, t h e adoption o f putat~vclynovel methods of lnqulry can all t o o e ' d y turn into a f a d d ~ s hr e p l ~ c a t ~ oofn the very phenomenon that was to be deposed In the flrst place: the c h o ~ c eof '1 method for ~ t own s s,~ke.The startlng p o ~ n tfor drawlng from the lns~ghts ot methods such as genealogy 1s the convlctlon that research should be que"t")n- r,~thcr than m e t h o d - d r ~ v e n . ~ "Methociolog~esshould be judged l, and f r u ~ t f u lavenues o t by t h e ~ rvaluc In openlng up ~ n s ~ g h t f uImportant, lnqulry and t h e ~ rab111n to p r o v d e appropriate 'lnswers to the questions the) pose.
Author's N o t e Earlier drafts of this article \vc.1-e presented at Cornell Uni~crsiry'sPeace Studies Progr,iiii; a Social Sc~enceRewarch < ~ o t ~ ~ ~ c ~ l / M a c Aworkshop rtliur on norms and national securit); Ithaca, New York, February 1993; a n d the annual meeting of the American Political Science Associat~on,Wxhington, I).(:., 2-5 Septernher 1993. I thank rhosc who comriiented o n the pdper at those forums, as bvell .is Joseph C ~ m ~ l l e rPeter i, Karrensrein, Stephen Krnsnet; Judith Reppy, <:hr~st~.ln Heu-Srnir, Henr) Shue, L)anlel Thoti~as,Alexander Wendt, Mark Zaclier, and three anonymou., re\lewer\, .ill of \vIiom provided valu:~hleconirnents on v.lrlou\ version\ of this pu)ject. I gratefully acknowledge the support ot .I Social Sc~encesand Humanities Kese.lrcli Council o t C d n a d ~doctornl fellowship. The epigraph is fro111 t:r~edr~ch Nietrsche, Rcyotd (;ood iarzri t ~ ~tr,In\. l , W,ilter K,lutmann ( N e w York: V ~ n r ~ gBook\. c. 1 %6), apliori\m 108.
Notes
addre\\ biologic,il weapon\. 2. Alfred T. MCilian, U.S. deleplte t o the H,igue I'ex-e C.o~~teretlces, is quored in Janies Iirown Scott, 7%13 /'rocccririrgs of tlw H~lgric,l'cczce Coirfercnc-cs ( N e w York: Oxford Univer\it!. 1'1-e\\. 1920), p. .Zhh. ;. Stockholm Inrcrnat~cmilI'eace Ke\earcli Institute (SII'RI), T / J /'roh/cwz ~ of ( , ' ~ ~ c w r i ~ - ~ r / i r ~ ~ d N i o l o g ~ ~ z\Y'dr/irr?, I vol. 4, (:I1 />rs~z~~?rriz~ircnt Nr,
58
Widening Security
5. See SIPRI, The Rise of CB Weapons, pp. 321-22, and 334; and Brown, Chemical Warfare, pp. 293-96. 6 . Without dismissing altogether a role for the CW prohibition, Legro offers an organizational culture explanation for the unpreparedness of militaries and the nonuse of CW. See Jeffrey Legro, Cooperation Under Fire (Ithaca, N.Y.: Cornell University Press, 1995). 7. The quotation is from Paul Harris, "British Preparations for Offensive Chemical Warfare 1935-1939," ]oumaI of the Royal United Sevvices Institute for Defence Studies 125 (June 1980), p. 61, emphasis mine. Similarly, the international legal restraints against CW were at least partially responsible for the low priority given to CW allocations in Germany. See Dr. Hans Fischer and Dr. Wirth, "What Were the Plans and Intentions of the German High Command in the Question of Using Chemical Warfare? What Were the Reasons for Refraining from the Use of Chemical Warfare?" Historical Office of the Chief of the Chemical Corps, German Chemical Warfare, part 2, Civilian Aspects (Washington, D.C.: Historical Office of the Chief of the Chemical Corps, 1956), p. 328. 8. The no-first-use pledge was not written into the protocol itself but instead resulted from the reservations most nations attached to their accessions. These reservations stipulated that the protocol would cease to be binding toward any power that violated it. 9. See Herman Ochsner, The History of German Chemical Warfare in World War 11, Part 1, The Military Aspect (Washington, D.C.: Historical Office of the Chief of the Chemical Corps, 1949), p. 23; and Omar N. Bradley, A Soldier's Story (New York: Henry Holt and Co., 1951), p. 279. 10. See Robert Harris and Jeremy Paxman, A Higher Form of Killing: The Secret Story of Chemical and Biological Warfare (New York: Hill and Wang, 1982), p. 135; Ochsner, The History of German Chemical Warfare in World War II, p. 23. 11. See SIPRI, The Rise of CB Weapons, p. 325; and Harris and Paxman, A Higher Form of Killing, p. 325. 12. The maintenance of the taboo owes no small part to the fortune of history that such circumstances never arose and to the subsequent importance of the resulting abstinence (whatever the reasons), which built a tradition of nonuse and reinforced the stigma against CW. The fact that CW were not used during World War I1 has in and of itself become a major justification for the CW prohibition. For example, during U.S. Senate hearings over Iraq's use of CW in the early 1980s, it was remarked that CW surely were reprehensible since even Hitler did not use them. No one present knew why Germany refrained from employing CW during World War 11, but the salient fact remained: "We do know it did not happen." See U.S. Congress, Senate Committee on Foreign Relations, United States Policy Toward Iraq - Human Rights, Weapons Proliferation, and International Law: Hearing Before the Committee on Foreign Relations, l 0 l s t Congress, 2d sess., 15 June 1990, p. 51. 13. These are the words of Major General Henderson. See Harris and Paxman. A Higher Form of Killing, p. 110. 14. According to a military intelligence officer, the war was expected to he "chemical probably from the very first hour." See Melissa Healey, "Chemical Attack Would Escalate Allied Retaliation," Los Angeles Tunes, 21 February 1991, p. Al. 15. See United Nations Security Council, doc. Sl24828; and Chemical Weapons Conventton Bulletin, no. 17, September 1992, p. 12. 16. Quoted in Healey, "Chemical Attack Would Escalate Allied Retaliation". 17. Thus, CW were not used even as other restraints against US. use of CW versus the Japanese began to erode toward the end of the war. These included the death of President Roosevelt, who had been staunchly opposed to CW use, and the effects of American racist propaganda, which demonized the Japanese and made the use of gas more palatable to much of the American public. See SIPRI, The Rise of CB Weapons, pp. 294-335. 18. Although the United States did not use lethal CW in Vietnam, it did use riot-control agents and defoliants, maintaining that use of those agents did not constitute chemical warfare. See ibid., pp. 162-210. Allegations of Soviet use of CW in Afghanistan, while rampant in the atmosphere of the cold war, never have been substantiated.
I I
Chemical Weapons
59
19. In a sirnil,lr ,pirir, the first volume of the SIPRI study argues that while many factors prcvrnteci the usc of CW, "at a deeper level, there was the whole question of accepting gas as 1' weapon o f war, w ~ t h~ l the l ~ n s t ~ t u t i o nand ~ ~ lp s y c h o l o g ~ c ~disturbances l that this w o ~ ~ l d involve." See ihid., p. 3 3 1. 20. See, for exan~ple,Nicholas F o t ~ o nand Gerard t l f s t r o ~ n Milttciry , Ethics: Gzlid~l~ttes for P C L ~ unci C P Wtrr (London: Routledge and Kegan Paul, l986), p. 168. 21. John Haldanc, "F.thics and Biological Warfare," Arms Control 8 (May 1987) pp. 24-35. Although ni.tdc rcgnrd;nr: h;ologic~ilweapons, Haldane's comment< are still relevant. See :ilso Martin Van Creveld. Techtrology c7nd War (New York, Free Press, 1989), p. 72. 22. Michael M,indeIbau~n. T h e Nuclear Revoltition ((Lmbridge, England: Cnmhridge University Press, 198 l ) , chap. 4. 23. Indeed, this taken-for-granted q u a l ~ t yof the poison t ~ h o owas In evidence at the H a g ~ ~ e Conferences. Article 2 3 ( a ) banning poison was reached w ~ t h o u tcontroversy o r even substantive discuss~on;the moral t ~ h o oagainst polson had become .in uncontested norm that needed no rationale or j~ist~ficatioti. See William 1. Hull, T / J CTtuo H'zgue Conferences (Boston: G ~ n n anti Co., 1908), pp. 232-3.3. This was in evidence some years earlier a t the Brusselq confer1 . i ~(Boston: D.C. Heath, 1923), ence. See T.J. I,,lwrence, Pritrriples of lnt~rnat~onerl pp. 55-56; and lames Lor~mer,T I J institutes ~ of thc 1 . m ~of~ Ncrfions(Edinburgh: Blackwood and Sons, 188.3), Appendix 1. 24. For references to the e,irly disdain for poison see Hugo Grotius, T / J I ~. ~ I Lof~ W h cznd Peare (Ile lure Kelli ac P,ic~sLibri Tres), trans. Francts Kelsey (New York: Bobbs-Merrdl, l925), bk. 3, c h ~ p s .15-16; Adatn Roherts and R~chardGueltt, Documents o n the 1.~710sof War (Oxford: Clarendon I'ress, I Y82), p. 29; and A.A. Roherts, Poison in W~lrfare(1.ondon: William Heinem;lnn, 1915), pp. 52-57. 25. C h r g Schwarzenberger, I.c~ulity of Nttclrar W ( W ~ O I(1.vndon: IS Stevens and Sons, 1958). p. 31. 26. Grot~us,I ~ t of v K(New York: H . Vinal, 19281, pp. 13 1-32. 29. W.T. M,lllison, "The 1.aws of War and the luridical (:ontrol of Weapons of M a \ Destruction in General and 1.1m1tedWars," George Washington I.aw Reuiew 36 (L)ecernhrr, 1967). pp. 308-46. The quotation is drawn from p. 318. 30. William V. O'Brien, "B1olog1cal/C:he111iC31Wartare and the International Law o f War," T h c (;eorgetou~nLaw Journal .Sl (Fall 1962), pp. 1-63, 3 1. Asphyx~at~ng shells were discussed at The Hague even though they had yet to be developed. Isolated precursor\ of chemical warfare had appeared sporadically in the h~storyof warfare, but their appearance was so rare that they play a negligible role in the development of a C W discourse. The history ot such methods can he found in Rudolf Hanslian, ed., Dcr Chemisc/~cKrreg (The chemical war), vol. I (Berlin: E.S. Mitler and Son, 1937), pp. 1-8; Wvndham M~les,"The Ide'l o f Chemical Warfare in Modern T~mes,"Journal of the History of
60
Widening Security
Ideas 31 (JanuaryIMarch, 1970), pp. 297-304; SIPRI, The Rise of CB Weapons, pp. 125-27; and Alden Waitt, Gas Warfare (New York: Duell, Sloan, and Pearce, 1942), pp. 6-12. 32. The conventions, declarations, and other relevant documents of the Hague conferences are reprinted in James Brown Scott, ed., The Hague Peace Conferences of 1899 and 1907, vol. 2, Documents (Baltimore, Md.: The Johns Hopkins Press, 1909). 33. Ibid, pp. 365-66. The declaration was the product of the Second Subcommission of the First Commission, which was dedicated to discussions on limiting explosives. 34. A.D. White, The First Hague Conference (Boston: World Peace Foundation 1912), pp. 82-83. 35. Suggestions to use choking smoke from ships in the Crimean War were rejected by the British because its effects were perceived to be so horrible that no honorable combatant could use the means required to produce it. See Miles, "The Idea of Chemical Warfare in Modern Times"; and Clarence J. West, "The History of Poison Gases," Science 49 (2 May 1919), pp. 412-17. 36. See, for example, Calvin DeArmond Davis, The United States and the First Hague Peace Conference (Ithaca, N.Y.: Cornell University Press, 1962), p. 175. 37. Excellent discussions of this distinction can be found in Charles Taylor, Sources of the Self (Cambridge, Mass.: Harvard University Press, 1989), pp. 202-3; Charles Cross, "Explanation and the Theory of Questions," Erkenntnis 34 (March 1991), pp. 237-60; and Martin Hollis and Steve Smith, Explaining and Understanding International Relations (Oxford: Clarendon Press, 1990). 38. See Stanley Hoffmann, "An American Social Science: International Relations," Daedalus 106 (Summer 1977), pp. 41-60; and Steve Smith, "Paradigm Dominance in International Relations: The Development of International Relations as a Social Science," Millennium 16 (Summer 1989), pp. 189-206. This focus also has tended to characterize rationalist regime theory of international relations scholarship, as exemplified by Stephen Krasner, "Structural Causes and Regime Consequences: Regimes as Intervening Variables," and Robert Keohane "The Demand for Industrial Regimes," both in Stephen Krasner, ed., International Regimes (Ithaca, N.Y.: Cornell University Press, 1984), pp. 1-21 and 145-71, respectively. 39. On this characteristic of international relations theory, see Steve Smith, "The Forty Years' Detour: The Resurgence of Normative Theory in International Relations," Millennium 21 (Winter 1992), pp. 489-506; and Friedrich Kratochwil, "The Embarrassment of Changes: Neo-Realism as the Science of Realpolitik Without Politics," Review of International Studies 19 (January 1993), pp. 63-80. 40. On different styles of interpretive analysis, see David Hiley, James Bohman, and Richard Shusterman, eds., The Interpretive Turn (Ithaca, N.Y.: Cornell University Press, 1991); Paul Rabinow and William Sullivan, eds., Interpretive Social Science: A Second Look (Berkeley: University of California Press, 1987); and Fred Dallmayr and Thomas McCarthy, eds., Understanding and Social Inquiry (Notre Dame, Ind.: University of Notre Dame Press, 1977). On the relationship between genealogy and interpretation, see Michael Gibbons, "Interpretation, Genealogy, and Human Agency," in Terence Ball, ed., Idioms of Inquiry: Critique and Renewal in Political Science (Albany: State University of New York Press, 1987), pp. 137-67. 41. Nietzsche is paraphrased by Alexander Nehemas, Nietzsche: Life as Literature (Cambridge, Mass.: Harvard University Press, 1985), p. 110. 42. See especially Friedrich Nietzsche, On the Genealogy of Morals, Walter Kaufmann and R.J. Hollingdale, trans. (New York: Vintage Books, 1989). This concern recently has gained adherents in the natural sciences. In his work on evolutionary theory, Stephen Jay Gould has expounded upon his contention that "current utility may not be equated with historical origin." See, for example, the chapter entitled "Of Kiwi Eggs and the Liberty Bell," in Bully for Brontosaurus (New York: W.W. Norton and Co., 1991), p. 114. 43. Nietzsche, On the Genealogy of Morals, Preface 3. 44. The term "interpretive" highlights the differences between the "how" questions of understanding meaning and the "why" questions of explaining causal outcomes, while the term "constructivist" calls attention to the ontological assumptions and causal models that distinguish postpositivist methods from the naturalist premises of positivism. See Alexander Wendt, "Anarchy is What States Make of It: The Social Construction of Power Politics," International
1'1 :I
(%
Chemical Weapons
61
Organization 46 (Spring 1992), pp. 3 9 1 4 2 5 ; Alexander Wendt, "The Agent-Structure Prohletn in International Relatwns Theory," lnternatiotzal Organiziztron 4 1 (Summer 198?), pp. 335-70; Friedrich Kratochwil, "Reg~mes,Interpretation, and the 'Science' of Politics: A Reappra~sal," Millenni~rm27 (Summer 1988), pp. 263-84; and Mark Ncufeld, "Interpretation and the Science of International Relations," Keuicw of I n t r r ~ a t i o n a Studies l 19 (.January 1993), pp. 39-6 I. 45. Nietzsche, O n the (;cncalogy of Morals, 3rd essay, aphorism 2 3 (hereafter cited '1s 3.23); eniphasis origin'il. 46. Michrl Fc,ucault, "Nictzacllc, Gcncalogy, Hisrory," In I'JLI~ Rabinow, rd., The Fl~rrrdrrit Rc~ldcr(Pantheon Kooks: New York, l984), p. 79. 47. Nehemas, Nietzsche, p. 11.3. The quotation IS froni Fouc:iult, "Nietzsche, Genealogy, H~story," p. 78. 48. Nietzsche, O n the G e n ~ a l o ~ofy Morals 2.12. 49. Foucault, "Nierz\che, Genealogy, History," p. 8 0 50. Nehemas. Nietzscl~r,pp. 98-1 13. 51. See, tor example, the following works by Michel FouGiult, The Archaco10,qy of K n o w l e d ~ ea n d t / ~ rlliscolrrsc on 1.ilnguirge (New York: I'antheon Books, 1972); The Hlstor?, of Sexu~rlit): vol. I, An Introriltction (New York: Vintage Books, 1990); and Powc~r/Kno~rilc~cige: Sclccted l n t c r l w l s nnd O t l ~ e rWriti~~gs. 1972-1977, ed. C. Gordon (New York: Pantheon Rooks, 1980). 52. James F. Keeley, "'Toward ,I I ' o ~ ~ c a u l d l mAn,lly\is of International Reg~mes," Intcwzatronid Or,qlrrizatiolr 4 4 (Winter 1990), pp. 8.3- I Oi. 53. See the tollowing works by Michel Foucault: I>iscrplirze ilrrd Pirnish (New York: Vintage Kooks, 1979); l ' o ~ i ~ e r / k ' n o i c ~ l and c ~ ~ iI'olrtrcs, ~ ~ ~ ; l'hdosophy, Crtltrrrc (New York: R o ~ ~ t l e d g e , 1990). 54. Roxanne l.ynn Dot?, "The Social Construct~on ot Contemporary Intern,ltion,ll H~er,irchy." vol. I, 1'h.D. d i s , University o f Minnesota, 199 I, pp. 26-27 a n d 69-70. 55. David Couzens I-lo), "lntroductton," In I h v i d Cou/en\ Hoy, ed., F o ~ c a u / t :A Cr.rtrrLll Kradcr (Oxford: B a \ ~ lBlackwell, 19891. p. IS. s 56. Kratochwil IS caretul to polnr O I I ~In his work o n norms that power is not h ~ partlcular focus of concern. Rather, he concentrates o n the consen\u.ll choices of reasoning that lead t o collectrve knowledge. He acknowledges, however, t h ~ under\tanding r how socially J o l i i ~ n ant understandings hccomc nuthorir.~tiveinvolves investigating not simply ratioml dehates hut also h~storrcaland cultural cxpertences - the focus of the genealog~sr's~ n q u ~ r i eSec s . Friedr~cli K r , ~ t o c h w ~ lR~rlrs. , Norr~rs. m d D c ~ i s i o t ~ sO : n thc Cotrcirtions of Pmctical m d l.egnl Keasorzing in Ir1tc~m~7tioml lielatiotrs 'rnd llomcsti~.Affilrrs iC:~nihridge:Cambridge IJn~versit) Pres\, 198Y), p. .;i. 57. J,imes Der Derian, 0 1 1 l)rplorm~c-~~ (Oxtord: Basil Kl~ckwcll,1987). p. 48.3. 58. On the s~lenceof r a r ~ o n a l ~ s,~pproaches t to questions concerning the c o n s t ~ t ~ ~ r iofo n identities , ~ n dInterest - ~ n dthe c o n t r i h ~ ~ t ~ oont s constructi\ist ,~pproaches- see Wendt, "Anarchy IS What States M i k c of It." 59. As ch,~racter~zed by othe~-s,the C W taboo represents ,In "irrational" attit~lderow.lrds technology and 1' "psycho-culturd s i v e r ~ ~ that o ~ ~ simply " t'lils t o meet the realist expect,~rion th,~reffective p r o h ~ h t ~ o ,Ire n s attained 0111) tor useless weapon\. See Van C:revcld, Tc.cl~ilolo,qy L I I Z K1~7r, ~ p. 177; ' ~ n dManfred I<. Hamm, "Ikterrence, Chemical W'lrfare, and Arms (:ontrol," Orbrs 2 9 (Spring 1985), pp. 1 19-1 6.3 at p. 1 19, respect~vel~. 60. AS such, it answers the call for interpretive ,~ppro,~ches to the study of norms rn,~deby Fr~edrichKratochwil and John Gerard Ruggie, "International Organization: A State of the Art on the Art of the Stare," l ~ i t ~ r n i z t r o C)rgd<ro~ ~~id 40 (Autunin I Y86), pp. 7.53-75; and offers a concrete rejoinder to Keohme's challenge for ;I demonstration o t the value of the "sociological" approach o f "reflectivist" scholars (which he opposes t o the neopositivist model\ ot rarion'~l actor theory rn the study of norrns and ~ n s t ~ t u t i o n sSee ) . I
62
Widening Security
Out-of-Control as a Theme in Political Thought (Cambridge, Mass.: MIT Press, 1977); George Grant's incisive essays in Technology and Empire (Toronto: Anansi, 1969) and Technology and Justice (Toronto:Anansi, 1986); and the essays in Tom Darby, ed., Sojourns in the New World (Ottawa: Carleton University Press, 1986) and in Paul Durbin, ed., Technology and Responsibility (Dordrecht, Netherlands: D. Reidel, 1987). 62. Keeley, "Towards a Foucauldian Analysis," pp. 96-99. 63. A more comprehensive study is provided in Richard Price, " A Genealogy of the Chemical Weapons Taboo" Ph.D. diss., Cornell University, Ithaca, N.Y., 1994. 64. Although the ban was rejected by the U.S. delegation at both Hague conferences, the remarks o f one member o f the U.S. commission attests to the tentative emeraence o f a norm proscribing gas shells. As he noted, "a certain disposition has been observed to attach odium to the view adopted by this Commission in this matter." See Scott, Documents, p. 37. 65. On the emergence o f the notion o f a civilized family o f nations, see Gerrit W . Gong, The Standard of 'Civilization' in Internatzonal Society (Oxford:Clarendon Press, 1984). 66. See, for example, Times (London,21-29 April 1915; and James Morgan Read, Atrocity Propaganda: 1914-1919 (New Haven, Conn.: Yale University Press, 1941),pp. 195-96. While many argued that the use o f CW was cruel, these arguments rarely compared the effectso f CW with other weapons such as high explosives. This stands in contrast to the arguments o f those who have opposed prohibitions on CW. This has been a consistent feature o f the discourse on the legitimacy o f CW. 67. See Ministry o f Munitions, pt. 2 o f "Chemical Warfare Supplies," History of the Ministry of Munitions, vol. 11, The Supply of Munitions (London: Her Majesty's Stationery Office,1921); C.H. Foulkes, Gas! The Story of the Special Brigade (London:William Blackwood and Sons, 1934); and L.F. Haber, The Poisonous Cloud (Oxford:Clarendon Press, 1986). 68. Rudolf Hanslian, Der Chemische Krieg (The chemical war) (Berlin: E.S. Mittler and Son, 1937), p. 20; and SIPRI, The Rise of CB Weapons, p. 45. The French at first banned the use o f shells containing phosgene and prussic acid (as did the British) and only permitted the former when the situation at Verdun appeared critical at the end o f February 1916. The prussic acid ban was withdrawn later, the agent was employed for the first time by the French at the Somme on 1 July 1916. See Foulkes, Gas, p. 305. While postwar accounts must be treated with due caution, it should be noted that the director o f the French chemical services argued in 1919 that these shells were held in reserve until the Germans had used gas shells that had a toxicity comparable to phosgene - that is, until the Germans had violated the letter o f the Hague declaration. See E. Vinet, "La Guerre de Gaz et les Travaux des Services Chimiques Francais" (The gas war and the operations o f the French Chemical Service), Chemie et Industne 2 (1January 1919), p. 1403. 69. For evidence that nonuse o f CW was the product o f such a restraint, see Ministry o f Munitions, The Supply of Munitions, pp. 10-11; Haber, The Poisonous Cloud, pp. 224-25; Foulkes, Gas, p. 296; and Brown, Chemical Warfare, p. 45. 70. This view has been expressed by groups such as the American Legion and can be seen in Foulkes's rather enthusiastic assessments o f gas as a weapon. See Congressional Record, 69th Congress, 2d sess., 10 November-6 December 1926 and January 1927, vol. 68, pt. I ; and Foulkes, Gas, respectively. 71. The quotation is from Ann Van Wynen Thomas and A.J. Thomas, Legal Limits on the Use of Chemical and Biological Weapons (Dallas, Tex.: Southern Methodist University Press, 1970), p. 141. 72. The fact that violations often play a crucial role in the development o f norms, as noted by Foucault, points to a difficultyo f applying the positivist model o f explanation to norms: a violation o f a norm does not necessarily invalidate it. See Friedrich Kratochwil and John Gerard Ruggie, "International Organization: A State o f the Art on the Art o f the State," International Organization 40 (Autumn 1986), pp. 753-75. 73. U.S. Department o f State, Conference on the Limrtation of Armament (Washington, D.C.: U.S. Government Printing Office,1922), p. 730. 74. On Hughes's strategy, see Charles E. Hughes, "Possible Gains," in American Society o f International Law, Proceedings of the American Society of Internatzonal Law (Washington, D.C.: American Society o f International Law, 1927), pp. 1-17.
-
Chemical Weapons
63
75. At least until 1992, when agreement was reached on the Chemical Weapons Convention. 76. Friedrich Nietzsche, H I < M I All-Too-H~~n~mz, ~, trans. Marion Faher with Stephen Lmhmann Lincoln: University of Nebraska Press, 1984), p. 67. see also Tlrnes (Lmntlon), 77. Brown, (:hc~mical W'arfare, p. 180. O n these alarmist C~JIITIS, 3 April 192.3, p. 7; SIPRI, The Rise of CB Weapons, pp. 247-48; and U.S. Congress, Senate Special Comniittw Invest~garingthe M u n ~ t ~ o nIndustry, s Mtrnltions Industry: Hearwigs Beforr the, Sperznl Conitnittee In~wstigut~rzg the M u n ~ t i o n sI n d r t s t r ~73rd Congress, 2d sess., 1 9 . 5 , pt. 1 1 and 12, pp. 2 4 0 3 4 ~ n c l2470-71. F o r example, a N ~ I York , Times headline ( 13 M ~ r c h 192 1 , p. I ) proclaimed "W'lr's Newest and Deadliest Weapon; 3 Drops of Poison Kill A n y O n e They Touch," based o n reports circulated by the 17,s. Chemical Warfare S e r v m . 78. The turnaround in asessments of gas wartare hy these propagandists was remarkatlle. In contrast to earlier warriings of the catastrophic potential of CW, see the revised assessrlients by members of the U.S. Chemical Warfare Service in New Yolk Tmes, 10 September 1926, p. 6; and 26 November 1926, p. 12. In a ~nonienrof unsurpassed iron!: the president of the A~nerlcan Chemtcal Soc~erydeclared thar the widespread feeling .igatn\r g ~ was s the result of hysteria and propaganda. Ser N r w York T~rtzes,I I Decemher 1926, p. -3. 79. SIPRI, 7 h e Rise of CB Weapons, p. 247. See also Editorial, Times (London), 3 April 1923, p. 7; and Haber, Tlw Polsoiro~(sC:lotid, pp. 288, 307, and 317. By 1927, a N t w York d ex,iggerated fears of C W as "sheer Tlitles editorial ( I h Fehruar) 1927, p. 2 2 ) had d ~ s m ~ s s ethe romancing," noting thar the previous war had demonstr,lted that high explosives were f'lr more destructive. 80. T h ~ sargument parallels the case made by David Camp17ell that representattons of " o u r d e " threklts are endemic to .ill states In the ongoing process of securing national Ident~ties.These depictions of danger are not simply the response t o objective condttlons but involve the Interpretive scripting of danger through political discourse. See David Campbell, Wrrtlng Security ( M ~ n n e a p o l ~University s: of Minnesota Pres\, 1992). 81. Balfour is quoted in U.S. Dep'lrtrnent of State, (:orrfcrcnce o n the L.inuaztron of Arninment, p. 7.50. 82. The quotattons are both from ]hid., p. 594. 83. Thus the llnited Sr'ltes pushed for the prohihtion at the Washington conference of 1921-22 arid the Geneva conference ot 1925 even though it recognized that I C "would undoubtedly give up a material advantage ~f gas warfare u c r e abolished." See U.S. Congress, Senate Suhcomniittee o n Ui\armament, Disarmament rmtf See-rrrity: A Collertiorz of Do(-urnents 191')-5Y. 84th Congress, 2d sess. (Washington, D.C.: 1J.S. (;ovcrnment Printing Office, l ').56), p. -01. 84. The riw of the wctety of states I S associated w ~ r hthe work of Bull and Watson. See in particular Hedle? 13~111,'~'/J(J A l l a r ~ ~ / ~Sorlety i c ~ l / (New York: C o l u m h ~ aUniversity Press, 1977); and Hedley Bull and Ad.im Watson, eds., The ~.Y/~ili2~11Jil of I~~ternatio?za/ Societ)' (Oxtord: CRxendon Press. 1984). 8.5. See Gong. The S t m i l ~ r dof '(:i~~ilrzat~on' rtz I i r t c r r ~ a t r o ~Society ~ ~ i l 0 1 1 the h~storyof the quest~oningand discredit~ngof the idea of war, see John Mucller, Retreat from hJOt?Isifdy: 'l%e O l ~ s o l e s r ~ ~ rofi r Malor r Wor ( N e w York: B m c Books, 1989). 86. V m Creveld, %d~ilo/og?'fltztf W~7r,11). 71. 87. O'Connell, Of Arrrls (2nd Mcn. 88. See, for example, Anthony Eden's impassioned \perch reported In the Nrzo York T~lric~s, 2 1 A p r ~ l1936, p. 18. 89. For e x , ~ ~ n p lthe e , l1.S. military "denied that there were any lessons t o he learned trom the use of gas as a weapon of opportunity against 1' totally unprepared enemy In 3 colonial war." See Brown, C:h~vvrzrnl Warfare, p. 145. For J. similar German assessment, see Rolf-Dieter Muller, "World Power Status Through the Use ot Poison <;as? German Preparation5 for Chemical Warfare 1919-1945," in Wilhem D e ~ s t ,ed., 7'hc (;ertnan Military in the Age of 'Ii1tizl W'IY ( W ~ r w ~ c k s h i rEngland: e, Berg Publishers, 198.51, pp. 171-209. 90. George Quester, L>etcrreirc~eRefi~rcHiroshmw (New Brunswick, N.J.: Trrlnsact~on Kooks, 19861, p. 78. Thu5, w h ~ l ereports o f Japan's use of CW against the Chinese were Ignored, even the suggesrlon that C W w ~ bse ~ n gcontemplated 111 Spain drew preemptory attention froni Britain. The use of tear gas by government forces w ~ reported s and the Insurgents
64
Widening Security
claimed that they, too, had gas but "refuse to break the international law which forbids its use." See Times (London), 19 August 1936, p. 10. In response, Britain sent its diplomats to investigate these allegations and convey the grave consequences that might follow from the use of gas even in reprisal. See Times (London) 8 September 1936, p. 12. 91. Mueller, Retreat from Doomsday. Similarly, Fukuyama has drawn a sharp distinction between the power politics behavior of the Third World and peaceful relations among industrial democracies - the historical and posthistorical parts of the world. See Francis Fukuyama, The End of History and the Last Man (New York: Free Press, 1992). See also Michael Doyle, "Kant, Liberal Legacies, and Foreign Affairs," pt. 1 and 2, Philosophy and Public Affairs 12 (Summer and Fall 1983), pp. 205-235 and 323-353; and James Goldgeier and Michael McFaul, "A Tale of Two Worlds: Core and Periphery in the Post-Cold War Era," International Organization 46 (Spring 1992), pp. 467-91. 92. And, as Adas has demonstrated, it was the level of technological sophistication -rather than race, religion, morality, or other factors - that served as the chief standard by which the West judged the degree of civilization of other societies. See his exhaustive account in Michael Adas, Machines as the Measure of Men (Ithaca, N.Y.: Cornell University Press, 1989). 93. Giornale d'ltalia (Italy) as reported in New York Times, 4 July 1935, p. 1. See also Amy Gurowitz, "The Expansion of International Society and the Effects of Norms," manuscript, Cornell University, Ithaca, N.Y., 1993. 94. See "Paper Interviews Aziz on Kurds, Other Issues," Kuwait AL-QABAS, 31 October 1988 (in Arabic), Foreign Broadcast Information Servlce (FBIS), 2 November 1988, p. 27; and "WAKH Reports Khayrallah 1 5 September Press Conference," Manama WAKH, 15 September 1988 (in Arabic), FBIS 16 September 1988, pp. 23-24. 95. For examples see the German accounts as reported in "Through German Eyes," Times (London), 29 April 1915, p. 6 from which the quotation is drawn; and James Garner, International Law and the World War (London: Longmans, Green, and Co., 1920), pp. 274-76. 96. Congressional Record 69th Congress, 2d sess., vol. 68, pt. 1, p. 150. 97. As stated by a U.S. senator, "We all know that any proliferation of nuclear weapons threatens humanity. Now we are learning that for other, less costly, easier-to-make weapons, far less sophistication is required, although they may pose a threat approaching the horror of nuclear war and nuclear arms. That is why some are calling chemical and biological weapons the poor man's atomic bomb." U.S. Congress, Chemical Warfare: Arms Control and Nonproliferation: Joint Hearing Before the Senate Committee on Foreign Relations and the Subcommittee on Energy, Nuclear Proliferation and Government Processes, 98th Congress, 2d sess., 28 June 1984, p. 34. 98. New York Times, 2 July 1988, p. A3. 99. "Paris Paper Interviews Aziz on Chemical Weapons," Baghdad INA, 18 January 1989 (in Arabic) Near East and Southeast Asia, in FBIS 19 January 1989, p. 21. 100. United Nations, United Nations Disarmament Yearbook, vol. 14 (New York: United Nations, 1989), chap. 11. 101. Pierre Morel,"The Paris Conference on the Prohibition of Chemical Weapons," Disarmament 12 (Summer 1989), pp. 1 2 7 4 4 . 102. Quoted from Esmat Ezz, "The Chemical Weapons Convention: Particular Concerns of Developing Countries," Proceedings of the Thirty-Ninth Pugwash Conference on Science and World Affairs (Cambridge, Mass.: Pugwash Conference on Science and World Affairs, 1989), p. 216. 103. As one author has remarked, "The major nations' unwillingness to eliminate their nuclear weapons while resisting further chemical (and nuclear) proliferation is seen in some Third World nations as the height of hypocrisy. It sends a message that the lesser nations aren't mature enough for the most powerful of military capabilities." See Victor A. Utgoff, "Neutralizing the Value of Chemical Weapons: A Strong Supplement to Chemical Weapons Arms Control," in Joachim Krause, ed., Security Implications of a Global Weapons Ban (Boulder, Colo.: Westview Press, 1991), p. 97. See also Geoffrey Kemp, "The Arms Race after the Iran-Iraq War," in Efraim Karsh, ed., The Iran-Iraq War (New York: St. Martin's Press, 1989), pp. 269-79.
r
Chemical Weapons
65
104. Morel, "The I'aric Conference o n the Prohibition of Chemical Weapons," p. 142. 10.5. Foucault, "Nietzsche, Genealog); History," pp. 85-86. See also James Scott, Damrn~ltionand the Arts of Kesrsttrncr ( N e w Haven, Conti.: Yale University Press, 1990). 106. Indeed, I i ~ g h - p r e c ~ s ~conventional on rnun~tionshad heen defined as weapons ot mass destruction in Soblet md~t,lry I~terature of the 1980s. See Stephen R. Covlngton, "The Evolution of Sov~etT h ~ n k ~ no ng the Util~tvof Chemical Wartare In 3 Major European Armed of il Glohal (:hrnrr<-irlWfvzpons Biltr, pp. 9-1 0. Contl~ct,"in Krauw, Sec.rrrrt!~ltnp/~c~ltions 107. H<]st<,r~ (;lr,hr, 17 Fcl>ru.irY 199 1, p. 2 0 . 108. This 15 not t o sav, however, that the view has not h e w expressed pr~vately In the developing world - though not 111 official p ~ ~ b l discourse ic - that t o die by cheni~calw x p o n s 1s neither more nor less horr~hlethan t o die by bullet 01-h m e . See, for example, the temlnony of Kr,ld Roherts 111 U.S. C.ongrcs3, C/~r~mc.ir/ Wnrfi~rr.A r n ~ s( h t r o l ilnd Nonpro/ifirdtron: 101~rtHeirrrng Rrfi~rethe .Sc~mte( : ~ m t t ~ ~ ton t e cForrrgn K c l ~ r t r ~mrd ~ n ~the Stthromrnlttw on Fnerg): Nut-lcor I'rolifcrcrtron, 'rnd < ; o l w n m m t Pro<-rssrs,98th Congress, 2d sess., 28 June 1984. pp. 60-6 I . 109. N i m T,ltinenwalJ and Richard Price, "Norm5 .lnd Ikterrence: The Nucle,lr ~rnd Clieni~calWe'lpons Taboos," paper presented at a Social Science Research Council/MacArthur conterence entrrled, "Norm\ ,lnd National Security," Srantord University, Stanford, Calif.. 7-8 Octoher 1994. 1 10. James F. I.eon;~rd,"Roll~ngh c k Chemic,~lP r ~ l i t e r ~ l t ~ o nArms , " Control T ) t l q 22 (October 1992). pp. 13-1 8. 11 I . At the tlme of wrltlng, 1.57 nations had s ~ g n e dthe Chemical Weapons Convent~on. 112. Joseph Lapid, "'['he Third Ikbate: O n the Prospect\ of International Theory in a l ~ (September 1989), pp. 23-5-54, Post-posit~v~stt,:r,~," Intcrnirtional Strctlic~sQ u ~ z r t e r 33 11.3. See Wendt, "Anarchy is W h ~ Stares t Make ot It."
Securitization and Desecuritization Ole Waever
D
uring the mid-1980s, observers frequently noticed that the concept of security had been subjected to little reflection in comparison with how much and how strongly it had been used. Only a few years later, conceptual reflections on the concept of security have become so common that it is almost embarrassing to, once again, discuss or re-conceptualize security. Nonetheless, in this chapter I present one possible perspective on security, and assess its implications in terms of four different security agendas. My primary aim here is not to provide a detailed discussion of this new approach - a more detailed exposition can be found elsewhere1 - but to illustrate the contrast between this perspective and more traditional approaches, which I intend to bring out via conceptual discussion and by addressing selected "security debates." I could begin by expressing a certain discontent with the "traditional progressive" or "established radical" ways of dealing with the concept and agenda of security. The traditional progressive approach is: 1)to accept two basic premises of the established discourse, first that security is a reality prior to language, is out there (irrespective of whether the conception is "objective" or "subjective," is measured in terms of threat or fear), and second the more security, the better; and 2) to argue why security should encompass more than is currently the case, including not only "xx" but also "yy," where the latter is environment, welfare, immigration and refugees, etc. With this approach, one accepts the core meaning of "security" as uncontested, pushing instead in the direction of securitizing still larger areas of social life. Still, in the final analysis, is it all to the good that problems such as environmental degradation be addressed in terms of security? After all, in spite of all the changes of the last few years, security, as with any other concept, carries with it a history and a set of connotations that it cannot escape. At the heart of the concept we still find something to do with defense and the state. As a result, addressing an issue in security terms still evokes an image of threat-defense, allocating to the state an important role in addressing it. This is not always an improvement. Source: Ronny Lipschutz (ed.), On Security (New York: Columbia University Press, 1995), pp. 46-86.
1
Securitization and Desecuritization
67
Why not turn this procedure upside down? In place of accepting implicitly the meaning of "sccurity" as given and then attempting to broaden its coverage, why not try instead to put a mark o n the concept itself, by entering into and through its core? This means changing the tradition by taking it seriously rather than criticizing it from the ~ u t s i d e I. ~begin by considering security as a concept and a word. Next, I discuss security as a speech act. In the third part o f the essay, I describe four cases of securitizution and de-securitization. Finally, I ask whether we might not want to use "security" as it is classically understood, after all.
Security: T h e Concept a n d t h e Word
During the 1980s we witnessed a general move to broaden the security agenda.' One approach was to move from a strict focus on the security of the state (national security) toward a broader or alternative focus on the security of people, either as individuals o r as a global or international collectivity. The security of individuals can be affected in numerous ways; indeed, economic welfare, environmental concerns, cultural identity, and political rights are germane more often than military issues in this respect. The major problem with such an approach is deciding where to stop, since the concept of security otherwise hecomes a synonym for everything that is politically good or desirable. How, then, can we get any clear sense of the specific character of security issues, as distinct from other problems that beset the human condition? To what extent can we apply any of the methods and lessons of security studies to this broadened agenda? Johan Galtung and J a n Mberg have formulated an alternative concept of security, based on four sets of positive goals related to human needs: survival, development, freedom, and identity. Within this framework, security becomes "the combined defence policy for each need category, the totality of defence endeavours of the entire human-societal o r g a n i ~ a t i o n . "The ~ result is a holistic program for world society and its development, welfare, and so on. This is a wholly legitimate approach, of course, but does it impinge at all on security debates? Certainly, the central actors and theorists in the field do not feel affected or threatened by this framework.' Moreover, there is no basic logic to this wider conception of security except for the corrective1 mirror image of the traditional concept. And, in addition, the baseline in the Galtung/Bberg conception is the individual level. Security is then linked to all other goals, since they are all generated from the individual level: the individual has various needs and can be hurt by threats to these needs, and this makes everything a potential security problem. At least three, interrelated problems follow: First, the concept of security becomes all-inclusive and is thereby emptied of content; second, the lack of explicit attention to the connotative core of classical security makes the Galtung/Mberg approach an innocent contributor to the reproduction - and even expansion - of securitization; and, third, there is a lack of political effect on "security," as traditionally defined.
68
Widening Security
Widening along the referent object axis - that is, saying that "security is not only military defense of the state, it is also x and y and z" - has the unfortunate effect of expanding the security realm endlessly, until it encompasses the whole social and political agenda. This is not, however, just an unhappy coincidence or a temporary lack of clear thinking. The problem is that, as concepts, neither individual security nor international security exist. National security, that is, the security of the state, is the name of an ongoing debate, a tradition, an established set of practices and, as such, the concept has a rather formalized referent; conversely, the "security" of whomever/whatever is a very unclear idea. There is no literature, no philosophy, no tradition of "security" in non-state terms; it is only as a critical idea, played out against the concept and practices of state security, that other threats and referents have any meaning. An abstract idea of "security" is a nonanalytical term bearing little relation to the concept of security implied by national or state security. To the extent that we have an idea of a specific modality labelled "security" it is because we think of national security and its modifications and limitations, and not because we think of the everyday word "security." The discourse on "alternative security" makes meaningful statements not by drawing primarily on the register of everyday security but through its contrast with national security. Books and articles such as Jan @berg's At Sikre Udvikling og Udvikle Sikkerhed, Richard H. Ullman's "Redefining Security," and Jessica Tuchman Mathews's "Redefining Security" are, consequently, abundant with "not only," "also" and "more than" arguments6 This reveals that they have no generic concept of the meaning of security - only the one uncritically borrowed from the traditional view, and multiplied and extended to new fields. Thus, it seems reasonable to be conservative along this axis, accepting that "security" is influenced in important ways by dynamics at the level of individuals and the global system, but not by propagating unclear terms such as individual security and global security. The concept of security refers to the state. The first edition of Barry Buzan's People, States and Fear (1983) failed to make clear how this problem might be handled. There was an obvious tension between the title of the book and its subtitle, The National Security Problem in International Relations. The three levels of analysis - individual, state and international system - were central to Buzan's argument, although national security remained, in some sense, privileged. Still, was it Buzan's intention to make a "triple-decker" out of the concept of security, or was he simply providing a contextualization of national security? This point has been clarified in the second edition of the book (1991), where Buzan argues that the state level is privileged even as national security cannot be comprehended at the state level alone. What national security links to at the other levels is not primarily individual security and international security, but dynamics and political processes of various kinds at these other levels.' Buzan has shown powerfully that national security can neither be sufficiently understood nor realistically achieved from a perspective limited to
\\
,F'\
~r
Securitization and Desecuritization
69
one's own state. National security is fundamentally dependent on international dynamics (especially regional ones), but this is not the same as a relationship between national security and international security. Therefore, as indicated in Figure 1, I do not locate security at three levels but at the center of the hourglass image. "Security," in other words, has to be read through the lens of national security. Of course, "security" has an everyday meaning (being secure, safe, not threatened). Quite separate from this, though, the term "security" has acquired a number of connotations, assumptions, and images derived from the "international" discussion of national security, security policy, and the like. But, in these discussions, the conceptualization of security has little to do with application of the everyday meaning to an object (nation or state), followed by an examination as to when the state is secure (as if "security" possessed an independent, stable, context-free meaning that could be added to another stable, independently defined object, the state). Rather, the label "security" has become the indicator of a specific problematique, a specific field of practice. Security is, in historical terms, the field where states threaten each other, challenge each other's sovereignty, try to impose their will o n each other, defend their independence, and so on. Security, moreover, has not been a constant field; it has evolved and, since World War 11, has been transformed into a rather coherent and recognizable field. In this process of continuous, gradual transformation, the strong military identification of earlier times has been diminished - it is, in a sense, always there, but more and more often in n~etaphoricalform, as other wars, other challenges - while the images of "challenges to sovereignty" and defense have remained central. If we want to rethink or reconstruct the concept of security, therefore, it is necessary that we keep an eye on the entire field of practice. This is contrary to the now-standard debates on "redefining security," inasmuch as those who want radically to rethink the concept generally tend to cancel out Figure I : Hourglass Model of Security
National (state)level
Individual level dynamics
70
Widening Security
the specific field. The concept is thus reduced to its everyday sense, which is only a semantic identity, not the concept of security. Of course, both choices are completely legitimate, but this question of language politics depends ultimately on what we wish to accomplish. If our intent is to determine when we are secure, the investigation can address many levels. If, however, we want to add something new to ongoing debates on "security" (in strategic studies) and national interests, we must begin with those debates, taking on that problematique, so that we can get at the specific dynamics of that field, and show how these old elements operate in new ways and new places. The specificity, in other words, is to be found in the field and in certain typical operations within the field (speech acts - "security" - and modalities threat-defense sequences), not in a clearly definable objective ("security") or a specific state of affairs ("security"). Beginning from the modality of specific types of interactions in a specific social arena, we can rethink the concept ."security" in a way that is true to the classical discussion. By working from the inside of the classical discussion, we can take the concepts of national security, threat, and sovereignty, and show how, on the collective level, they take on new forms under new conditions. We can then strip the classical discussion of its preoccupation with military matters by applying the same logic to other sectors, and we can de-link the discussion from the state by applying similar moves to society (as I shall show, below). With this, we maintain a mode of thinking, a set of rules and codes from the field of "security" as it has evolved and continues to evolve. To start instead from being secure in the everyday sense means that we end up approaching security policy from the outside, that is, via another language game. My premise here is, therefore, that we can identify a specific field of social interaction, with a specific set of actions and codes, known by a set of agents as the security field. In international society, for example, a number of codes, rules, and understandings have been established that make international relations an intersubjectively defined social reality possessing its own specific laws and issue^.^ National security is similarly social in the sense of being constituted intersubjectively in a specific field,9 and it should not be measured against some real or true yardstick of "security" derived from (contemporary) domestic society. An alternative route to a wider concept of security is to broaden the security agenda to include threats other than military ones. When widening takes place along this axis, it is possible to retain the specific quality characterizing security problems: Urgency; state power claiming the legitimate use of extraordinary means; a threat seen as potentially undercutting sovereignty, thereby preventing the political "we" from dealing with any other questions. With this approach, it is possible that any sector, at any particular time, might be the most important focus for concerns about threats, vulnerabilities, and defense. Historically, of course, the military sector has been most important.10 Strategic studies often focused on the military aspects of security, whereas the realists and neorealists of International Relations seldom a priori defined military threats as primary. Indeed, Morgenthau, Aron, and many others took
,iti
I
Securitization and Desecuritization
71
the position that, to ensure its security, a state would make its own choices according to expediency and effectiveness, and these might not always involve military means. A state would make threats in the sector in which the best options were available. A response (security policy, defense) would often, but not always, have to he made in the same sector, depending on whether one sector might overpower another, and military means simply were often the strongest available. Logically speaking, the means to security should be secondary to the ends - that is, a conflict and the political decisions involved, as Clausewitz pointed out - and, thus, it has seemed a viable strategy to expand security in terms of sectors while keeping the state focus. Indeed, this is not only an academic option, it is also, to a large degree, what has taken place in political discourse, as the name of the field has through this century changed from war to defense to "security." Still, what ties all of this together as security? When Buzan moves from his discussion of security in military terms to security in the political, economic, ecological, and societal sectors, the logic clearly says that security begins as a military field that is increasingly challenged by these new sectors. The question remains, however: What made the military sector conspicuous, and what now qualifies the others to almost equal status? While Buzan does not squarely address this question, he does hint at an answer. Military threats have been primary in the past because they emerged "very swiftly" and with "a sense of outrage at unfair play"; if defeated, a state would find itself laid bare to imposition of the conqueror's will." Such outcomes used to characterize the military sector. But, if the same overturning of the political order can be acconlplished by economic or political methods, these, too, will constitute security problems." From the discussion above, it follows that the hasic definition of a security problem is sonlething that can undercut the political order within a state and thereby "alter the premises for all other questions." As Buzan shows, the literature largely treats security as "freedom from threat," both objectively and subjectively." Threats seen as relevant are, for the most part, those that effect the self-dctermination and sovereignty of the unit. SuruivaP4 might sound overly dramatic but it is, in fact, the survival of the unit as a basic political unit - a sovereign state - that is the key. Those issues with this undercutting potential must therefore be addressed prior to all others because, if they are not, the state will cease to exist as a sovereign unit and all other questions will become irrelevant. This, then, provides us with a test point, and shows what is lost if we "de-compose" the state by individualizing security. With the approach I have suggested here, even if challenges can operate on the different components of the state, they must still pass through one focus: Do the challenges determine whether the state is to be or not to be?15 When a specific issue is turned into a test case, everything becomes concentrated at one point, since the outcome of the test will frame all future questions. This logic is spelled out most clearly, perhaps, by Clausewitz, who shows that, although politics has to be prior to military, the logic of war the ziel of war, victory - replaces the logic of politics - the specific zweck.
72
Widening Security
To enter a war is a political decision, but once in, one has to play according to the grammar of war, not politics, which would mean playing less well and losing the political aim, as well. Rousseau put it thus: "War is not, therefore, a relation of man to man but a relation of state to state, in which individuals are enemies only by accident, not as men or even as citizens, but as soldiers, not as members of the homeland, but as its defenders."16 Rousseau's argument is presented here in terms of literal war, but the observation applies to "metaphorical war" that is, to other "tests of will and strength."17 The inner logic of war follows from its basic character as an unconstrained situation, in which the combatants each try to function at maximum efficiency in relation to a clearly defined aim. During war, a state is confronted with a test of will - testing whether it is still a sovereign unit in which the ability to fend off a challenge is the criterion for forcing the others to acknowledge its sovereignty and identity as a state.18 It is, in fact, not the particular means (military) that define a situation as war, it is the structure of the "game." Logically speaking, therefore, it is a coincidence that military means have traditionally been the ultimo ratio. The basic logic of Clausewitz's argument thus follows from the situation of an ultimate test: what then is logically to be done? "War is an act of violence pushed to its utmost bounds; as one side dictates the law to the other, there arises a sort of reciprocal action, which logically must lead to an extreme."19 The loser is forced to submit, and the outcome is defined in polar terms: victory-defeat. From this, it follows that the first logic for each party is: "Throw forward all forces" (therefore the inherent tendency for escalation in war); subsequently, various specific mechanisms intervene to modify this injunction. War, then, is "an act of violence intended to compel our opponent to fulfil our and, therefore, "War, insofar as it is a social act, presupposes It is in this the conflicting wills of politically organized c~llectivities."~~ struggle for recognition (Hegel) that states establish their identity as states. Nonetheless, this struggle can take place in spheres other than the military one; the priority of military means is a contingent, technical feature. Consequently, the logic of war - of challenge-resistance(defense)-escalationrecognitionldefeat - could be replayed metaphorically and extended to other sectors. When this happens, however, the structure of the game is still derived from the most classical of classical cases: war.
From Alternative Security to Security, the Speech Act
Reading the theoretical literature on security, one is often left without a good answer to a simple question: What really makes something a security problem? As I have suggested above, security problems are developments that threaten the sovereignty or independence of a state in a particularly rapid or dramatic fashion, and deprive it of the capacity to manage by itself. This, in turn, undercuts the political order. Such a threat must therefore be met with the mobilization of the maximum effort.
\\ ~wi't Securitization and Desecuritization
73
Operationally, however, this means: In naming a certain development a security problem, the "state" can claim a special right, one that will, in the final instance, always be defined by the state and its elites. Trying to press the kind of unwanted fundamental political change on a ruling elite is similar to playing a game in which one's opponent can change the rules at any time slhe likes. Power holders can always try to use the instrument of sectw ztizution of a n issue to gain control over it. By definition, something is a security problem when the elites declare it to be so: And because the End of this Instltutlon [the Levlathan, the Sovereign], is the Peace and Defense ot them all; and whosoever has r g h t to the End, has r ~ g h tto the Means; ~t belongeth of Klght, to whatsoever Man, or Assembly that hath the Sovera~gnty,to be Judge both of the meanes of Peace and Defense; and 'ilso of the hmdrmces, and d~sturbancesof the same; and to do whatsoever he shall thmk necessary to be done, both betore hand, for the preservmg of Peace m d Secur~ty,by prevention of Lhscord ~t home and H o s t ~ l ~from t y abroad; and, when Peace and Securlty are lost, for the recovery of the same." Thus, that those who administer this order can easily use it for specific, selfserving purposes is something that cannot easily be avoided. What then is security? With the help of language theory, we can regard "security" as a speech act. In this usage, security is not of interest as a sign that refers to something more real; the utterance itsclf is the act. By saying it, sornething is done (as in betting, giving a promise, naming a ship)." By uttering "security," a state-representative moves a particular development into a specific area, and thereby claims a special right to use whatever means are necessary to block it." The clearest illustration of this phenomenon - on which I will elaborate below -occurred in Central and Eastern Europe during the Cold War, where "order" was clearly, systematically, and institutionally linked to the survival of the system and its elites. Thinking about change in East-West relations and/or in Eastern Europe throughout this period meant, therefore, trying to bring about change without generating a "securitization" response hy elites, which would have provided the pretext for acting against those who had overstepped the boundarm of the perm~tted. < onsequently, to ensure that t h ~ mechan~srn s would not be triggered, actors hcid to keep t h e ~ challenges r below a certaln threshold and/or through the pol~t- whether n a t ~ o n or ~ ~~nternat~onal l - have the threshold negot~ated ~ c aprocess l upward. As Egbert Jahn put it, the task was to turn threats Into challenges; to move developments from the q h e r e of exlstent~alf e x to one where they could be handled by ordmary means, a5 politics, economy, culture, and so on. A5 part of t h ~ exercise, s a cruc~alpolitical and theoret~calIssue became the d e f m t ~ o nof "intervention" or "lnterterence In domestlc affairs," whereby change-orlented agents tried, through ~nternationallaw, d~plomacy,m d varlous kmds of polit~cs,to rase the threshold and make more mteractlon possible.
74
Widening Security
Through this process, two things became very clear. First, the word "security" is the act; the utterance is the primary reality. Second, the most radical and transformational perspective - which nonetheless remained realist - was one of minimizing "security" by narrowing the field to which the security act was applied (as with the European ditente policies of the 1970s and 1980s). After a certain point, the process took a different form and the aim became to create a speech act failure (as in Eastern Europe in 1989). Thus, the trick was and is to move from a positive to a negative meaning: Security is the conservative mechanism - but we want less security! Under the circumstances then existing in Eastern Europe, the power holders had among their instruments the speech act "security." The use of this speech act had the effect of raising a specific challenge to a principled level, thereby implying that all necessary means would be used to block that challenge. And, because such a threat would be defined as existential and a challenge to sovereignty, the state would not be limited in what it could or might do. Under these circumstances, a problem would become a security issue whenever so defined by the power holders. Unless or until this operation were to be brought to the point of failure - which nuclear conditions made rather difficult to imagine2" - available avenues of change would take the form of negotiated limitations on the use of the "speech act security." Improved conditions would, consequently, hinge on a process implying "less security, more politics!" To put this point another way, security and insecurity do not constitute a binary opposition. "Security" signifies a situation marked by the presence of a security problem and some measure taken in response. Insecurity is a situation with a security problem and n o response. Both conditions share the security problematique. When there is no security problem, we do not conceptualize our situation in terms of security; instead, security is simply an irrelevant concern. The statement, then, that security is always relative, and one never lives in complete security, has the additional meaning that, if one has such complete security, one does not label it "security." It therefore never appears. Consequently, transcending a security problem by politicizing it cannot happen through thematization in security terms, only away from such terms. An agenda of minimizing security in this sense cannot be based on a classical critical approach to security, whereby the concept is critiqued and then thrown away or redefined according to the wishes of the analyst. The essential operation can only be touched by faithfully working with the classical meaning of the concept and what is already inherent in it. The language game of security is, in other words, a jus necessitatis for threatened elites, and this it must remain. Such an affirmative reading, not at all aimed at rejecting the concept, may be a more serious challenge to the established discourse than a critical one, for it recognizes that a conservative approach to security is an intrinsic element in the logic of both our national and international political organizing principles. By taking seriously this "unfounded" concept of security, it
+
,
Securitization and Desecuritization
75
is possible to raise a new agenda of security and politics. This further implies moving from a positive t o a negative agenda, in the sense that the dynamics of securitization and desecuritization can never he captured so long as we proceed along the normal critical track that assumes security to be a positive value to be maximized. That elites frequently present their interests in "national security" dress is, of course, often p i n t 4 out hy observers, ~ ~ s ~ r iaccompanied lly hy a denial of elites' right to do so. Their actions are then labelled something else, for example, "class interests," which seems to imply that authentic security is, somehow, definable independent of elites, by direct reference to the "people." This is, in a word, wrong. All such attempts to define people's "objective interests" have failed. Security is articulated only from a specific place, in a n institutional voice; by elites. All of this can be analyzed, if we simply give up the assumption that security is, necessarily, a positive phenomenon. Critics normally address the what or who that threatens, or the whom to he secured; they never ask whether a phenomenon sholrld be treated in terms of security because they do not look into "securityness" as such, asking what is particular to security, in contrast to non-security, modes of dealing with particular issues. By working with the assumption that security is a goal to be maximized, critics eliminate other, potentially more useful ways of conceptualizing the problems being addressed. This is, as I suggested above, because security:insecurity are not binary opposites. As soon as a more nominalist approach is adapted, the absurdity of working toward maximizing "security" becomes clear. Viewing the security debate at present, one often gets the impression of the object playing around with the subjects, the field toying with the researchers. The problematique itself locks people into talking in terms of "security," and this reinforces the hold of security on our thinking, even if our approach is a critical one. We do not find much work aimed at de-securitizing politics which, 1 suspect, would be more effective than securitizing problems.
Securitization a n d De-securitization: Four Cases From the discussion above, it follows that a major focus of "security studies" should be the processes of securitization and de-securitization: When, why and how elites label issues and developments as "security" problems; when, why and how they succeed and fail in such endeavors; what attempts are made by other groups to put securitization on the agenda; and whether we can point to efforts to keep issues off the security agenda, or even to desecuritize issues that have become securitized? Below, I explore these questions in the context of four different security agendas. First, I look at European security between 1960 and 1990, the period of change and dPtente, which provided the framework for developing the speech act interpretation of security. During this period, the main issue was whether political and social change could he de-securitized even
76
Widening Security
as the basic political structure of the region was kept frozen with major help of the security instrument. How much could be de-securitized and how was a major question, as is why and how change suddenly took on a new and different character in 1989. In the second part, I deal with a very different case: Environmental security. Here we see not an instance of de-securitizing an essentially securitized field but, rather, the potential advantages and disadvantages of securitizing a new area that, perhaps, should be addressed via other thematizations. In the third part, I take up the issue of societal security. This topic is presented in a fashion somewhat parallel to the preceding one, but I also ask the following: If we start using the concept of societal security in order to understand certain new dynamics, especially in postCold War Europe, what differences are there between a traditional, alternative security approach as opposed to a speech act approach to security? In the final part, I analyze the major new attempts to apply the concept of "security" in Europe, with particular reference to the notion of "European security." Change a n d Detente: European Security 1960-1 990
A peculiar feature of the Cold War system in Europe was the almost total exclusion of unwanted change, a guaranteed stability of the status quo. Raymond Aron once described it as a "slowdown of history" (but then went on to discuss the iron law of change that would ultimately upset this strange ~ i t u a t i o n )Security .~~ became the means whereby this slowdown was effected. The speech act "security" is, of course, more than just a word, since one must have in hand the means to block a development deemed threatening. For example, if a foreign army walks across the border or tries to intimidate a country, it is necessary (but not sufficient) to have adequate military strength to resist; or if social unrest, caused from within or without, is the problem, one must have a sufficiently repressive apparatus, ideological cohesion in the core group that allows the apparatus to be mobilized, and the legitimacy to use it that avoids the escalation of public opposition. For a long time the situation in Central and Eastern Europe was such that, where nonmilitary issues were concerned, it was always possible for the regime to control things - in extremis, with the help of friends with tanks. In Cold War Europe, moreover, military threats could also be fenced off because of the general nuclear condition. As the late Franz Josef Strauss once put it: "In the present European situation there is no possibility of changes through war, but neither through revolution or civil war."27 Change seemed impossible without some consent by the power-holders; it had to take place through a negotiated process of pressure and acceptance, stabilization and destabilization. And so it happened. The central issue of the debates on European dCtente - and the mechanism that actually worked in them - was the logic of change through stabilization. In particular, as Willy Brandt explained, German Ostpolitik and Deutschlandpolitik were very explicit about the necessity of "stabilizing the
\\
c.1
Securitization and Desecuritization
77
status quo in order to overcome the status quo." Only by removing some threats to, and thereby some excuses for, the regimes in the East, would it then become possible to push back the securitization of East-West relations and change domestic conditions in Eastern Europe. At the same time, the field of human rights evolved into an attempt to develop new rules of the game in the nonmilitary arena. "Human rights" became the label for a specific political strugglelnegotiation over the border between security and politics, intervention and interaction. This theme generated a great deal of controversy in the mid-1 980s, especially where efforts by West German Social Democrats (SPD) to revive detente were c ~ n c e r n e d . ' ~ Through all of this, East-West relations were marked by a basic asymmetry, because internal legitimacy made Western society much more stable. In Ruzan's terms, states in the West were strong, in the East, weak.lYThis contrast generated a specific and clearly discernible constellation of security concepts and practices: Since the West could not be destabilized from within - especially as the decline of Eurocommunism eliminated this fear security concerns became focused on the "high politics" of military threats and, possibly, skillful diplomatic maneuvering by the Soviets."' The states of the East, in contrast, were fearful of "threats" from below; they regarded almost all societal interaction with the West as potentially dangerous and destabilizing. Accordingly, the concept of security became highly militarized in the West, while in the East it was broadened to incorporate econon~ic security and various types of interference in domestic affairs. A key political question thus became the definition of "normal" transnational politics, as opposed to intervention, which was deemed to be a security problem. A great deal of the East-West dialogue of the 1970s and 1980s, especially that on "non-military aspects of security," human rights, and the whole Third basket of the Helsinki Accords, could be regarded as a discussion of where to place boundaries on a concept of security: To what degree were Eastern regimes "permitted" to use extraordinary instruments to limit societal East-West exchange and interaction? By turning threats into challenges and security into politics, the ditenteoriented actors of the West tried to get elites in the East to avoid applying the term "security" to issues and to open LIP domestic space for more open political struggle. Even though this strategy did not ultimately prove instrumental to the change in East-West relations in 1989, it is certainly arguable that it did play an important role in a process of softening that allowed another form of change to take place. Detente, as negotiated desecuritization and limitation of the use of the security speech act, contributed to the n~odificationof the Eastern societies and systems that eventually made possible, via sudden desecuritization through a speech-act failure, the radical changes of 1989. Many observers noted that the 1989 revolutions in Central and Eastern Europc came about not as regimes slowly gave way to forces gaining more and more control from the periphery but, rather, as a collapse from the center. Some have tried to attribute this sudden loss of legitimacy to the dismal
78
Widening Security
economic performances of the 1980s. This was a necessary, but not sufficient, condition for the collapse, inasmuch as the regimes had been lacking in legitimacy for a very long time. The new feature in 1989 was the loss of support within the elites, which some characterized as a sudden loss of selfconfidence by the regimes them~elves.~'In other words, to explain the change, we must look within elites, and the ways in which the question of legitimacy among elites translated into the capacity to act.32An important part of an order-maintaining action occurs by sustaining a shared worldview within some minimum inner-circle. In earlier cases of adjusting course, when it was necessary to overcome a crisis or repress a revolt, the question of worldview did not arise. The old leader was sacrificed and the new one regained elite support by calling for the restoration of order. Something was said in this act, of course, but the decisive question was not the truth of the act, per se. Rather, the truth was given by the act being said from a specific position, thereby regenerating a loyal elite following, (re)installingthe truth, and reimposing the center's will on the majority.33 In this system of mythmaking, there was an almost infinite capacity for reappraisal through auxiliary hypotheses. That capacity was not, however, infinite and it ultimately became more and more difficult to regenerate the truth, especially in the face of continued economic failures.34 When the final crisis came, no one wanted to take on the task of "calling to order" and no one wanted to take the place at the center from which the call to order would come. This inside-to-outside collapse can be seen as a speech act failure: The performance of the security act and reinstallation of truth suddenly failed to work. In retrospect, this should not have come as a surprise to the speech act analyst of European security, although it did. As I noted in early 1989 (without drawing the logical conclusion): In a way, the most interesting about a speech act is that it might fail. And this is an essential part of its meaning. ... In our context this is clearly the case: the invocation of "security" is only possible because it invokes the image of what would happen if it did not work. And not only this (...): the security speech act is only a problematic and thereby political move because it has a price. The securitizer is raising the stakes and investing some (real)risk of losing (general) sovereignty in order to fence of a specific challenge. In the present [post-structuralist] usage of speech act theory the meaning of the particular speech act is thus equally constituted by its possible success and its possible failure - one is not primary and the other d e r i ~ e d . ~ " As a result, the security mechanism, having lost its internal functioning, suddenly disappeared from the European scene and, for a time, it became extremely difficult to argue for any acts or policies in West or East by making reference to either national or European "security." Subsequently, it became possible to discern some options for establishing a new European point of reference for security, especially around the process of
i
'
~1
, Securitization and Desecuritization
79
German u n ~ t ~ c a t ~ A o ngeneral . feel~ngof mutual fear of los~ngcontrol of the process led to m u t u ~ lself-control, as each major actor t r ~ e dto take Into account the concerns of the others. Each developed surpr~smglys ~ m d a r"bluet y Europe as the pomt ot "self-emdent" reference, pr~nts,"j h usmg the s t a b ~ l ~of and each of w h ~ c hdemanded 1' certam degree of self-control called "secur~ t ~ . The " ' ~ core element of t h ~ sneed for self-control was the assumption (or fear) that German unification, and reactions to it, might become explosive. With unification, internationally sanctioned through the "2 plus 4" agreement, in place, however, the urgency and focus of the situation was lost. Subsequently, the general theme of European security analysis and policy statements has focused on the unbearable openness of the situation. So much of the unexpected had taken place that no possible developnlent could now be excluded. Moorings had been lost. Metaphors of architecture and insistent talk of institutions revealed a longing for fixity, for structures, for predictability. In this situation it was believed, moreover, no institutions should be terminated, even i f they seemed no longer necessary; indeed, there emerged a widespread assumption that there existed a deficit of institutions and structures, and too much instability and unpredictability. The implicit agenda of "security" became, as a result, the closing off of options! I will discuss further attempts to establish "security" in Europe, below.
In recent years, presentation of environmental degradation as a security problem has become increasingly common. Environmental activists are not the only ones to use this slogan; the security establishment seems to have become more receptive to the idea, as well. But does it make sense? I would argue "no," if we follow the logic laid out above. During the 1980s, any idea about "nonmilitary aspects of security" was guaranteed to generate establishment suspicions. The following sequence of reasoning seemed, with some justification, threatening to security elites: (1) security is a broad concept and, therefore, tnany things are threatening in security terms; (2) in the light of a broader perspective, there exists a biased distribution of resources toward military concerns; and (3) this bias is relevant only for a limited portion of security threats as defined in this broader sense.'Qcquiescing to such a broadening, and admitting the biased allocation of resources, would quite obviously he seen by elites as a threat to their prerogatives in the security realm. Following the events of 1989, however, security establishments began to embrace the idea of such alternatives as a means of maintaining their own societal relevance, as well as providing jobs to "security studies" and "strategic studies" analysts. For example, in late 1989, a special issue of Stirvival, the journal of the International Institute for Strategic Studies, which has always been a good indicator of mainstream, Western security thinking, addressed "Nonmilitary Aspects of Strategy." Articles in the journal addressed the panoply or possibilities of threats - economy, environment, migration, and
80
Widening Security
- in a search for new security problems to replace the old ones. Notions about environmental security also emerged at the political level, as when James Baker, Secretary of State in the Bush Administration, named environmental problems as "threats to the security of our citizens,"40 and in the Brundtland Commission's report, Our Common Future, which used explicitly the concept of "environmental security." Central to the arguments for the conceptual innovation of environmental or ecological security41is its mobilization potential. As Buzan points out, the concept of national security "has an enormous power as an instrument of social and political mobilization" and, therefore, "the obvious reason for putting environmental issues into the security agenda is the possible magnitude of the threats posed, and the need to mobilize urgent and unprecedented responses to them. The security label is a useful way both of signalling danger and setting priority, and for this reason alone it is likely to persist in the environmental debates."42 Several analysts have, however, warned against securitization of the environmental issue for some of these very reasons, and some of the arguments I present here fit into the principled issue of securitizatioddesecuritization as discussed earlier in this chapter. A first argument against the environment as a security issue, mentioned, for example, by Buzan, ~ ~ by itself, is that environmental threats are generally ~ n i n t e n t i o n a l .This, does not make the threats any less serious, although it does take them out of the realm of will. As I pointed out earlier, the field of security is constituted around relationships between wills: It has been, conventionally, about the efforts of one will to (allegedly) override the sovereignty of another, forcing or tempting the latter not to assert its will in defense of its sovereignty. The contest of concern, in other words, is among strategic actors imbued with intentionality, and this has been the logic around which the whole issue of security has been framed. In light of my earlier discussion, in which I stressed that "security" is not a reflection of our everyday sense of the word but, rather, a specific field with traditions, the jump to environmental security becomes much larger than might appear at first to be the case. I do not present this as an argument against the concept but, rather, as a way of illuminating or even explaining the debate over it. Second in his critique of the notion of environmental security, Richard Moss points out that the concept of "security" tends to imply that defense from the problem is to be provided by the state:
The most serious consequence of thinking of global change and other environmental problems as threats to security is that the sorts of centralized governmental responses by powerful and autonomous state organizations that are appropriate for security threats are inappropriate for addressing most environmental problems. When one is reacting to the threat of organized external violence, military and intelligence institutions are empowered to take the measures required to repel the threat. By this same logic, when responding to environmental threats, response by centralized regulatory agencies would seem to be logical. Unfortunately, in most cases this sort of response is not the most efficient or effective way
l\ ,tLer
Securitization and Desecuritization
81
of addressing environmental problems, particularly those that have a global chara~ter.~~ Moss goes on to warn that "the instinct for centralized state responses to security threats is highly inappropriate for responding effectively to global environmental p r o b l e r n ~ . " ~It' might, he points out, even lead to militarization of environmental problems."" A third warning, not unrelated to the previous two, is the tendency for the concept of security to produce thinking in terms of us-them, which could then be captured by the logic of nationalism. Dan Deudney writes that "the 'nation' is not an empty vessel or blank slate waiting to be filled or scripted, but is instead profoundly linked to war and 'us us. them' thinking (...) Of course, taking the war and 'us 11s. them' thinking out of nationalism is a noble goal. But this may he like taking sex out of 'rock and roll,' a project whose feasibility declines when one remembers that 'rock and roll' was originally coined as a euphemism tor sex."47 The tendency toward "us us. them" thinking, and the general tradition of viewing threats as coming from outside a state's own borders, are, in this instance, also likely to direct attention away from one's own contributions to enviro~mental problem^."^ Finally, there is the more political warning that the concept of security is basically defensive in nature, 3 status quo concept defending that which is, even though it does not necessarily deserve to be protected. In a paradoxical way, this politically conservative bias has also led to warnings by some that the concept of environmental security could become a dangerous tool of the "totalitarian left," which might attempt to relaunch itself on the basis of environmental collectivism.4'Tertainly, there is some risk that the logic of ecology, with its religious potentials and references to holistic categories, survival and the linked significance of everything, might easily lend itself to totalitarian projects, where also the sciencc of ecology has focused largely on how to constrain, limit, and control activities in the name o f the environment. These observations point back toward a more g n e r a l question: Is it a good idea to frame as many problems as possible in terms of security? Does not such a strategy present the negative prospect of, in a metaphorical sense, militarizing our thinking and seeing problems in terms of threat-vulnerabilitydefense, when there are good reasons for not treating them according to this formula?'' Use of the slogan "environmental sec~irity"is tempting, because it is an effective way of dramatizi~lgenvironmental problems. In the longer run, however, the practices resulting from the slogan might lead to an inappropriate social construction of the environment, as a threaddefense problem. We might find it more constructive, instead, to thematize the problem in terms of an economy-ecology nexus, where decisions are actually interlinked." Use of the security label does not merely reflect whether a problem is a security problem, it is also a political choice, that is, a decision for conceptualization in a special way. When a problem is "securitized," the act tends to lead to specific ways of addressing it: Threat, defense, and often statecentered solutions. This, of course, leaves the environmental agenda, with its
"'
82
Widening Security
labelling problem, unresolved. One alternative is to view the emerging values of environmentalism as establishing their own moral basis. As his basis for optimism, for example, Buzan suggests that such values are already emerging as new norms of international society.53Deudney, more lyrically, talks about ecological awareness being linked to "a powerful set of values and symbols" that "draw upon basic human desires and aspirations," and argues that this, and not regressive security logic, should be the basis for m o b i l & ~ t i o n . ~ ~ Buzan, Moss and others who have analyzed the concept "environmental security," and its use, recommend that environmental problems be treated as part of the economic field. "The security label is one solution," according to Buzan, but he tends to prefer the other path: To "identify environmental issues as part of the economic agenda," which has the advantage of setting the issue at the heart of the action that is most relevant to it. There might, in the long run, be more advantage to making producers, consumers, taxmen and economists factor environmental costs into their accounting activities, than to arming the state with emergency powers derived from an analogy with war. It might be argued that process-type threats are better met by the process-type remedies of economics, than by the statist solutions of security
Societal Security
Over the last few years, an interest in the concept of "societal security" has developed, especially in Europe. If the societal sector is securitized in an unsophisticated way, however, the result could be used to legitimize reactionary arguments for, on the one hand, defining immigrants and refugees as security problems and, on the other, presenting European integration as a national security threat. Conversely, "societal security" could end as an absurd attempt to tell people who feel insecure that they really should not. More systematically, what does the term "societal security" suggest in light of the three perspectives I have so far discussed: Traditional state centric, critical wider security concepts, and the speech act approach? First, in the traditional state-centric perspective, "societal security" could come to mean making the state secure against society, against the types of situations in which a state might be destabilized as its society disintegrates or turns against it. For a society that lacks a state, or is a minority within a state, moreover, its strengthening could be seen by the state as such a security problem. Second, the conventional-critical approach of broadening the concept of security is likely to become locked into debate about whether, for example, immigrants and refugees really do pose a security problem to the state. A discourse on societal security might then be captured by neo-nazis who argue "we are only defending our societal security," or end up as a pedagogical project trying to convince people that, although they feel threatened, there really is no security problem.
I
Securitization and Desecuritization
83
Finally, the approach I have proposed above points toward a study of the mechanisms leading to securitization of certain issues related to identity, especially when and how these problems are handled, by society, in security terms. Such an approach implies that we have t o take seriously concerns about identity, but have also to study the specific and often problematic effects of their being framed as security issues. We also have to look at the possibilities of handling some of these problems in nonsecurity terms, that is, to takc o n the problems, but leave them unsecuritized. This latter approach recognizes that social processes are already under way whereby societies have begun to thematize thenzselues as security agents that are under threat. This process of social construction can be studied, and the security quality of the phenomenon understood, without thereby actually legitimizing it. With the "as much security as possible" approach, this is hard to handle: one will have either to denounce such issues as not being security phenomena ("misperceptions"), or one will be pulled into the process as co-securitizer. What, then, can a tcrm such as "societal security" mean? The security of societies is closely related to, but nonetheless distinct from, political security. Political security has to do with the organizational stability of states, systems of government, and the ideologies that give governments and states their legitimacy. In today's world, the boundaries of state and society are rarely coterminous. The key to society, therefore, involves those ideas and practices that identify individuals as members of a social group. Society is about identity, the self-conception o f communities, and those individuals w h o identify themselves as members of a particular community. "Society" should basically be conceived of as both Genzeinschaft and Gesellschaft, but thereby, t o some degree, necessarily more than the sum of the parts (that is, not reducible to individuals).'" O u r analysis of societal security thus builds on a Durkheirnian conception of society as a distinctive, sui generis phenomenon." It has become fairly common t o talk about various sectors (or the like) within the field of security, hut the concept almost always poses the state as the referent object. This, I have suggested ahove, leads to "societal security" being understood as the security of a state uis-h-zlis its constituent societies, which is not what we want. M y colleagues and 1 have therefore suggested a reconceptualizatioll of the security field in terms of a duality of state security and societal security. State security has souereignty as its ultimate criterion, and societal security has identity. Both usages imply survival. A state that loses its sovereignty does not survive as a state; a society that loses its identity fears that it will n o longer be able to live as itselfiiThere are, then, at the collective level between individual and totality, two organizing centers for the concept of security: state and society. At a secondary level, in the way portrayed in figure 1, there are also the "individual" and "international" levels, which influence national, o r state, and societal security, as well (see figure 2). The deeper cause of this emerging duality may well be a tendency toward the dissolution of the modern state system, as political authority is dispersed across multiple levels. This process begins to undermine the exclusive, sovereign, territorial state, as overlapping authorities begin to emerge." In Europe,
84
Widening Security
Figure 2: Modified Hourglass Model.
" I;,)
International dynamics\
~
l
c
e
p
focus:
,identity
Collective unit level
7,i t
yy l
y
/
conceptual my
Individual level dynamics
society
state
in particular, the coupling between state-nation is being weakened even in the absence of a new synthesis at the European level. No sovereign Euro-state will emerge any time soon but, at the same time, sovereign member states are beginning to lose some of their harder edges. This does not mean that nations will disappear, or even be weakened. The territorial state, however, with its principle of sovereignty, is being weakened. Left behind, we find nations with less state, cultures with less shell. This development illuminates the increasing salience of "societal (in)security," that is, situations in which significant groups within a society feel threatened, feel their identity is endangered by immigration, integration, or cultural imperialism, and try to defend themselves. In the past, when a nation/ culture felt itself threatened in these ways, it could call on "its" state to respond accordingly. This no longer seems possible, especially as border controls and various forms of economic policy move upward to the EU-European level. If such a development comes to be generally accepted, how are cultures to defend themselves? I would suggest that this will be done with culture. If one's identity seems threatened by internationalization or Europeanization, the answer is a strengthening of existing identities. In this sense, consequently, culture becomes security policy. The case of Denmark is illuminating. During the past few years, viewers in Denmark have been treated to numerous television programs and seminars on "Danishness." These programs are not necessarily linked to an anti-European agenda or to the re-creation of a tight state-nation correspondence; rather, they represent a correlate of acceptance of integration into the European Union. It is the future and form of a Danish "non-state" nation within the EU that is at issue in the Danish EU-debate, and it has been the cultural community that has taken the first approach to these new themes, almost explicitly in terms of "cultural" security policy.
\\ ,r,\ cr
Securitization and Desecuritization
85
Several important questions regarding future developments in Europe follow from this example: First, will national identifications generally wane? Second, if they d o not, in which of two possible directions will developments in cultural identity move? It is, on the one hand, possible that national identities might be revived in terms of non-state, cultural self-defense. This would help to support Europeanization of political structures, through the evolution of a European polrtical identity, while leaving cultural identity a t the
national level (Kultuunation without Staatnation) O n the other hand, it is also possible that cultural identity could be revived in the form of classical nation-state thinking, with classical concerns for state sovereignty, national autonomy, and self-expression at the cultural and political levels. Either might happen, although the former is the novel, challenging pattern. With the process of European integration and the "culturalization" of nations proceeding, we can definitely see the emergence of societal security as something apart from state security. The state defends itself against threats t o sovereignty and society defends itself against threats t o identity. This dualism is not symmetrical. Society could, under some circumstances, choose to call upon the state for defense and collapse itself back into the old constellation. The integration scenario relates t o a perspective whereby state security and societal security are increasingly differentiated as separate fields, each having a distinct referent object. If societies continue t o take care of their security in their vwn way, this process of differentiation could continue. If, however, security concerns 011 the societal side escalate to the point of calling the state back in, we could see a retreat away from integration and back toward a Europe of distinct nation-states. So far, we have not elevated state and society t o equal status but, rather, to separate status as referent objects of security. The long term importance of societal security in Europe is contingent o n continuation o t the process of integration, but the success of integration is also dependent on the separate security strategies of societies as distinct from those of the states."" This brief summary shows how the concept of societal security could be used t o capture the essential dynamics of European security. The concept is not, however, unproblematic. Analytically, as well a s politically, it raises several thorny questions. One is that of voice: H o w does a society speak? Society is different from the state in that it does not have institutions of formal representation. Anyone can speak on behalf o f society and claim that a security problem has appeared. Under what circumstances should such claims be taken serious1y ? In thinking about this question, it is important to avoid notions of a n undifferentiated society. In practical terms, it is not a society itself that speaks but, rather, institutions or actors in society. Normally and traditionally, according t o liberal contract ideology, it is the state that has spoken about security in the name of a presumed homogeneous, amorphous society that it allegedly represents, with what is assumed to be a clear focus and voice. The notion of "societal security" might strongly imply that this homogeneous, amorphous society now speaks on its own behalf. But societies are, of course, highly differentiated, full of hierarchies and institutions, with some
86
Widening Security
better placed than others to speak on behalf of "their" societies. But "societyn never speaks, it is only there to be spoken for. While such representations are made all the time - indeed, a large part of politics is about speaking in the name of society61 - there is a difference between normal politics and speaking "security" in the name of society. We cannot predict who will voice "societal security" concerns; we can only see, with hindsight, how much legitimacy an actor did possess when slhe tried to speak on behalf of society. Various actors try this all the time, but the attempt becomes consequential on a different scale when society more or less actively backs up the groups speaking. This has sometimes been the case with neo-nazis in Germany, in contrast to ultra-leftist terrorist acts committed in the name of the people but without much, if any, public support. Most often, there are no generally legitimized, uncontested representatives of society: There is the state or there is nothing.62 This does not, of course, prevent groups from speaking on behalf of society and gaining some degree of backing for some period of time. Only in rare situations, as during the "Velvet Revolution" in Czechoslovakia, do we see moments - almost seconds - of a kind of self-evident representation of "society" by some nonelected but generally accepted institution such as Civic Forum. It is much more common for a societal "voice" to be controversial and only partly accepted. Normally, the state has preempted or prevented societal actors from taking on this funct i ~ n but , ~ this ~ is no longer necessarily the case, especially in the complex constellations evolving in Western Europe. There, we could begin to see a growing division of labor between state and, society, as societal voices establish themselves as defenders of certain proclaimed identities, while the state continues to pursue the separate agenda of defending its sovereignty. It is easy to envision potentially troubling effects if certain societal issues, such as migration, are securitized. Elizabeth Ferris illustrates how this has already happened in Europe, with the result that the previously dominant framings of immigration as a humanitarian or domestic economic issue are being crowded out by notions of security threats.64 Dan Smith suggests that "if security policy is justified on essentially racist grounds, that will feed back to strengthen racist currents in society."65 Where Europeanization is concerned - if one favors European integration - it may be more advantageous to have such issues securitized in terms of societal security rather than state security. If, on the one hand, the "threat" from a new overarching identity is countered through a strengthening of state control over borders, the result will be to block integration and accelerate a renationalization of policies. If, on the other hand, the challenge is taken on by society as something it should deal with as the state is partly lifted to the European level, a process of cultural "rearmament" of the nation may be compatible with political integration into Europe. European Security a f t e r t h e Cold War
As suggested above in my discussion of European security during the Cold War, we could distinguish some tendencies toward installing new political
+
1
Securitization a n d Desecuritization
87
limits by reference to European stability during 1989 and 1990 (especially in relation to the "German problem"). At that time, the risk was that the whole system might have become limitless, with the process falling to the hard realities of either external, superpower limits or the limits of national differentiation within Europe. The definition of European security would then have drifted until one of the major powers felt that overall developments had become intolerable. At that time, however, European thinking about security existed only in terms of positizw programs, of increasing security for Europe. The result was various competing projects for Europe, each with a partic~llar content that negated the other." A purely negative limitation "for the sake of Europe" would not be more objective, but it would contain the possibility of being generalized. Without a new point of self-evidence, of a non-arguable reference point, it was feared by some that the system could end up testing the hard limits. For more than forty years, "security" was the means for enforcing cohesion within the two halves of Europe. In the Western half, it defined the limits of loyalty/seriousness in relation to NATO, thereby regulating the state-to-state arrangement of the West. In the Eastern part, security was used to control domestic developments. After 1989, both of these fr~nctionswere weakened, primarily and first in the East. "Security" then became the name for a possible handling of Europe, although, even today, this limit-defining function has not yet found a stable form. A good part of European politics since 1989 can thus be interpreted as attempts by "Europeans" to install a mechanism for disciplining each other and themselves, thereby reducing options. The word-pair European security is an old one, but this should not lead us to overlook the important change in its meaning that took place during the 1980s. In 1987, Egbert Jahn pointed O L I ~that the term could have two very different meanings: regional international security or Euronational Prior to that time, the term "European security" had, more often than not, meant something closer to the former, because in no meaningful way could one refer to the security of Europe except in the sense of the region being secure because a high proportion of its constituent security actors felt secure. Gradually during the 1980s, and in a much accelerated fashion after 1989, Europe as a whole became a referent object of security, and the second use of the term began to acquire greater salience. In some ways, the growing acceptance of this usage is paradoxical. With a referent object that is hardly constituted in political terms, and certainly not in institutional ones (except for largely administrative purposes), what can security discourse address? What is it that threatens Europe? Balkanization is one possibility. James Der Derian has pointed out that the concept of Kalkanization is a central one vis-a-vis Europe, and yet it is academically ignored: "Balkanization is generally understood to be the break-up of larger political units into smaller, mutually hostile states which are exploited or manipulated by more powerful n e i g h b o ~ i r s . "Der ~ ~ Derian points out that, in the interwar years, competing users of the Balkanization slogan "shared epistemologies based on a closed structure of binary oppositions: for the Marxists, balkanization or federation, barbarism or socialism, nationalism
88
Widening Security
or internationalism; for the Wilsonians, balkanization or confederation, despotism or liberal constitutionalism, nationalism or cosm~politanism."~~ Balkanization is a tool for legitimizing an international order without a named enemy. A politicaVmilitary order generally legitimizes itself through reference to an external threat (a method developed to perfection in the symmetry of the cold war). When order is not organized against a specific country, it must be based on a legitimizing principle that will help to define which specific developments are to be opposed (as was the case with the Concert of Europe, which stood against revolution and change in the status quo, and which calls to mind former President Bush's famous phrase about NATO being an alliance not against any particular country, but against the threat of uncertainty and instability). Using a metaphor of chaos and disintegration is a way of establishing order as such as an aim. Since 1990, the oft-used metaphor has been reinforced by events in the Balkans although, more recently, the use of the metaphor has diminished, as developments in post-Yugoslavia turned metaphor into painful reality. Beneath the seeming agreement on the new dominant discourse, we actually find t w o major discourses about European security. First, there is the Bush argument that the new enemy is uncertainty, unpredictabilit~,and instability. The chains of equivalence suggested here are:
Balkanization
v
change
v-s-
E UIFranco-German defense cooperation
vvs ----+
v
s
stability
-
continuity -
NATO.
Given these equations, the fear of Balkanization becomes an argument against any change whatsoever: stick with NATO and don't rock the boat, so to speak. Attempts to organize defense cooperation in Western Europe are seen as upsetting the status quo, leaning toward the side of war and destabilization. In EU-discourse, the logic is:
fragmentation Balkanization "Superpower" influence
a
v
s
-
v-s-
integration
--
stability -
vs ----+ E U responsibility -
for security.
As indicated in the definition of Balkanization above, one traditional meaning implied that a region would be opened up to external influence; more important, however, is not just the focus on instability and change, but on fragmentation. This possibility, then, points to integration and centralization as the remedy.
l\ ,r\ ei
Securitization and Desecuritization
89
Generally speaking, in EU-logic, the concept of integration is the master variable. Integration is itself considered a value,70 and each specific option must demonstrate whether it will increase or decrease integration. More specifically, we can see in the literature on European security a symptomatic attempt to use neorealism (and/or American realist-federalizing logic of the Federalist Papers) to argue for the stark choice between "fragmentation" and "integratio~l."" This strategy might be seen as the new disciplining move: "Europeans! You really have only two options - do not try to choose any other, they will he inzpossihle. Do you want fragmentation or integration, Balkanizationlrc-natiotzalization or European Union?" Integration is, thus, increasingly driven by the specter of fragmentation'" and, because the alternative is seen as inherently unacceptable, it becomes an aim in itself. Immediately following German unification, French President Mitterrand hegan to argue: We have to insist on the Europe of integration in order to avoid "the Europe of War."'l "Security" thus became shorthand for the argument: We have to d o everything to ensure that integration, and not fragmentation, is the outcome. There is another interesting usage of security logic in the struggle over Europeanization. In several countries, the wider concept of security is being applied to the issue of tnigration as a strong pro-integration argument. While giving the Alastair Buchan Memorial Lecture in 1991, Jacques Delors employed security as "an all embracing concept," and explicitly argued for further integration on this basis: One thing leads to another. This has been a feature of the Community, which is constantly being taken into new areas. One of these new areas is closely linked to the overall concept of security. I am referring, of course, to the consequences of free movement for individuals and the need for joint action, or at the very least close co-ordination, to c o n h a t the various threats to personal security: organized crime, drug trafficking, terrorism. ... Political initiatives in this security-related area are another expression of solidarit).: a leitmotif o f the European pact.'" Here the broad, "progress~ve" concept of securlty 1s being explo~tedIn order to b u ~ l dup the EU. W ~ t hthe fragmenting tendencies in Europe apparent since 1991 - war in the Balkans; the r a t ~ f ~ c a t ~crisis o n over Maastricht; monetary turbulence - more class~calsecurity concerns have returned to dominate. The specter of new-old power rivalries hecommg the future for the new-old contment is probably a mam reason for security discourse increason ingly concentrating on the ~ n t e g r a t ~ o n / f r a g m e n t a t ~theme. Thus we see an ernerglng shared sense of what the agenda 15 about: Ralkanizat~on.If the code becomes strong enough, "securlty" ~ 1 1 1 once , ,xg,lin, become a useful tool. Across the Atlantic, there are also two coinpetlng versions, but enough should be shared across the ocean to make ~t a polrt~cally empowered concept.-' With the articulation of securltv as "European \ecurltyv then, we get ,I general strengthening of the Image of d ~ s ~ n t e g r a t ~aso nsuch as the threx.
90
Widening Security
In the European verslon of orderlsecur~ty,there 1s a statebudd~nglogrc a t play. Secur~ty1s Invoked In a sense that can be mterpreted as a call t o defend a not-yet-exlstlng s o c ~ aorder. l H o b b e s ~ a nanti-anarchy l o g ~ cIS bemg used at a level between the domest~cand the ~ n t e r n a t ~ o n a"Secur~ty l. the speech act" IS, a t present, lna~nlya tool for "Europe." The separate unrts p r ~ m a r ~ engage ly In so~zetalsecurzty. All of t h ~ could s be seen as an ~ n d ~ c a tlon that, at a deeper levcl, the Euro state has arr~veci:It uses state s e c u r ~ t y l o g ~ ceven as ~ t constituent s countries have begun to act as almost-stateless natlons usmg the l o g ~ co t soc~ctalsecurity.
Security, Politics and Stability: Or Why We Might Want "Security" After All
I have focused here on the issues of securitization and de-securitization, trying to demonstrate the importance of moving a theme or issue into the field of security, and thereby framing it as a "security issue." Throughout this essay I have tried to show the advantage of a nominalist, process perspective on the question, where the focus is on the constitution of security phenomena. This, I argue, avoids turning security into a thing. The point of my argument, however, is not that t o speak "security" means simply to talk in a higher-pitched voice. It is slightly more complex than that: "security" is a specific move that entails consequences which involve risking oneself and offering a specific issue as a test case. Doing this may have a price and, in that sense, it could be regarded as a way to "raise the bet."ih The concrete issue is made principled, thereby risking principles (and order), but potentially controlling the concrete. The game has a whole inner logic to it and, when approaching it from some specific field, one should remain aware of the effects of having an issue codified in the language of security. In the current European situation, security has, in some sense, become the name of the management problem, of governance in an extremely unstructured universe. We d o not yet know the units - they have yet to be constructed through the discourse on security; we d o not know the issues, and the threats - they are to be defined in the discourse on security; we only know the form: security. It might sound strange t o say that we do not yet know the issues and threats when war has taken on still more br~italforms in Yugoslavia, with the possibility of European and American intervention having been raised now and again, when migration is discussed as a threat throughout Europe, and when German neo-nazis have attacked asylum seekers on this basis. To be sure, we may be aware of some of the events and processes that are likely to be part of the new security universe, but these are not yet fully conceptualized, and we d o not know in what form they are going to enter this new security "system." The point I wish t o make here is that there is a widely shared, in~plicit assumption that limits and stability must be produced t o a t least some minimum degree. Some point has to become the political equivalent of the
' ,:
r
r
Securitization a n d Desecuritization
91
transcendental signifii - a point which is its own referent, endowed with the instruments (security) for reproducing itself. The way in which the mechanism of security is then inscribed in the new Europe will be a major factor in forming Europe's political system(s). From a more Nietzschean perspective, I should also mention that politics always involves an element of exclusion, in which one has to do violence to the i n h e r e n t o p e n n e s s of s i t u a t i o n s , to impose a p a t t e r n - a n d o n c has not only to remember but also to forget selectively." To act politically means to take responsibility for leaving a n impact, for forcing things in one direction instead of another. Whether such an act is "good" or "bad" is not defined by any inner qualities of the act or its premises, but by its effects (which depend on the actions of others, interaction and, therefore, an element of coincidence). As Hannah Arendt pointed out, "Action reveals itself fully only to the storyteller, that is, to the backward glance of the hi~torian."'~Acting politically can, consequently, never be risk-free, and "progressiveness" is never guaranteed by one's political or philosophical attitude. Theoretical practices, as well as any political ones, have to risk their own respectability and leave traces, letting posterity tell the story about the meaning of an act. Post-structuralists have usually been arguing that their project is about opening up, implicitly arguing that a situation was too closed, too self-reproducing. Politics is inherently about closing off options, about forcing the stream of history in particular directions.'" In the present context, politics and responsibility can involve prevention and limitation and, at times, the tool o f securitization may seem necessary.It is thus not impossible that a post-structuralist concerned about risks of power rivalry and wars will end up supporting a (re)securitization of "Europe" through rhetorics such as that of integratiodfragmentation. The purpose of this would be to impose limits, but it would have as a side-effect some elements o f state-building linked to the EU project. This could therefore imply that national co~nrnunitiesmight have to engage in a certain degree of securitization of identity questions in order to handle the stress from Europeanization. Under such circumstances, there might emerge a complementarity between nations engaging in societal security and the new quasi-state engaging in "F,uropean security." Neither of these two moves are reflections of some objective "security" that is threatened; they are, instead, possible speech acts, moving issues into a security frame so as to achieve effects different from those that would ensue if handled in a nonsecurity mode. Notes I . Ole Wzver "Security the Speech Act: Analysing the Politics of a Word," Copenhagen: Centre tor Peace and Confl~ctResearch, Working Paper no. 1989119. Part of the sections e n d e d Security: "The Concept and thr Word" and "From 'Alternat~veSecurity' to 'Secur~ty,the Speech Act"' as well .IS the subsection "Change and Detente: European Security 1960-1990" under " S e c ~ ~ r i t i r a t ~a on dn De-secur~tlzation:Four Cases" are adapted (sometimes abbreviated, sometimes elaborated) from this working paper; the latter suhsect~on,as well as the final one, "F.uropean Security After th? Cold War." rnclude ideas previously presented in the paper "The changing character of continuity: European Security Systems 1949, '69, '89, ... ," presented in
92
Widening Security
the panel on 'European Change Revisited' at the annual conference of British International Studies Association, Canterbury, December 1989 and reprinted as Working Paper, 211990; the subsection "Societal Security" draws on my contributions to Ole Wzver, Barry Buzan, and Morton Kelstrup, Pierre Lemaitre, Identity, Migration and the New Security Agenda in Europe (London: Pinter, 1993). 2. On the deconstructive strategy of such "post-structuralist realism," see Ole Waever, "Tradition and Transgression: a post-Ashleyan position," in Nick Rengger and Mark Hoffman, eds., Beyond the Interparadigm Debate (Brighton, U.K.: HarvesterlWheatsheaf, forthcoming); Ole Waever, "Beyond the 'beyond' of critical international theory," paper for the (B)ISA conference, London March-April 1989 (Centre for Peace and Conflict Research, Copenhagen, Working Paper 198911.) 3. See, e.g., Jan Oberg, At Sikre Udvikling og Udvikle Sikkerhed (Copenhagen: Vindrose, 1983); Egbert Jahn, Pierre Lemaitre and Ole Waever, European Security: Problems of Research on Non-Military Aspects (Copenhagen: Copenhagen Papers of the Centre for Peace and Conflict Research, 1987); Barry Buzan People, States and Fear: An Agenda for Security Studies in the Post-Cold War Era (Boulder: Lynne Rienner, 1991,2nd ed.); Ole Waever, Pierre Lemaitre & Elzbieta Tromer, eds., European polyphony: Perspectives Beyond East- West Confrontation (London: Macm~llan,1989). 4. Oberg, At Sikre Udvikling; see also Johan Galtung, "The Changing Interface Between Peace and Development in a Changing World," Bulletin of Peace Proposals #2 (1980):14549; Johan Galtung, "Twenty-Five Years of Peace Research: Ten Challenges and Some Responses," Journal of Peace Research 22, #2 (1985):141-58, see especially pp. 146f. 5. This discourse will probably only have a political role if it appears as part of a social movement (such as a peace movement) that presents the establishment with a wall of meaningless practice, i.e. if it appears as part of an external, upsetting activity which is shocking precisely because it is incomprehensible. For a more detailed discussion of this point, see Ole Waever "Moment of the Move: Politico-Linguistic Strategies of Western Peace Movements," paper presented at the twelfth annual scientific meeting of the International Society of Political Psychology, Tel Aviv, June 18-22 (Centre for Peace and Conflict Research, Working Paper no. 1989113); and Ole Wzver "Politics of Movement: A Contribution to Political Theory in and on Peace Movements," in: K. Kodama and U. Vesa, eds., Towards a Comparative Analysis of Peacemovements (Aldershot, U.K.: Dartmouth 1990), pp. 1 5 4 4 . 6. Oberg, At Sikre Udvikling; Richard H. Ullman, "Redefining Security," International Security 8, no. 1 (Summer 1983): 129-53; JessicaTuchman Mathews, "Redefining Security," Forergn Affairs 68, no. 2 (Spring 1989): 162-77. 7. See Jahn, et al., European Security, pp. 51-53. 8. Alexander Wendt, "Anarchy is what states make of it: the social construction of power politics," lnternational Organization 46, no. 2 (Spring 1992): 391426; C. A. W. Manning, The Nature of lnternational Society (London: London School of Economics, 1962); Martin Wight, Systems of States (Leicester:Leicester University Press,1977); Ole Wzver, "International Society: The Grammar of Dialogue among States?,"paper presented at ECPR workshop in Limerich, April 1992; Nicholas Greenwood Onuf, World of Our Making: Rules and Rule in Social Theory and International Relations (Columbia: University of South Carolina Press, 1989). 9. "Most seriously, however, even if we admit that we are all now participating in common global structures, that we are all rendered increasingly vulnerable to processes that are planetary in scale, and that our most parochial activities are shaped by forces that encompass the world and not just particular states, it is far from clear what such an admission implies for the way we organize ourselves politically. The state is a political category in a way that the world, or the globe, or the planet, or humanity is not. The security of states is something we can comprehend in political terms in a way that, at the moment, world security can not be understood." R.B.J. Walker, "Security, Sovereignty, and the Challenge of World Politics," Alternatives 15, no. 1 (1990): 5. There is nothing inevitable about this way of defining security - it has emerged historically, and might change gradually again - but one has to admit "the extent to which the meaning of security is tied to historically specific forms of political community" (Walker, "Security, Sovereignty"). Only to the extent that other forms of political community begin to become thinkable (again), does it make sense to think about security at other levels. The main process at the present is a very
\\ ~ x v
t a i
Securitization and Desecuritization
93
open a n d contradictory articulation of the relationship between state (and other pol~ticalstructures) a n d nation (and other large scale cultural communities). Therefore, the main d y n a m ~ cof security will play a t the intertace of srate security and societal security (in the sense of the securlty of large-scale we-identities). Thus, in the section o n "Soc~etalSecurity," I will argue why the study of "societal security" should - although heing aware of specitic threats t o soclal groups - construct the concept of soc~etalsecurity as distinct from t h ~ s as , heing a t a speclfic level of collectivity, heing a social fact. 10. But even here o n e c ~ argue n a h o u t t h e way of defining these standard cases as m i l i t ~ r y o r political; Jahn, et a/., Euro/,ean Security, pp. 17-20. I I. Barry Buznn argues more extensively a s follows: "Bewuse the use of force can wreak major undes~redchanges very swiftly, rn~litarythreats are tradltlonally accorded the h ~ g h e s rpriority In national securit) concerns. Military action can wreck the w o r k of centuries in all other sectors. D~fficultxcomplislinients in politics, art, ~ndustr);culture a n d a11 human activities can he undone by the use of force. H u m a n nchievements, In other words, can be threatened in terms other than those in which they were created, and the need t o prevent such threats fro111 being realized is a major underpinning ot the state's m ~ l ~ t a rprotection y f u n c t ~ o n .A defeated soclety is totally vulnel-ahle t o the conqueror's power w h ~ c hcan he applied t o ends ranging from r e s t r u c t ~ ~ r ~the n g government, through pillage and rape, t o rn,l\sacre of the p o p u l a t ~ o nand resettlement o f the I m d . The thre,lt of force t h ~ st~niulates ~s n o t onl\, a oowerful concern t o nro. tecr the socio-poht~calherit'lge of the stdte, hut also a sense o f outrage a t the use of u n f a ~ rforms of competition.'' IJcoplc, St'ztes and keilr, p. 1 17. 12. J a h n , et ' I / . ,Europcizn Scmrrt): p. 9. 13. Arnold \Volfers, Drsi-ord m d Coll~7bori7tion:Essays or1 Inir~rnationalPolitics (Balti~nore: T h e J o h n s Hopkin\ University Press, 19621, p. 150. 14. Raymond Aroti, I'rmc irnd W7r: A T l ~ f Y ) pof Into-nizttonal Politics ( N e w York: I)ouhleda!; I 9 6 6 ) , pp. 72f a n d SYXf. 15. This is the reason why small states w ~ l loften hc cnretul not t o d e s ~ g n a t e"inconveniences" a s securlry problem\ o r ~ n f r ~ n g c r n e not sn wvereignty - it they are, in any event, u ~ i a b l e t o d o anything a h o u t it. O n e exnmple w a s Finland In r e l a t ~ o nt o the Soviet Union. 16. Jean-Jacques R o u w a u , " O n Social Contract o r Principles of Political Right" 117621, (translated hy Julia (:ono~v,iy Bondanella) pp. 84-174 in: Alctn Ritter a n d J u l i a Conoway Bondanella. eds., Rousse~ru'sPolrtrcal \YJriturgs ( N e w York: W.W. Norton, 19881, p. 90. 17. T h ~ essenri,ll s argumellt - the repetition of war In nonmilitary form - is the b n s ~ cdifference hetween mine and the one made b y some ,idvocates of "non-offensive defense," most notably Anders lioserup a n d Poul Holm Andreasen (trom w h o m I have learned this Interpretation of Clausewiti). T h e ulr~matetest can arlse in another sphere today, and the whole game therefore conrlnuej. Anders Boserup deduced from the nuclear c o n d i t ~ o nan imposihility of Clausewitzian WJI; and from this ,I host of other tar-reachiriji (political as well as theoretic,~l) of securcoticlusions. Thew strong pol~ticalconclusions, however, depend o n a concept~~alwation ity (existent~althreats t o sovereignty) as hy necessity ni~htar): Elsewhere, 1 have criticisecl F,gon R,dir's L I S ~of t h ~ sopcr,ltlon and hi\ way of thereby establishing political necessity from ;I miliwry analys~s;Ole W z w r "Ideologies ot Srabili7at1on - St,lh~l~/ationof Ideologies: K e a d ~ n g G e r m l n Social I)emocrats," in: V. H a r k and P. Sivonen, eds., h i r o p e in TrilnsitiOn: Polltics imd Nnclcnr Strategy ( I ondon: Frances P~nter,1989), pp. 110-39. Still, the a n a l y s ~ spresented here owes very much t o the iniprcs\~vea n d orig~n'ilC l a u e w i t i ~nterprerationof Anders Boscrup. 18. Anders Roserup, "St'~ten, snmf~llidetog k r ~ g e nhos Clausc\vitz," In: Carl von C l a ~ ~ s e w i t ~ , O m Krig, [ ~ i n d111: kom~ncntnrerog regrstrc (Copenhagen: Khodos, 1986), pp. 9 1 1-30. 19. Carl von clause wit^, V o m Krieg. [originally publ~shcd 18.121, (Frankfurt: Ullstein i\/laterialen, 1980), p. 19 - Book I, Ch,lpter I . 1 follow here 1.1. (kaham's translat~onin O n War, edited with a n introduction by Anatol Rapoport (Harmondsworth, U.K.: Penguin, 198.5), p. 103. 20. C l a u s e w m , Vont Kric~gcBook I. chapter 1, p. 17; O n LV'JY,p. 101. 2 1. Aron, ['race and N'n, p. 2 I . 22. T h o m a s Hobbes. 1.cwrath~rn(Middlesex: I'elican Boohs, 1968 11651 11, pp. 2.32t. 23. M o r e prec~selv,in the theory of speech acts, "secur~ty" would he seen a s ,In 11loc.r.rtron'rrv act; t h ~ IS \ elahorarcd a t length in my "Securit); the Speech Act." See also: J.1.. Austin, hot^, to d o 'I'hrnp wrth Words (Oxford: Oxford Un~versit)Press, 197.5, 2nd ed.), pp. 98ff.
94
Widening Security
24. A point to which we will return: The other side of the move will, in most cases, be at least the price of some loss of prestige as a result of needing to use this special resort ("National security was threatened") or, in the case of failure, the act backfires and raises questions about the viability and reputation of the regime. In this sense the move is similar to raising a bet - staking more on the specific issue, giving it principled importance and thereby investing it with basic order questions. 25. The strongest case for the theoretical status of speech act failure being equal to success is given by Jacques Derrida, "Signature Event Context," Glyph 1 (1977): 172-97 (originally presented in 1971). The article was reprinted, in a different translation, in Jacques Derrida, Margins of Philosophy (Chicago: University of Chicago Press, 1982). 26. Raymond Aron, On War: Atomic Weapons and Global Diplomacy (London: Secker and Warburg, 1958 [French original 1957]), pp. 80-102. 27. Rudolf Horst Brocke, Deutschlandpolitische Positionen der Bundestagsparteien Synopse (Erlangen: Deutsche Gesellschaft fiir zeitgeschichtliche Fragen, 1985), pp. 66f and 79f. 28. Wilfried von Bredow and Rudolf Horst Brocke, Das deutschlandpolitische Konzept der SPD (Erlangen: Deutsche Gesellschaft fiir zeittgeschichtliche Fragen, 1986); Ole Wzver "Ideologies of Stabilization"; and Ole Wzver, "Conceptions of DCtente and Change: Some Nonmilitary Aspects of Security Thinking in the FRG," pp. 186-224, in: Wzver, et al., European Polyphony. 29. Weaklstrong states refer (in contrast to weaklstrong powers) to the political strength of the state; how much state the state is, which means basically the degree of sociopolitical cohesion - not least how well the fit between state and nation is. Weaktstrong powers then cover the more traditional concern about the "power" of a unit (as its ability to influence other units). See Buzan People, States and Fear, pp. 96-107, 113f and 154-58. 30. Ole Wzver, "Conflicts of Vision -Visions of Conflict," pp. 283-325 in: Wzver, et al., European Polyphony. 31. See, e.g., Theodore Draper, "A New History of the Velvet Revolution," New York Review of Books, Jan. 14, 28, 1993 (in two parts). 32. Ole Wzver, "The Changing Character of Continuity." 33. See Jadwiga Staniszkis, "The Dynamics of a Breakthrough in the Socialist System: An Outline of Problems," Soviet Studies 41, no. 4 (1989): 560-73; Jadwiga Staniszkis, The Ontology of Socialism (Oxford: Clarendon Press, 1992). 34. To this might be added the interpretations of "conversion of power," that is, the way the old elite transformed its old system power into new capitalist "power" - and therefore did not need to oppose change as strongly as one would have expected. See Staniszkis, "Dynamics"; ElernCr Hankiss, East European Alternatives: Are There Any? (Oxford: Oxford University Press, 1990); and Ole Wasver, "The Changing Character of Continuity," pp. Ilff. 35. Ole Wzver, "Security the Speech Act," pp. 4Sf. - making reference to the argument of Derrida, "Signature Event Context." 36. Ole Wzver, "Three Competing Europes: German, French, Russian," International Affairs 66, no. 3 (July 1990): 477-93; especially pp. 486-88. 37. Ole Wzver, "The Changing Character of Continuity," pp. 20f. 38. Alternatively, but not much better (in the eyes of the security establishment), a slogan of "non-military aspects of security" could point toward the "Eastern" argument for economic and political security and thereby for legitimizing a concern for system stability beyond the field of military threats (cf. the preceding section). 39. The articles were: Robert D. Hormats, "The Economic Consequences of the Peace 1989"; Hans W. Maull, "Energy and Resources: The Strategic Dimension"; Neville Brown, "Climate, Ecology and International Security"; Michael J. Dziedzic, "The Transnational Drug Trade and Regional Security"; and Sam C. Sarkesian, "The Demographic Component." 40. Secretary Baker, "Diplomacy for the Environment," address before the National Governors' Association, February 26, 1990, Washington D.C. (reprinted in Current Policy, No. 1254, February 1990), quoted in Richard H. Moss, "Environmental Security? The illogic of centralized state responses to environmental threats," in: Paul Painchaud, ed., Geopolitical Perspectives on Environmental Security (Cahier du GERPE, No. 92-05, Universite Laval, Quebec).
? , ar
1
1
Securitization and Desecuritization
95
41. This is one of the fite sectors drscussed by Buzan in l'coplc, States and Fear, pp. 13 1-33. 42. Barry Buzan, "Env~ronmenta s a Security Issue," in: P'iul Painchaud, ed. Geopolitrc-irl Perspectiries on Environmental Securlty (Cahrer d u GERPE, N o . 92-05, UniversitG Laval, Quebec), pp. I and 24f. 43. Buzan, "Environment as '1 Security Issue," p. 15. 44. Moss, "Env~ronmentalSecurity?." p. 24. 45. Moss, "Environmental Security?," p. 32. 46. ~ < , s squote5 the Scnarr A r n ~ c dSCTV~CCS C<>tm,m;ttcc to thi. effect t h a t protecting U.S. interests against environmental changes "may ult~matelyrequire the use of U.S. mil~tary power." See "Env~ronmentalSecurity?," p. 21. 47. Daniel Deudney, "The Case A g a ~ n s Linking t Fhvironlnental Degradation and N ~ t ~ o n a l Security," Millennium 19, no. 3 (Winter 1990): 461-76; here quoted from p. 467. 48. Moss, "Environmental Security?," p. 32. 49. Buzan, "Environment as a Secur~tyissue," p. 24. 50. This was w h a t led AndrG G o r r some years ago to the conclusion that the tvay we addressed environmental issues (which he certainly cdred about t o o ) contained the danger of "eco-fascism." See Andre (iorz, Ecologie et lrherte (Paris: Editions Galilee, 1977). See also Charles T. Rubin, The Green Crusade ( N e w York: Free Press, 1994). 51. Anders Boserup, presentation o n the concept o f securrty. Centre for Peace , ~ n dConflict Research, Copenhagen, 1985. 52. Buzan, "Environment a s a Security Issue." 53. Buzan, "Envrronment as a Secur~tyIssue," p. 26. 54. I>eudney, "The Case Agalnst Linking Envlronrnental Degradation ...," p. 469. S5. Kuzan, "Environment as J Security Issue," p. 25; see pp. 16-19 about the economlc approach. 56. Thrs issue ot the nature o t society (and individuals) I S a debate often replayed under various h e a d i n g such as methodological individualisn~verslrs niethodological collectrvism, o r more fashionably these past few years a s liberal~srnversus communitarianism; see, for example, Tracy B. Strong, ed., The Selfand tile Political Order (Oxford: Blackwell, 1992); and Q u e n t ~ nSkmner, ''On Justice, the Cornmon ( h o d and the Priority of Liherty," pp. 2 11-24 in: Chantal Mouffe, ed., Dintenstons of Radical Democvilcy: I'brrulisnr, Cztt~msl71p.(:omnzunity (London: Verw, 1992). F~nally,there is a point In critrcizing dichotomies like the C;emetnschaft/Gesellscl~~zft one, inasmuch as it obscures the important political arena of practices that are neither openly addressed nor a necessary expression of the "soul" of a conimunity but transferred In the form of "practical knowledge." See Kichard K. Ashley, " l m p o s ~ n gInternat~onalPurpose: Notes o n a Problematic of (;overnance." pp. 2 5 1-90, in: E:O. Czernpiel and J.N. Rosenau, eds., Global C h a n p s and T17roretici~lC:hilllen~rs(Lexington: 1.exington Kooks, 1989); and Ole W m e r , "International Society: the <;rammar. ... " Finally, ~t could he argued that this debate ought to be displaced toward "the re\pective ronstttutron of the indiv~du.il(the 'self') and the p o l ~ t y(the 'order')," a s argued by Tracy Strong, The Self, p. 3. 57. T h e insecurity of social groups could affect the s t a b ~ l ~ and r y security of soc~etya s a kmd of insecurity from helow: T h e insecurity of social groups might spread t o whole societies and into other sectors. Thus, "societal securrty" entail5 an Interest In security a t all lower levels. It seems, however, not adv~sahleto tlefinr the sum of these smaller secur~tiesas societal security, inasmuch ac thls would Ie'id LIS down the track toward a n atomlstlc, aggregate view of securrt); where the ultinute question is individual (= global) security. Openmg u p the definition of societal security as the securlty of varlous groups would (beyond probably proving to be a n infin~te expansion of the subject) lead in the direction of an aggregate conception of the constituent collectivities. As with state securlty, societal security has t o he understood first of all as the sccurrty of a social agent which has an independent reality and whlch IS Inore than and different from the sum of ~ t individuals. s Approaching it by way of summing up, aggregatmg individual preferences, one will never capture the nature o f its security prohlenis which are constituted In the relationship of a state and itr environment and a society and ~ t environment. s In the case of societal security, it is actually the case that societies are often made insecure because important group5 in society feel insecure. This, however, has t o be kept conceptually separate from the
96
Widening Security
security of a society, societal security. Societal is not social security. The referent object for societal security is society as such, neither the state, nor the (sum of the) individuals. 58. The logic of security points to questions of survival but, of course, the rhetoric of security will often be employed in cases where survival - that is, sovereignty or identity - is not actually threatened, but in which it is possible to legitimate political action by making reference to such a threat. State security can be influenced by the (in)security of a society on which it is based, but this has to be seen as a two-step procedure. In the case of real "nation states", there will be small difference between the pure state definition and the new more complex one of state security via societal security. When nation and state do not coincide, however, the security of a state-challenging nation will often increase the insecurity of the state. More precisely, if the state has a homogenizing "national" program, its security will by definition be in conflict with the societal security of "national" projects of subcommunities inside the state. 59. This can be analyzed in terms of a "new middle ages." The medieval metaphor has the advantage of drawing our attention to the change in the organizing principle of the sovereign, territorial state, and not the nation-state (which is only half as old). The national idea is obviously not dying out (nor is politics as such giving way to interdependence or technocratic administration as often imdied in ideas of "end of the nation-state"): what is modified is the organization of political space. For some four centuries, political space was organized through the principle of territorially defined units with exclusive rights inside, and a special kind of relations on the outside: International relations, foreign policy, without any superior authority. There is no longer one level that is clearly the most important to refer to but, rather, a set of overlapping authorities. Consequently, even those nations most closely approaching the ideal type of the nation-state are beginning to lose the option of referring always to "their" state. In a historical perspective, therefore, the state-nation relationship is moving toward an unprecedented situation. The nation, born into an interstate system based on the sovereign state (already 200-300 years old at the time), might continue into a post-sovereignty situation. Thus, the post-modern political system will not be totally like the Middle Ages in this important sense. The understanding of this complex evolution is often blocked by the use of the term "nation-state" as designating both the emergence of the national idea and the twice as old territorial state (i.e. the principle of territoriality, sovereignty, and exclusivity), which means that the specific nature and importance of the latter concept (which is the basic system organizing principle) is overlooked. This obscures an understanding of the importance of a possible change at this level. Announcements of the demise of the nation-state are often refuted by pointing to the continuing importance of nationalisrnlthe nation idea, but this misses the point since the major change seems to happen at the level of the state (which of course implies that the nation-state as we have known it will also change since it was built on the territorial state), whereas the nation as such continues. See Hedley Bull, The Anarchical Society: A Study of Order in World Politics (London: Macmillan, 1977), pp. 254f, 264ff, 285f, and 291ff; James Der Derian, On Diplomacy: A Genealogy of Western Estrangement (Oxford: Blackwell, 1987) pp. 70 and 79ff; Timothy W. Luke, "The Discipline of Security Studies and the Codes of Containment: Learning from Kuwait," Alternatives 16, no. 3 (Summer 1991): 315-44, especially pp. 340f; Ole Wzver, "Territory, Authority and Identity: The late 20th Century emergence of Neo-Medieval Political Structures in Europe," paper for the 1st conference of EUPRA, European Peace Research Association, Florence, November 8-10, 1991. 60. See Ole Wzver, et a/., Identity, Migration and the new Security Agenda, especially chapter 4; and Ole Waever, "Insecurity and Identity Unlimited," in: AnneMarie Le Gloannec & Kerry McNamara, eds., The European Disorder, forthcoming (Centre for Peace and Conflict Research, Copenhagen, Working Paper 1994114). 61. See, for example, Ernesto Laclau, Thoughts on the Revolution of Our Times (London: Verso, 1990), pp. 89-92. 62. Probably we see here the reason why all this is more cryptic to Americans than to Europeans. At first, a concept of societal security should seem more natural to Anglo-Saxons who allegedly see state and society as separate, whereas the continental tradition is for state and society to be conceived as related; see Kenneth Dyson, The State Tradition in Western Europe
\i , t i i I
Securitization and Desecuritization
97
(Oxford: Martin Robertson, 1980); Henry A. Kissinger, A World Restored (Boston: Houghton Miflin, 1957), pp. 192-95. The American trad~tionis, however, of a rather minimalist concept of state, In which the state is not given any inherent rarson d'gtre in and of itself, hut is only legltm a t e d as derivative (in the form of some kmd of s o c i ~ contract1 l and only when and if ~t serve\ - a n d defends - society. Contmentals 'ire more prone to grant the state its own r g h t t o existence, and continental traditions point t o soricty as a collective, as 111ore-than-the-sum-of-the-parts, which IS more alien to anglo-l~beralthought. Thus, in American thinking, "security" is implicitly ~ S C L I I t~uT be ~ ulti~llat~ly I ~ ~ i t i n i i z chy d rcferrnce t o cecuring i~rd;z,iclrcols.A concept of soc~etal security then becomes odd (the natural reaction is t o call for more correct and appropriate state policy), unless one denounces the social contract conception as simply IiherallAmerican ideology. If one agrees w ~ t hThomas I'a~ne that "What is government more than the management of the affairs of a natmn? It I S not," and turther that sovereignty rests wirh the nation, which has always the rtght "to abolish m y form o f government if finds inconvenient and establish such as ,iccords with its interests, it\ disposition and ~ t happinessn s (Rr,yi~tsof M m , pp. xx), then separate agendas o f security for state .ind nation hecome inconceivable. To continental Europeans, the state, more than a pr,lgmatic Instrument for achieving the collective Interests o f a group of individu,tls, i \ seen as a unit wirh ~ t own s logic and concerns. So is society. 63. Carl Schmitt even cLlirned that the task of the state was t o define enemy and friend, and if the state fililcd to accomplish t h ~ s ,inevitably others \vould come forward and d o so, whereby the state would lose its position m d be replaced by the new power. Carl Schmitt, 1)cr Rcgriff des Polrtischrn (Berlin: Duncker and Humblot, 1963 119.12]),especially pp. 45-54. 64. Elizahcth (;. Ferris, "Peace, Security and the Movement of People," unpuhl~shedpaper, Life arid Peace Institute, Uppsala, Sweden. 65. Quoted b! Ferris, p. 17. 66. Wzver, "Three Competing Europes." 67. lahn, cJtd . , fiuropmn S~ctrrity,pp. 3.5-37. 68. James Der 1)crian "SIN: Intern,~tio~lalTheory, Balk,lniz,ltion, and the New World w ~ 3 ( 199 I ): 485-506, quote o n p. 488; a150 in Der L k ~ a n Awtidrplotrrr~cy: , Order," M i l l ~ n t ~ i u20, Spws, 7rrrov. Spred. '2nd War (Oxford: Blackwell, 19921, pp. 141-69. 69. Uer Derian, "SIN," p. 4 9 1. 70. Markus l ~ c h t e n f u c h sand M i c h x l Huber, "Institutional I'earning in the European Chrnmunity: The Kespon\e t o the <;reenhouse Effect." In: J.D. Lifferink, P.D. [.owe ,lnd A.P.J. Mol, eds., k~tropeanI ~ t ~ g r ~ ~mt dt ot ltn~~ ~ ~ r ~ n i n c t Iz' tOiIzI lC ~ (1.01idon:Bclknap, in press). 71. This argument is all-pervasive In the Europe,~npress a i d used by numerous politic~ans, rncludmg Kohl a \ well as Mitterrand. An intelligent p o l ~ c >nn,tlysis argulng strongly along these lines is \upplied by Peter Glotz, "F.urop
98
Widening Security
Moreover, the EU has been conducting its policy with the main criteria being the effect on the EU, not on Yugoslavia. See Ole Walver, "Den europaliske union og organiseringen av sikkerheden i Europa," pp. 33-72, in: Martin Salter et al., Karakteren av Den europeiske union (NUPI-Report no. 160, July 1992, Oslo), especially pp. 64-66; Hikan Wiberg, "Divided States and Divided Nations as a Security Problem - the Case of Yugoslavia" (Centre for Peace and Conflict Research, Working Paper no. 1992114). 77. This is probably most clearly argued in "Vom Nutzen und Nachteil der Historic fiir das Leben," where Nietzsche says for instance that "all great things" depend on illusions in order to succeed (in Friedrich Nietzsche, Werke (FrankfurtIM: Ullstein 1969, vol. I), p. 254). It further links up to the themes of "setting values" and "creating beyond oneself" from, for instance "Thus spoke Zarathustra," and the risk implied in "the will to power."See, for example, Werke, vol. 2, pp. 301, 356ff, 394f, 600,73Of, and 817-20; and Ole Wzver, "Tradition and Transgression. ..." 78. Hannah Arendt, The Human Condition (Chicago: Chicago University Press, 1958), p. 192. 79. If some reader were puzzled above to find the author referring to himself as an example of an "ideological" and "disciplining" move, this was not (necessarily)a case of analytical scizophrenia but, rather, a conscious self-deconstruction. This points toward a tricky question about post-structuralism and politics. For understandable but contingent institutional reasons, post-structuralists have emerged on the academic scene with the political program of tearing down "givens," of opening up, making possible, freeing. This invites the reasonable question: opening up room for what? Neo-nazis? War? How can the post-structuralist be sure that "liberating minds" and "transcending limits" will necessarily lead to more peaceful conditions, unless one makes an incredible enlightenment-indebted "harmony of interests" assumption? For someone working in the negatively-driven field of security, a post-structuralist politics of responsibility must turn out differently, with more will to power and less de-naturalization.
Security Studies and the End of the Cold War David A. Baldwin
Graham All~sonand Gregory F. Treverton, eds. Rethinkmg Arnertca's Secuwty: Beyond Cold War t o N e w World Order. New York: W. W. Norton, 1992, 479 pp. John L e w ~ sC a d d ~ s .T h e Unzted States and the End of the Cold War: I m p l ~ a t i o n s , Reconslderatzons, Provocations. New York: Oxford U n ~ v e r s ~ tPress, y 1992, 301 pp. M ~ c h a e lJ. Hogan, ed. T h e End of the Cold War: Its Meanzng and ty 1992, 294 pp. Implicatmns. New York: Cambrtdge U n ~ v e r s ~ Press, Richard Shultz, Roy Godson, and Ted Greenwood, eds. Securtty Studzes for the 7 990s. New York: Brassey's, 1993, 4 2 3 pp.
T
he end of the cold war is arguably the most momentous event in international politics since the end of World War I1 and the dawn of the atomic age. Paraphrasing John F. Kennedy on the advent of nuclear weapons, one scholar sees the end of the cold war as changing "all the answers and all the questions."' Another scholar, however, denies that there have been any "fundamental changes in the nature of international politics since World War 11" and asserts that states will have to worry as much about military security as they did during the cold war (Mearsheimer, in Allison and Treverton, 214, 235). Most of the fifty or so authors whose work appears in the books reviewed here take the more moderate position that the end of the cold war changes some of the questions and some of the answers, but they disagree over which questions and answers are at issue. Despite the disparity of views among the authors, three themes emerge. First, military power has declined in importance in international politics.' For some this means that military threats are less prevalent, while for others it means that military force is less useful as a tool of statecraft. Second, there is a need to reexamine the way we think about international relations and national security."or some this need stems from the changed circumstances Source: World Pol~trrs,48( 1 ) ( 199 5): 1 17-41.
100
Widening Security
of the post-cold war world; for others it grows out of the collective failure of scholars to anticipate either the timing or the nature of the end of the cold war. And third, there is a need for a broader view of national security (see especially the essays by Schelling and Peterson, in Allison and Treverton). For some this means including domestic problems on the national security agenda; for others it means treating nonmilitary external threats to national well-being as security issues. Each of these books raises fundamental questions about the theories, concepts, and assumptions used to analyze security during the cold war and about those that should be used now, in its aftermath. This review in turn seeks to lay the intellectual groundwork for a reexamination of security studies as a subfield of international relation^.^ The discussion is presented in three parts. The first surveys the emergence and evolution of security studies as a subfield of international relations. It suggests that scholars who wrote on national security at the beginning of the cold war had a broader and more useful approach to the topic than those writing at its end. The second part assesses the relevance of security studies to the new world order. It argues that the field's treatments of the goal of security, the means for pursuing it, and the domestic dimensions of security raise serious questions about its ability to cope with the post-cold war world. And the third part reviews proposals for the future study of security; these range from holding to the status quo to abolishing the subfield and reintegrating it with the study of international politics and foreign policy. It suggests that a strong case can be made for reintegration.
I . The Evolution of Security Studies
It has become a commonplace to associate the origins of security studies with the twin stimuli of nuclear weaponry and the cold wats This approach, however, can easily give the misleading impression that security studies was created ex nihilo sometime between 1945 and 1955. Before one can understand the impact of the cold war on thinking about national security, one must first examine the pre-cold war scholarship on the subject. Was there simply a void to be filled because no one had been studying national security or war? Were existing approaches to the study of foreign policy and international politics too narrow and rigid to accommodate students of the cold war? It will be argued that each of these questions should be answered in the negative. Indeed, in many ways the study of national security grew more narrow and rigid during the cold war than it had been before.
The Interwar Period If security studies is defined as the study of the nature, causes, effects, and prevention of war, the period between the First and Second World Wars was not the intellectual vacuum it is often thought to be. During this period
I
Security Studies
10 1
international relations scholars believed that democracy, international understanding, arbitration, national self-determination, disarmament, and collective security were the most important ways to promote international peace and ~ e c u r i t y .They ~ therefore tended to emphasize international law and organization rather than military force. Quincy Wright's Study of War, published in 1942, was far more than a single book by a single author. It was the culmination o f a major research project dating from 1926, a project that
spawned numerous studies by such scholars as William T.R. Fox, Bernard Brodie, Harold Lasswell, Eugene Staley, Jacob Viner, Vernon Van Dyke, and many others. In an appendix entitled "Co-operative Research on War," Wright describes numerous scholarly research projccts on aspects of war conducted by various groups during the interwar period.' Fifty years later A Study of War still stands as the most thorough and con~prehensivetreatise on war in any language. It inspires awe in its coverage of the legal, moral, economic, political, biological, psychological, historical, sociological, anthropological, technological, and philosophical aspects of war. For Wright, war was primarily a problem to be solved, a disease to he cured, rather than an instrument of statecraft. The book was, according to Fox, "as notable for its inattention to problems o f nutiorzal strategy and national security as for its dispassionate portrayal of war as a malfunction of the international ~ y s t e m . "Except ~ for a few scholars, such as Frederick Sherwood Dunn, Nicholas J. Spykman, Arnold Wolfers, Edward Mead Earle, and Harold and Margaret Sprout, the study of military force as an instrument of statecraft for promoting national security tended to be neglected. This was the crucial difference between security studies before and after 1940. All of this changed rapidly with the onset of World War 11, when "national security became a central concern of international relationists of widely different persuasions. For all of them, moreover, it called for explicit consideration of force as it related to policy in conflicts among first-ranking nation-states."" By 1941 a course on war and national policy, designed by Grayson Kirk, John Herz, Bernard Brodie, Felix Gilbert, Alfred Vagts, and others was being taught at Columbia University; and similar courses were developed during the war at Princeton, the University of North Carolina, Northwestern, the University of Pen~lsylvania,and Yale.'" A book of readings developed for such courses was nearly eight hundred pages long.[ T h e First Postwar Deca
Later chroniclers of the history of security studies have suggested that there was little academic interest in security studies until the m i d - 1 9 5 0 ~when ~ it was sparked by concern about the doctrine of massive r e t a l i a t i ~ n . 'Although ~ it is true that national security was treated within the broader framework of international relations and foreign policy, it is not true that questions of the security of the nation were ignored. By 1954 a rich literature on national security affairs was available to anyone wishing to design courses or do research." It was, as Fox observed, "to be expected that fifteen years of world war and
102
Widening Security
postwar tension, with national security problems continually at the center of public and governmental interest, would shape the research activities of social scientists generally." l4 It is difficult to make the case that the first decade after World War 11 was a period in which civilian intellectuals evinced little interest in national security. To the contrary, it is more accurately described as the most creative and exciting period in the entire history of security studies. Numerous courses on international politics and foreign policy were added to college curricula during this period.'" Two major graduate schools devoted entirely to international affairs were founded - the School for Advanced International Studies at Johns Hopkins and the School of International Affairs at Columbia University. Also founded during this period were International Organization (1947) and World Politics (1948), two major professional journals, both of which published articles on national security. In addition, there were at least three strong research centers focusing on national security: the Yale Institute of International Studies had emphasized national security policy since the 1930s and continued to do so after it moved to Princeton and became the Center of International Studies in 1951. At Columbia, Grayson Kirk encouraged the study of military force and national policy, and the Institute of War and Peace Studies was established in 1951. And at the University of Chicago the strong foundations laid by Quincy Wright were strengthened when Hans Morgenthau joined the faculty in 1943. The Center for the Study of American Foreign Policy was established under his direction in 1950. And in 1952 the Social Science Research Council established a committee on National Security Research, chaired by Fox.16 During the period 1945-55 scholars were well aware of military instruments of statecraft, but security studies was not yet as preoccupied with nuclear weaponry and deterrence as it would become later on. Although no single research question dominated the field, four themes recurred. First, security was viewed not as the primary goal of all states at all times but rather as one among several values, the relative importance of which varied from one state to another and from one historical context to another. Brodie described security as "a derivative value, being meaningful only in so far as it promotes and maintains other values which have been or are being realized and are thought worth securing, though in proportion to the magnitude of the threat it may displace all others in primacy."" This view focused attention on the trade-offs between military security and other values, such as economic welfare, economic stability, and individual freedom. Second, national security was viewed as a goal to be pursued by both nonmilitary and military techniques of statecraft. Warnings against overreliance on armaments were common. Third, awareness of the security dilemma often led to emphasis on caution and prudence with respect to military policy. And fourth, much attention was devoted to the relationship between national security and domestic affairs, such as the economy, civil liberties, and democratic political processes.18
Security Studies
103
The question then is not why there was so little interest in security studies in the decade after World War I1 but rather why later descriptions of the evolution of the field have been so blind to the work of scholars prior to 1955. It is as if the field came to be so narrowly defined in later years that the questions addressed during these early years were no longer considered to belong to the field of security studies.'"ince many of the authors of the books under review subscribe t o a broader view, this is unfortunate. Many current problems are related to those addressed in the period 194.5-5.5, for example, the trade-offs among foreign policy objectives, the trade-offs between foreign affairs and domestic affairs, and the trade-offs between nonmilitary and military policy instruments.
The second decade after World War 11, 195.5-65, has been described as the "golden age" of security studies."' Unlike the previous decade, the "golden age" was dominated by nuclear weaponry and related concerns, such as arms control and limited war. The central question, according to one reviewer, "was straightforward: how could states use weapons of mass destruction as instruments of policy, given the risk of any nuclear exchange?"" This question, it should be noted, represented a shift in focus from the previous decade. Whereas earlier research questions considered what security is, how important it is relative to other goals, and the means by which it should be pursued, the new focus was on how to use a particular set of weapons. Contributors to this literature included Thomas Schelling, Glenn Snyder, William W. Kaufmann, Herman Kahn, Albert Wohlstetter, Henry Kissinger, and others." Although deterrence theory, one of the most impressive intellectual achievements in the history of the study of international relations, was a product of the "golden age," the period also had its many blind spots. Even scholars who define security studies in terms of military force have noted the tendency during that period to overemphasize the military aspects of national security at the expense of historical, psychological, cultural, organizational, and political context^.'^ Edward A. Kolodziej evidently has this period in mind when he observes that "a focus on threat manipulation and force projections became the central, almost exclusive, concern of security studies." This agenda, he notes, "was certainly urgent and ample, but the questions raised were inevitably circumscribed, technical, and nianagerial."'"
If the cold war stimulated and nourished security studies before 196.5, the decreased salience of the cold war during the next fifteen years contributed to a period of decline." As Americans turned their interest from the cold war with the Soviet Union to the hot war in Vietnam, their interest in security studies waned. Although some might view this as an irrational reaction
104
Widening Security
on the part of those who thought they could stop war by not studying it, this would be an oversimplification. In the first place, security studies had been so preoccupied with U.S.-Soviet relations, NATO, and nuclear strategy that it offered little help to those seeking to understand the Vietnam War. As Colin Gray put it, the leading strategists knew "next to nothing" about "peasant nationalism in Southeast Asia or about the mechanics of a counterrevolutionary war."26 Second, security studies had become so preoccupied with war as an instrument of national policy that it had slighted the legal, moral, and other aspects of war emphasized in Wright's A Study of War. Third, the desire to be "policy relevant" had led some scholars into such close relationships with policymakers that they ceased to be perceived as autonomous intellectuals and came to be considered instead as part of the policy-making establishment. And fourth, the decline of interest in traditional security studies was partially offset by increased interest in peace studies and peace research during the 1960s and 1970s, thus indicating that declining interest in security studies was not tantamount to a lack of intellectual interest in war.27 Interest in security studies did not revive immediately after the Vietnam War; rather the lessened cold war tensions associated with dCtente allowed other issues, such as economic interdependence, Third World poverty, and environmental issues, to increase in salience. And the Arab oil embargo served as a sharp reminder that threats to the American way of life emanated from nonmilitary sources, as well as from military ones. The 1980s The breakdown of detente and the renewal of cold war tensions in the late 1970s and 1980s once again stimulated interest in security studies. Student interest was rekindled, foundation money poured in, and research burgeoned, as the old national security studies was replaced by the new international security studies. The new international security studies, however, looked much like the version of national security studies that had evolved after 1955. One writer, who had written a comprehensive survey of the field in 1975, noted the renaming of the field and observed that "the substance of the problems addressed did not change markedly from what national security specialists had been working on earlier."28 Another writer proclaimed the rejuvenation of security studies in the 1980s as the "renaissance" of the field. Defining the field as "the study of the threat, use, and control of military force," he portrayed the renaissance as bringing history, psychology, and organization theory to bear on such familiar topics as deterrence theory and nuclear weapons policy and consideration of such topics as the conventional military balance, the danger of surprise attack, alternative force postures, and the role of the U.S. Navy.29 Although there were undoubtedly new insights during the 1980s, such topics continued to reflect the preoccupation that had characterized the field since 1955 - the use of military means to meet
i L i i t J i i 111
Security Studies
105
military threats. It is small wonder that a European security specialist, noting the military focus of strategic studies, recently observed that "in the United States the field of international security studies has often been equated with strategic studies.""' The cold war not only militarized American security policy, it also militarized the study of ~ e c u r i t y . ~ ' In sum, a case can be made that the origins of security studies predate the cold war, nuclear weaponry, and the so-called golden age. The purpose of such an exercise is not just to set the record straight; it is also a way of placing the study of security during the cold war in perspective. The cold war permeated thinking about security for so long that it will be very difficult to break free from old habits of thought. The cold war affected both the level of activity and the substantive focus of research on security. It focused attention on nuclear weaponry and strategies, on East-West relations, and on the security problems of the United States and Western Europe. At the beginning of the cold war, scholars operating within the broader framework of foreign policy studies and international politics considered national security as one of several important foreign policy goals, with important domestic dimensions and implications, to be pursued by nonmilitary as well as military means. During the cold war the primacy of national security, defined largely in military terms, came to be viewed more as a premise than as a topic for debate. Similarly, military instruments of statecraft became the central, if not the exclusive, concern of security specialists. The question now is whether security studies so conceived is adequate for coping with post-cold war security problems.
11. S e c u r i t y S t u d i e s a n d t h e N e w World O r d e r
During the cold war military threats to national security dominated all others in the eyes of most security specialists. With the end of the cold war have come numerous suggestions that resources once devoted to coping with military threats now be used to deal with such nonmilitary threats as domestic poverty, educational crises, industrial competitiveness, drug trafficking, crime, international migration, environmental hazards, resource shortages, global poverty, and so on." The challenge, according to the Final Keport of the Seventy-ninth American Assembly, is to "rethink the concept of national security" (Allison and Treverton, 44647). Is the field of security studies capable of meeting this challenge? A tentative answer is suggested by examining the field with respect to three critical issues: the goal of national security, the means for pursuing it, and the relation between domestic affairs and national security.
The end of the cold war, like its beginning, raises the question of how important military security is in comparison with other goals of public policy.
106
Widening Security
Although security specialists have become accustomed to thinking in terms of trade-offs within the military sphere, such as that between missiles and submarines, they have been reluctant to extend that logic to trade-offs between military security and nonmilitary policy goals. Instead, they have tended to assert the primacy of military security over other goals. The following three passages are examples of this tendency. In anarchy, security is the highest end. Only if survival is assured can states safely seek such other goals as tranquility, profit, and power.33 The axiom of the primacy of national security among the responsibilities of government cannot be escaped. ... Governments, as a matter of empirical fact, almost invariably commit as many resources and sacrifice as many other desiderata as they feel necessary to preserve their national security.34 States are surely concerned about prosperity, and thus economic calculations are not trivial for them. However, states operate in both an international political environment and an international economic environment, and the former dominates the latter in cases where the two come into conflict. The reason is straightforward: the international political system is anarchic, which means that each state must always be concerned to ensure its own survival. A state can have no higher goal than survival, since profits matter little when the enemy is occupying your country and slaughtering your citizens. (Mearsheimer, in Allison and Treverton, 222) Each of these passages can be interpreted in (at least) two ways. On the one hand, since neither national security nor survival can ever be cornpletely assured, there can be no limit on resources allocated to this purpose; and thus no trade-offs with other goals are ever a d m i ~ s i b l e On . ~ ~the other hand, the passages may be interpreted as implying that such trade-offs are admissible only after a minimum threshold of assurance of survival andlor national security has been attained. The latter, somewhat generous interpretation is surely the more defensible. The trouble with the second interpretation is that it fails to distinguish between the goal of national security (or survival) and other important goals. For example, the economist could assert the primacy of economic welfare, since states are likely to worry little about external military threats if their citizens have no food, clothing, or shelter, that is, no economic welfare. Likewise, the environmentalist could assert the primacy of environmental concerns, since minimum amounts of breathable air and drinkable water are more important than security from external attack. In order to survive, states need minimum amounts not only of security from external attack but also of breathable air, drinkable water, economic welfare, and so forth. A state without armed forces to protect it from external attack may not survive, but a state without breathable air or drinkable water will surely not survive.
I
Security Studies
107
Of course, as King Midas learned, the value of anything - security, economic welfare, clean air - is determined not only by one's preferences but also by how much of it one has. The law of diminishing marginal utility is as applicable to national security affairs as it is to other spheres of social life. Although it is true that military security is an important goal of states, it is not true that conflicts with other goals of public policy will always - or should always - be rcsolved i n favor o f security. In a world of scarce resources, the of military security is always in conflict with other goals, such as economic welfare, environmental protection, and social welfare. This is just another way of saying that the pursuit of security involves opportunity costs - as does any other human action. A rational policymaker will allocate resources to security only as long as the marginal return from a dollar spent o n an additional increment of security is greater than that for a dollar spent on other goals. In order to justify shifting resources from guns to butter, one need not argue that butter is inherently superior to guns or that butter provides more total utility to society than guns. It is only necessary to argue that the marginal utility of an expenditure on butter exceeds that of the marginal utility of that same expenditure on guns. A rational policymaker cannot escape the necessity of comparing the value of an increment of security with an increment of other goals at the margin. The law of diminishing marginal utility suggests that the more abundant security is, the less valuable it is likely to be at the margin." Those, including many of the writers reviewed here, who believe that the end of the cold war has made military security more abundant are therefore likely to suggest that the time has come to shift resources from security to other goals of public policy. If Rethinking American Security is an accurate indicator, public policy debates in the post-cold war world are likely to be increasingly concerned with trade-offs between military security and other public policy goals. An earlier generation of scholars, writing within the framework of foreign policy and international politics during the first decade after World War 11, viewed the goal of military security as one of many public policy goals competing for scarce resources and s ~ ~ b j e ctot the law of diminishing marginal utility." Many of their writings are more relevant to the post-cold war world than are those of more recent writers who assert the primacy of the goal of national security. To the extent that today's security specialists cling to the idea that security dominates all other public policy goals, they are unlikely to make helpful contributions to the post-cold war debate on public policy. 7
Security studies has traditionally devoted less attention to the goal of security than to the means by which it is pursued. More accurately, one should say that the field has tended to focus on one set of means by which security may be pursued, that is, military statecraft. One recent review of the field, for example, ignores security as a goal and defines the field entirely in terms of means, that is, "the study of the threat, use, and control of military force.""
108
Widening Security
Likewise, Shultz, Godson, and Greenwood focus their volume on "the traditional and historical essence of the subject: the threat, use and management of military force" (p. 2).39 The reasons for the emphasis on means rather than ends are not selfevident. A partial explanation for the emphasis on military force may be found in the common practice of equating security interests with "vital interests." Since the latter are typically defined as those interests for which a country is willing to use force, some confusion between means and ends is almost i n e ~ i t a b l eAnother .~~ possible explanation is the tendency of security scholars to treat national security goals as "given." One writer describes the situation as follows: In the field of ... foreign policy studies it is possible - in fact mandatory to ask: "What goals do we want a foreign policy to accomplish?" But in national security there is no parallel question. It is "given" that the goal is to enhance security. An entire dimension of potential theorizing everything that concerns problems of multiple possible purposes - is therefore nonexistent from its very root, in national security affaim41 There is something peculiarly un-Clausewitzian about studying military force without devoting equal attention to the purposes for which it is used. Clausewitz's famous dictum that war should be viewed as policy by other means was meant to imply that military force should be understood in the context of the purposes it serves.42 From the standpoint of the military threats to security that tended to dominate the cold war era, the emphasis of security studies on military statecraft was understandable, though not necessarily justifiable. In the post-cold war era, however, many have suggested that nonmilitary threats be included under the rubric of national security (see especially Allison and Treverton). Many of these problems - for example, environmental protection, promoting human rights and democracy, promoting economic growth - are not amenable to solution by military means. To the extent that this is true, traditional security studies has little relevance. The generation of scholars writing on security at the beginning of the cold war not only defined national security in broader terms but also had a more comprehensive view of the policy instruments by which it could be pursued. Wolfers observed in 1952 that security "covers a range of goals so wide that highly divergent policies can be interpreted as policies of security" and concluded that although armaments were often relevant, some situations called for "greater reliance on means other than coercive power."43 Lasswell, writing in 1950, cautioned against "confounding defense policy with armament" and argued that "our greatest security lies in the best balance of all instruments of foreign policy, and hence in the coordinated handling of arms, diplomacy, information, and economic^."^^ This broad view of the policy instruments relevant to the pursuit of national security is likely to be more useful in the post-cold war world than one that confines itself to military statecraft.
ILiItJ A
I!)
Security Studies
109
Domestic Affairs and Security
Although several of the authors reviewed here mention domestic concerns, Peter G. Peterson argues in his essay "The Primacy of the Domestic Agenda" (in Allison and Treverton) that American security is now threatened more by domestic problems than by external military threats. Noting the legislative mandate of the National Security Council, created in 1947, to establish a forum for integrating "domestic, foreign, and military policies relating to national security," Peterson contends that the domestic dimension of national security tended to be neglected during the cold war years. Recalling the National Security Council's early working definition of national security as preservation of "the United States as a free nation with our fundamental institutions and values intact," he argues that American security is now less endangered by military threats than by the crisis in education, an exploding underclass, and underinvestment in productive capacity and infrastructure. He calls upon those traditionally concerned with national security to broaden their focus to include concern for such domestic threats. Peterson's view of national security poses a severe challenge to a field that has traditionally neglected domestic aspects of security. Indeed, to the extent that domestic affairs have been considered at all, they have been treated as sources of international conflict, as constraints on security policy, or as partial determinants of security policy." They have not, however, been treated as sources of threats to security. The close relationship between traditional security studies and the realist paradigm makes the possibility of incorporating domestic affairs especially difficult. Realists have tended to emphasize the anarchic international system rather than domestic affairs in their treatment of security issues. Similarly, the recent tendency to label the field international security rather than national security is likely to make it even harder to focus attention on the domestic aspects of security. The alleged benefit of international security is that it focuses attention on international interdependence and the security dilemma in thinking about security issues. Once again, the writings of scholars at the beginning of the cold war are more in tune with Peterson's view of national security than are those by today's security specialists. Writing in 1949, Dunn spoke of a "growing realization" that a sharp distinction between domestic and international affairs serves as a "serious obstacle to clear thinking" and pointed to a "general tendency to reduce the line between 'international' and 'domestic."'"9rodie in 1950 defended the idea of contracyclical manipulation of defense spending for the purpose of stabilizing the domestic economy.47 And Lasswell, writing in the same year, sounds very much like I'eterson in warning against "conceiving o f national security policy in terms of foreign divorced from domestic policy" and in his call for "balancing the costs and benefits of all policies in the foreign and domestic fields,"4x In sum, the field of security studies seems poorly equipped to deal with the post-cold war world, having emerged from the cold war with a narrow
1 10
Widening Security
military conception of national security and a tendency to assert its primacy over other public policy goals. Its preoccupation with military statecraft limits its ability to address the many foreign and domestic problems that are not amenable to military solutions. In response, many of the authors reviewed here have called for the development of new ways to think about international relations and national security. For some authors, this impetus for reform of security studies stems from the differences between the cold war era and its successor.49For others, the failure to anticipate the nature or timing of the end of the cold war revealed the deep-seated inadequacies not only of security studies but also of thinking about international relations and foreign policy more generally.50 One might argue that it is unfair to single out security studies as bearing special responsibility in this regard, since no scholarly approach or field of interest proved more prescient than any other with respect to the surprise ending of the cold war. For security studies, however, precisely the claim of special expertise with respect to the cold war makes its failure to anticipate the end so embarrassing. The cold war was not just another event to be analyzed; rather, it was the progenitor of the field and its central focus from 1955 on. Ill. Proposals for the Future
"Security studies as an academic field is in need of clarification," according to Haftendorn. "What is to be studied, how is it to be studied, and how is security studies to be distinguished from various subfields on the one hand and international relations on the other?"51 Proposals for the future study of security may be divided into three groups according to the degree of reform they advocate. Do Nothing
Not everyone agrees that reform is needed. For Mearsheimer, the essential defining characteristic of international politics has been and remains a zerosum competition for military security. Whereas others may see a diminution of military threats to security, he maintains that the end of the cold war does not "mean that states will have to worry less about security than during the Cold War" (Mearsheimer, in Allison and Treverton, 235). For Walt, the end of the cold war expands the agenda of security studies to include post-cold war security arrangements and makes the study of "grand strategy" more important; but it does not necessitate redefining the scope of the field. The end of the cold war, he contends, "will keep security issues on the front burner for some time to come."52 Modest Reform
Security Studies for the 1990s is based on the premise that reform of security studies would have been in order even if the cold war had not ended.
I
Security Studies
1I I
Accordmg to t h ~ svlew, the latter event s~mplymakes the case for such reforms more compellmg. Although some of the contrtbutors, espec~allyCharles Kegley, Oran Young, and Edward Kolodz~e~, argue for radlcal reforms, most concentrate on mlnor reforms consistent with the edltors' convent~onaldeflnltion of the subject a? "the threat, use and management of mhtary force, and closely related toplcs" (p. 2). The editors identify weaknesses in the "first-generation curriculum" (1950-90) of security studies, including overemphasis on nuclear deterrence, the United States, Europe, and the former Soviet Union and neglect of the Third World, Asia, and nonmilitary instruments of policy. They then present model syllabi for eleven courses, which are discussed by various commentators. The three syllabi emphasizing economic, environmental, and regional aspects of security are the only ones that depart from the traditional security studies orientation. The inclusion of the regional security syllabus by Kolodziej is somewhat anomalous. since he clearlv, reiects the narrow traditional defin, ition of security in favor of one broad enough to include domestic affairs, economic issues, human rights, and more. The inclusion of courses on economic and environmental aspects of security is in itself an innovation, of course; but the proposed syllabi d o not depart significantly from conventional views of security. The syllabus o n "environment and security," for example, emphasizes such topics as environmental tools of warfare (herbicides, for example), environmental side effects of warfare, and environmental disputes as causes of war. Overall, Security Studies for the 1990s presents a view o f the field not much different from the cold war version. What is needed, it suggests, is not fundamental reorganization of the field but rather modest reform.
Radical proposals for reforming security studies include those that call for broadening the focus o f the field and those that advocate reintegration of security studies with the study of foreign policy and international politics. Proposals for expanding the focus of security studies have been advanced by numerous scholars, including Ullman, Ruzan, Haftendorn, Kolodziej, and Kegley." Recognizing that threats to national survival or well-being are not confined to the military realm, these proposals expand the notion of security threats to include such matters as human rights, the environment, economics, epidemics, crime, and social injustice. These proposals are not necessarily tied to post-cold war developments. Indeed, any serious attempt to explicate the concept of security is likely to lead to a broader view - which may explain why traditional security specialists have usually avoided such exercises.j4 Reflections on the post-cold war world, however; have increased the number of proposals for a broader conception of security. For those seeking an enhanced understanding of the multiple vulnerabilities that beset hunlankind," expanding the focus of security studies is
1 12
Widening Security
clearly a step in the right direction. But from the standpoint of academic disciplines - admittedly a matter of minor importance to nonacademics the advantages are less obvious. For to expand the scope of security studies is to blur even further the barely distinguishable line between the subfield of security studies and the main field of international relations and foreign policy studies. As Klaus Knorr recognized two decades ago, "If we wanted to study with equal emphasis all phenomena suggested by the term 'national security,' we would have passed on to the study of foreign policy or international relations as a whole."j6 Perhaps the time has come to abolish the subfield of security studies and "pass on" or, more accurately, return to the study of foreign policy and international relations. In commenting on one of the syllabi in Security Studies for the 1990s, Oran Young observes that "there is a strong case for integrating international security studies into the broader curriculum on international relations"(p. 351).j7 The following are the principal arguments on behalf of such a case. 1. It overlaps too much with the fields of international politics and foreign policy. Although expanding the focus of security studies makes the problem more obvious, there has never been a clear line between security studies and international politics and foreign policy studies. War has always been a central concern of international relations scholars; and national security policy, including war as an instrument of statecraft, has been part of that concern since 1940. Various scholars have noted the overlap, and none has been able to draw a clear line between academic security studies and its parent fields of foreign policy and international politics.5RThe intimate connection between military force and foreign policy was clearly recognized before the "golden age" of security studies began: On the important matter of the necessary relation between armed forceand policy, nothing in the profession of a soldier - not his training, his tactics, his weapons, his code of war - and nothing in military policy of any American command, from the battalion to the Joint Chiefs of Staff, is without reference to policy. Strictly speaking, there is no such thing as a purely military matter."9 The basic concepts of security studies (for example, power, balance of power, the security dilemma, limited war, and various concepts from deterrence theory) are covered in standard courses on international politics. And it would be difficult to imagine a course on foreign policy that did not include military policy (which cannot be said for foreign economic policy). In American universities at least, the dominance of the realist paradigm ensures that standard security studies topics will be covered.60 There is a certain irony in the fact that it is precisely the hard-core realist security scholars who are in the weakest position to make the case for security studies as a separate subfield. If one believes that military competition among sovereign states is "the distinguishing feature of international politics"
!hi:ri
Security Studies
1 13
(Mearsheimer, in Allison and Treverton, 214; emphasis added), then one must assume that a well-designed course in international politics will focus on many of the same topics as will a course in traditional security studies. "Since Thucydides in Greece and Kautilya in India," asserts Kenneth Waltz, "the use of force and the possibility of controlling it have been the preoccupations of inter~lational-politicalstudies."" It is hard to make a case for the study of military force as a subsidiary endeavor if one believes that this topic should be the central focus of the principal field. Subfields, by definition, deal with subtopics. There is also a certain irony in the fact that the overlap is a natural pedaheroes of conventional gogical consequence of the teachings of two intellect~~al security studies - Clausewitz and Schelling. The pedagogical implication of Clausewitz's famous dictum is that war should not he studied separately from broader issues of foreign policy and international relations. When our thinking about war is divorced from our thinking about political life, he argued, "we are left with something pointless and devoid of sense."" And Schelling t a ~ ~ g us h t to think about war and military strategy in the context of international bargaining processes in which conflict and cooperation are inseparable." The teachings of Clausewitz and Schelling provide arguments for integrating the study of security with the study of foreign policy and international politics. 2. I t impedes policy sclcr~anie.Despite the commitment of most security studies scholars to policy relevance, the field is severely handicapped with respect to its ability to contribute to the broad debates on public policy likely to characterize the p o s t ~ ~ o lwar d world. These handicaps arise from its treatment of both means and ends. That relating to means is the more fundamental because it is inherent in the definition of the field in terms of the threat, use, and control of military force. Although some security problems may be adequately addressed by comparing the pros and cons of various types of military statecraft, most important problems involve consideration of nonmilitary techniques of statecraft as well. Policymakers rarely define a security problem as, We have these weapons; now what can we d o with them? Rather, they ask, We have this problem; what means are available for coping with it? Policymakers need help in evaluating the utility of all the instruments available to them, including diplomacy, information, economic statecraft, and military statecraft. Consider the following question, which many security specialists would view as central to the field: "Under what conditions should states employ obvious he answer is that states military force a n d for what p u r p o ~ e s ? " ~ ~ should employ military force when its prospective utility exceeds that of alternative techniques of statecraft. The problenl is that this can be determined only by comparing the costs and benefits of alternative techniques of statecraft with those of military force. Those who confine themselves to the study of one type of statecraft are logically incapable of judging the utility of that type of statecraft for any problem with respect to which other types of statecraft are potentially relevant."
1 14
Widening Security
Hedley Bull recognized this problem in his famous defense of strategic studies: No doubt strategists are inclined to think too readily in terms of military solutions to the problems of foreign policy and to lose sight of the other instruments that are available. But this is the occupational disease of any specialist, and the remedy for it lies in entering into debate with the specialist and correcting his perspe~tive.~" Bull's proposed "remedy," however, depends on the willingness and capability of others to correct the military bias of the security ~pecialist.~' In today's context this passage would seem to suggest that subfields other than security studies bear the responsibility for correcting the military bias in security studies. There are, however, no other subfields defined in terms of techniques of statecraft: the subfield of foreign policy studies is not defined in terms of diplomacy, and international political economy is not defined in terms of economic statecraft. What is needed is a field of specialization that subsumes the study of all types of statecraft, for example, traditional foreign policy studies. With respect to ends, the handicaps of conventional security studies are real but not inherent. The tendency to assert the primacy of national security and the consequent resistance to thinking in terms of trade-offs between security and other goals impedes policy-relevant debate, but this is a correctable defect. All that is required is a return to the view that marginal utility analysis is relevant to judging the importance of security relative to other goals. Another significant but remediable handicap is the tendency to treat goals as given and to accept the framework of assumptions within which policymakers define security problems.68 In the post-cold war world it is precisely this framework of assumptions that needs to be reassessed. There is no inherent reason why those who study military force must accept the outlook of those who use it. Witness the example of the peace researchers. Reintegrating the study of the threat, use, and control of military force with traditional foreign policy analysis would facilitate both the assessment of the utility of military statecraft and the comparison of security with other policy goals. Policy relevance would thereby increase. 3. It is mislabeled. Unless one is willing to argue that military threats to national well-being are the only ones that matter, it is difficult to justify labeling the study of the threat, use, and control of military force as "security studies." This cannot be dismissed as merely a semantic problem. Connotations have consequences, and for the last forty years the consequence of designating something as a security issue has been synonymous with asserting its relative importance. High politics implies low politics; vital interests imply nonvital interests; and important issues imply unimportant issues. "National security" is therefore not just another label; it is a powerful political symbol. This has been well understood for a long time. In 1952 Wolfers pointed out that "any reference to the pursuit of security is likely to ring a sympathetic And in 1993 Shultz, Godson, and Greenwood
1
I
Security Studies
115
noted that "everyone agrees that 'security issues' are important and deserving of national prominence and financial support" (p. I)."' It is precisely because "everyone agrees" that security issues are important that they should not be consigned to a separate subfield. Although some subfields are more important than others, n o other academic discipline contains a subfield designated, in effect, "the study of important iss~~es."~' 4. Security is too broad. As a theoretical concept, "security" is too broad to define a subfield. Broad analytical concepts, such as power, interdependence, welfare, cooperation, conflict, public interest, and securit); are relevant to all subfields of international relations and should be the special province of none. Buzan rightly points o ~ ithat t the concept of security is broad enough to integrate the fields of international relations theory, international political economy, area studies, peace studies, human rights, development studies, international history, and so forth.-l It is precisely for this reason, however, that it should not be used to delineate a single subfield. Lasswell understood the broad applicability of the concept, which prompted his observation that "there are no experts on national security. There are only experts on aspects of the problem."-.' The third and fourth arguments outlined above, concerning the mislabeling of the field and the breadth of the concept of security, are based on the assumption that both the label and the concept are important to security studies scholars. To the extent that such scholars are willing t o give up both the label and the claim of special expertise with respect to the security problematique, those arguments would be nullified. Renaming the field as "military studies," "war studies," or something similar, however, would not affect the first or second arguments discussed above. If reintegration of security studies into the broader curriculum of foreign policy and international politics is desirable, why not apply similar logic to other subfields, such as international political economy (IPE)?The answer to this question is instructive. If the rationale for subfields is to ensure that important subtopics are not neglected, the emergence of IPE as an identifiable suhfield during the 1970s was justified by - and a reaction to - the widespread neglect of the topic by international relations scholars during the 1950s and 1960s.-"o the extent that the larger field focuses on the politicoeconomic aspects of international relations, the rationale for a subfield of IPE is weakened. In principle, then, one can well imagine a situation in which the arguments for reintegration of security studies would apply, mutatis mutandis, to IPE. If the dominant paradigm for the study of international relations were Marxist-Leninist, for example, one might well argue that a subfield of lIIE was unnecessary on the grounds that it overlapped too much with the main field of study. Under such circumstances, one might argue that a subfield of security studies is needed in order to ensure that politico-n~ilitary aspects of the subject are not neglected. The case for the traditional subfield of security studies is strongest when realism is not the dominant paradigm. It is paradoxical that traditional security studies flourished during the cold war,
1 16
Widening Security
when realism was at its apogee and the rationale for the subfield would seem to have been weakest. It is sometimes argued that the existence of security studies as a sub-field is justified by the continuing importance of war and military strategy in human affairs. The question here, however, is how, not whether, to study war and military strategy. The reintegration of such topics into the study of international politics and foreign policy would not put academic security specialists out of work. It would, however, set their work in a broader context that would increase its relevance to the post-cold war world. IV. Conclusion
The emergence of security studies as an identifiable subfield of international relations was closely related to the cold war. Interest in the field tended to rise and fall with cold war tensions, and the substantive focus of the field tended to be dominated by cold war issues. Is there a role for security studies now that the cold war is over? The answer to that question depends partly on one's view of the state of the subfield and partly on one's vision of the post-cold war world. The vision of the post-cold war world presented by many of the contributors to the books under review is one in which nonmilitary foreign and domestic threats to American security have increased in importance, even as external military threats have decreased in importance. As a means of pursuing national security, military force is viewed as less useful than it used to be, though certainly not irrelevant. Some call explicitly, others implicitly, for a fundamental reexamination of the theories, concepts, and assumptions used to study national security during the cold war. The purpose of this review has been to lay the groundwork for such a reexamination by contrasting the study of national security at the beginning of the cold war with security studies at its end, by evaluating the relevance of contemporary security studies to the new world order, and by laying out a wide range of proposals for reforming security studies. The world of the 1990s is not the world of 1945-55, but some of the modes of thought, policy concerns, concepts of security, and discussions of statecraft developed during that period appear more relevant to the post-cold war era than those bequeathed to us by the cold war. Scholars searching for ways to think about security problems in the 1990s may find it useful to consult the writings of this older generation of scholars. The answers to today's problems are not t o be found there, but some of the right questions are.
Acknowledgements The author would like to thank the following scholars for helpful comments on earlier drafts of this review article: Richard Betts, Robert 0. Keohane, Edward A. Kolodziej, Robert Jervis, Edward Mansfield, Helen V. Milner, Jack Snyder, and Oran Young.
I
Security Studies
I 17
Notes I . Charles W. Keglc): Jr., "The Neoidealist M o m e n t in I n t e r l ~ . ~ r ~ o Studies? nal Realist Myths ~ n the d New I n t e r n i ~ t ~ o n Studic5," al It~terimtronulSttctlics Q I I I I Y ~37 C ~(June I ~ 19931, 1 4 1. 2. See e\peci,~ll>the c o n t r i h u t ~ o n sby Ernest R. May, Raymond I.. Garthoif, a n d Robert Jervis In Hogdn; the essays b y Peter <;. Peterson, Gregory F. T'revrrron, a n d Barbara A. Kicksler in A l l ~ s o na n d Treverton; and (;acidly, Thr Utrrted States m i l t l ~ ckrrd of'the Cold Wczr. 3 . See c s p e c ~ ~ ~the l l ) c < ) n t r ~ h u t i i ~by n \ K ~ ~ l a Stccl l d . ~ n dKc~lwrtJervis in H o g , ~ n ;C;~ddl\; and ~ i i o s tof the essnys in Allison m d Treverton. 4 . In order t o niakr the suhlect nl,tn,~geahle, this review c ~ ~ - t i cfocii\es le o n security studies in the United St'ttes. This s h o ~ i l dnor he ~nterpreteda s implying t h , ~ timportant wol-k war nor d o n e in other part5 o f the world. 5. See, tor example, Gene C1. Lyons a n d LOUISMorton, S~-/J~JO/S t ; ~ rStnrtcgy: Fdlrc-otlr~rr irnd Rewirrc-b in N,ztrord See-lrrrt)!Affilirs ( N e w York: Freder~ckA. Praegcr, 1965); P.G. Bock and klorron K e ~ - k o w ~ t z"The , Emerging Field of Narion,~l Security," World Politic-s I') (Octoher 1966), 122; Joseph S. Nye, Jr., and Sean M . I.ynn-Jones, "lnternat~onal Secur~ty S t u d w : A Report ot ,I Conference o n the State of the Field," I~rtt~rii~~trotrrrl Secrtrlty I 2 (Spring 1988), 8; a n d R i c h ~ r i lSmoke, "National Security Aftairs," in Fred I. G r e e n s t e ~ na n d N e l w n W. I'olsh); eds., HLzird0ook of I'~~litrc-~r/ .\"~im(-c,vol. 8, I ~ t t i ~ ~ n ~ z tPolltr~s ~ o t r ~ ~(Reading, l MJSS.: Addison-Wesley, 197.5). Smoke J . ~ t e \the emergence of the field from the m1J-19.5Os. with its concern ,lbout lirn~tcdw,lr ,und the massive retaliation doctrine. 6. Will~arnT.K. Fox, "Inter\vi~rInternational Relations Kese.lrch: The A n i e r i c ~ nExperience," World I'olit~cs2 (October 19491. 7. Wright, A Strril~,o f W'lr, 2 d ed. ( C h ~ c a g oU : n i l c r s ~ t yot < hicLigo I'rcss, 196.5). 8. W~lli'irn T.R. box, " A hliddle Western I s o l a t i o n i s t - l n t e r ~ ~ i ~ t ~ o n a lJourney ist's toward Ilelev,lncc," in Joseph Kruzel 'ind J,lmes N. Ilosenau, eds., /olrrtrcy t h r o u ~ l\Vorld ~ Polit~c-3: Arrto~~iogrirphl<-~~/ ~~~~~~~~~tioifs of 'Thi?t~~-fortr Ai-'~ii~~'r.wtie7 ? i r r ~ ~ /(rI ?rulngton, ~ Mass.: 1xuingto11 Books, 1 9891, 2.36; e n ~ p h a s ~ins o r l g ~ n a l . 9. Ihid., 237-38. 10. 1.yonc .lnd Xlorton ( i n . i ) , 37; <;rayson Kirk a n d Rich,~rdStehhins, W'rr m t l Nr~t~otri~l I'olri-y: A Syllabrrs ( N e w York: t a r r . ~ r,lncl Reinhart, 19421; a n d H'lrold Sprout and M,lrgarer l - o ~ ~ i ~ d ~ofz tNLrtiotld ~ ~ ~ r ~ sI'OWCI.:Rel~Jiizgs1111 lVor/d I'o/ltics 'znd Arttcwrirr~ S p r o ~ ~eds., t, Secxrity ( P r ~ n c c t o n I'ri~lcrton : University I'ress, I94.i), ix. I I. Sprout a n d Sprout ( h . 10). O n e i n d i c ~ t o of r the Impact of 1111shook is that the second e d ~ t i o n(19.51) serve\ as the b a s ~ creterencc polnt for d~scussingthe idea of " n a t i o n ~ lpower" in a texthook o n ~ i ~ ~ t i o sccurlt) nal prepared for We\t IJoinr c ~ d e t \- long after the Sprouts themselves had r e p ~ ~ d i a t etheir d earl~el-~ p p r o a c ht o a n a l y z ~ n gpower. See Amos A. l o r d a n , Willi,~mJ. Taylor, Ir., m d I.awrence J . Korb, Atrreria~tl Natiorr~lSrcrtrrty: Pollry m d Proccss. 4th ed. (l~.llt~rnore: ,john\ Hopkins IJn~ver\ityPre\s, 199.31, 10; a n d Harold Sprout a n d M,lrg,~retSprout, 7 b r Eco1ogi~-'11I'c~rspc,c-ticvotr Hllttrirrt A f / ~ ~ r WTrth s : Spccwl Krferc~trc~e to Intrrncztronal Polrtlcs (I'rinceton: Prit~cctonlin~versityPress, 196 51, 2 1711. I?. I<.g., Smoke (fn. S ) , 275-87; l y o n \ . ~ n dhlorton ( t n . i); a n d M a r c Trachtenherg, "Strc~tegicT h o ~ i g h In t An1er1c.1, 19.57- 1966," Polit~c-'11 Si-rcvrcc,Q ~ ~ ~ r r t104 ~ r l(Sunimer y 1989). 1.3. For a s ~ m p l i n gof r h ~ \liter,~turc,see Willi,~m T.R. Fox, "<:ivil-hlil~tary RelL~rions Research: T h e SSRC: C o n i m ~ t t e ea n d It\ Research Survey," LV(~rle1Polrtics h (J,~nu,iry19i41. 14. IhrJ., 279. IS. Grayson K ~ r k , 7.11~,Stl~tf?'of IntertzrrtiotrLl/ Relcltroirs rn Amcricizrr (:o//egcs irrrd Uwi~wsitrcs( N e w York: Chuncil o n Foreign Rcl,itions, 1'147). 16. For d e u i l s o n the te,lch~ng.ind rese'irch programs ~t Yalr, Princeton, ( h l u m h i a , and C:hic,~go during t h ~ sp e r ~ o d .w e l yon5 a n d Morton (fn. 51, 127-44; a n d William T.R. Fox, "Freder~ck Sherwood Dunri . ~ i ~rhe d Americar~ S t u d ! of fnrer~l,~rronalRelations," World Polrfrc-s IS (Octoher 1 9 6 2 ) . T h e SSKC Cornn~lttecW.IS origin,~llycalled the Committee o n Civil-M~liti~ry R e l ~ t i o n sRese,lrch, but this w ~ Inter s ch.~nged t o the Committee o n Narion.11 Security Policy ReseLirch. 17. Kern,ird B r o d ~ e ,"Str,itegy ,is .I S c ~ e i ~ c e ,World " Po/r/rc-s I (,luly 1949), 4 7 7 .
1 18
Widening Security
18. For examples of these recurrent themes, see Brodie (fn. 17); idem, National Security and Economic Stability, Memorandum no. 33 (New Haven: Yale Institute of International Studies, January 2, 1950); Arnold Wolfers, "'National Security' as an Ambiguous Symbol," Political Science Quarterly 67 (December 1952); Frederick S. Dunn, "The Present Course of International Relations Research," World Politics 2 (October 1949); and Harold D. Lasswell, National Security and Individual Freedom (New York: McGraw-Hill, 1950). 19. Two recent reviews of the evolution of security studies ignore or make only passing reference to the contributions of such major figures as Wright, Wolfers, Fox, the Sprouts, Dunn, Lasswell, Earle, and Spykman. Stephen M. Walt, "The Renaissance of Security Studies," International Studies Quarterly 35 (June 1991); and Helga Haftendorn, "The Security Puzzle: Theory-Building and Discipline-Building in International Security," International Studies Quarterly 35 (March 1991). 20. Walt (fn. 19); and Colin Gray, Strategic Studies and Public Policy: The American Experience (Lexington: University Press of Kentucky, 1982). 21. Walt (fn. 19), 214. 22. See Smoke (fn. 5); Lawrence Freedman, The Evolution of Nuclear Strategy (New York: St. Martin's Press, 1981); Fred Kaplan, Wizards of Armageddon (New York: Simon and Schuster, 1983); and Trachtenberg (fn. 12). 23. See, for example, Smoke (fn. 5); and Walt (fn. 19).The most enduring contribution of the "golden age" was Thomas C. Schelling, The Strategy of Conflict (Cambridge: Harvard University Press, 1960). Although concerned with nuclear strategy, Schelling stressed the applicability of his analysis to a broader set of actors and problems, including foreign aid, tariff bargaining, child rearing, taxi driving, investing in the stock market, tax collecting, house buying and selling, voting, playing charades, striking, price wars, traffic jams, kidnapping, daylight savings, etiquette, Lot's wife, and selecting Miss Rheingold. 24. Kolodziej, "What Is Security and Security Studies? Lessons from the Cold War, " Arms Control13 (April 1992), 2. 25. Walt (fn. 19), 215; Smoke (fn. S), 3 0 3 4 ; Nye and Lynn-Jones (fn. S), 9; and Trachtenberg (fn. 12), 332. 26. Gray (fn. 20), 90. See also Smoke (fn. S), 304-5. 27. See Jaap Nobel, ed., The Coming of Age of Peace Research: Studies in the Development of a Discipline(Groningen, The Netherlands: STYX Publications, 1991). 28. Richard Smoke, National Security and the Nuclear Dilemma: An lntroduction to the American Experience in the Cold War, 3d ed. (New York: McGraw-Hill, 1993), 328. 29. Walt (fn. 19). Walt also portrays the "renaissance" as characterized by a commitment to more rigorous scholarly standards. Although he notes that much work on security topics fails to meet basic scholarly standards and "should be viewed as propaganda rather than serious scholarship," he concentrates his review of the field on works that do "meet the standards of logic and evidence in the social sciences" (p. 213). He concludes, not surprisingly, that the field is doing quite well by social science standards. For a cogent critique of Walt's view of security studies, see Edward A. Kolodziej, "Renaissance in Security Studies? Caveat Lector!" International Studies Quarterly 36 (December 1992). 30. Haftendorn (fn. 19). 31. On the militarization of American security policy, see the essays by Allison and Treverton, Peterson, and Treverton and Bicksler, in Allison and Treverton; the essay by May in Hogan; and Richard H. Ullman, "Redefining Security," International Security 8 (Summer 1983). 32. See Allison and Treverton; and Joseph J. Romm, Defining National Security: The Nonmilitary Aspects (New York: Council on Foreign Relations Press, 1993). 33. Kenneth Waltz, Theory of International Politics (Reading, Mass.: Addison-Wesley, 1979), 126. 34. Smoke (fn. 5), 248; emphasis in original. 35. This is not to suggest that the authors of these passages actually advocate unlimited defense spending. The relevant question is whether the logic of such passages provides any justification for a limit.
3 6 . F.ven concelvlng of security as ,I matter of degree seems t o he difficult for some security spec~~ilists. See Barry Kuzan, P ~ r ~ p /States c, and Fear: An A ~ w ~ d for i z Intemntiona/ Serrrrlt]~ Sttrdics I?? the Post-(;old War t.rrz. 2 d ed. (Boulder, Colo.: L.ynne Kienner, 1991). Rumn asserts t h ~ the t "word itself ~ m p l ~ e;Ins absolute condition ... a n d doe\ not lend itself t o the idea ot a graded spectrum like that which f ~ l l sthe space between hot and cold" (p. 18). And K l ~ u Knorr s notes that h ~ tre,ltment \ of security threats as matters of degree "causes a lot of c o n c e p t ~ ~ , i l uneasiness" for other scholars. Knol-I; "Economic Interdependence ,lnd National Secur~ty," in I(lC~ul\
K n o r r .1nc1 P,-.~nkN. 'T'r.lp,cr, c d ~ . ,I ' c - o r z < , n z r c I s s r r c s i z ~ z dN ' r t r < m a l Security ( I .xwrcncc:
Regents Press of Kansas, 1977), 1811. 17. E.g., D u n n (fn. 18); Wolfers (hi. 18); 1,asswell (fn. 18); and Brodie (fnn. 17, 18). Ijefrnse economl$r\, of course, have usually shared this view. 7 h 1 r voices, however, were more s a l ~ e n in t securlty studies during the "golden age" t h a n during the 1980s. See Charles J. H ~ t c h , " N a r ~ o n a lSecur~r)P o l ~ c yas a Field tor Econonlics R e ~ e ~ ~ r c h\VorId , " I'olrtrcs 1 2 (April 1960); Charles J. Hitch a n d Roland McKean, The Econonri~-sof Drfcnsr in the N~rrlear Agc~ (C:amhridge: Harv.11-d University Press, 1960); and James R. Schles~nger,The Politicul Ecol~oilry of Nrrtional Seurity ( N e w York: Frederick A. Praeger, 1960). Walt's (fn. 1 9 ) recent revietv, for example, pays scant atrentlon t o the views of defense economtsts. 38. Walt (fn. 191, 1 1 2 ; rmph,isis in original. Walt's definition of the field is puzzling, since he had c r i t ~ c i ~ ethe d tendency t o define security wlely In m ~ l i t ~ l rterms y in a n e r ~ r l ~ puhlicaer tion. Stephen hl. W ~ l t ,"The Search for a Science of Strategy," Intert~ntionalSecurity I 2 (Summer 1987), 159-64. 39. For other reviews of the field that e m p h a s i ~ em i l m r y force as a means rather than security as an end, see KLius Knorr, "National Security Studies: Scope and Structure of the Field," in Frank N. Trager and Philip S. Kronenherg, eds., Nntlonirl Seczwity anti Atnerzcan Society: T!~rory : Press of Kan\as, 197.3); .lnd Nye and Lynn-Jones (fn. 5 ) . Process, m d Policy ( L ~ w r e n c eIlnivers~ty 40. See Kernal-d Brodie, W l r irrtti Polltics ( N e w York: Macrii~llan,1 9 7 3 ) , chap. 8. 41. Snioke ifn. 2 8 ) . 3 3 0 . See also Snioke (fn. i ) , 2.59. 42. See the interpretive css,lys hy Bernard B r o d ~ e ,Petel- I ' , I I - ~ ~ ,a n d Michael H o w a r d , 111 Carl von C l a u s c w ~ t / ,O n Wnr (Princeton: Princeton Universit) Press, 1 9 7 6 ) . 43. Wolters (tn. 18). 484. 502. 44. I.asswell (fn. 1 X), 75.Recent interest In "grand strategy" a m o n g security s p e c ~ a l ~ shrls rs expanded the term t o ~ n c l u d ed~plornacyas well as milit,iry means, hut economic statecraft and information remalt1 neglected. On this point, see W ~ l (fn. t 19); 'ind Kolodziej (fn. 29). 4 3 4 . 4.5, Nye a n d 1.ynt1-Jones (in. S),24; .ind Walt (fn. 191, 21.5, 224. 4 6 . I 1 ~ 1 n n( i n . 1 X), 83. 47. Krodie (fn. 18). 4 8 . Lasswell (fn. 18), 55, 75. 4 9 . See the essays hy Allison a n d Treverton, Peterson, May, Michael Rorrus a n d J o h n Zysman, a n d Schell~ng,in Allison a n d Treverton; see Shulrz, Godson, a n d Greenwood; and see the e s u y by J e r v ~ s ,In Hogan. 50. See Gaddis; a n d the esa,Iys by G a d d ~ as n d Ronald Steel, In Hogan. See also J o h n Lewis G a d d ~ s "Internat~on,d , Relations Theory 'ind the End of the Cold War," Internationc~lScotrlty 1 7 (Winter 1992-93); a n d K o l o d ~ ~ (fn. e l 29). 5 1 . Hafrcndorn (fn. 191, 15. 51. Walt (fn. 191, 225-27. 53. Ullnian (fn. 3 1 ) ; Buzan (in. 36); Haftendorn (fn. 19); Kolodz~el(in. 29); and Kegley, "Discusswn," in Shultr., Godson, a n d Greenwood, 73-76. 54. O n this polnt, see B u ~ , l n(fn. 361, .3-12. Recent r e v i e w ot the field by Nye and 1.ynnJones (fn. 5 ) a n d Walt (fn. 191, for cxarnple, d o n o t attempt t o d c f ~ n ethe concept of securit). Although many ot the contributors t o Scc-wity Studies rtr t / ~ cI ')9Os allude t o the debate a h o ~ ~ t alternative c o n c e p t ~ ~ ~ l l i z a t i oof~ lthe s field, none of the ele\.en course syllabi includes the f a n i o ~ ~article s by Wolters (fn. I X ) o n the concept of n.~tion.ll securlty. 55. I-larold Sprout and Margaret Sprout, Mrrltiple Vrrlnefiil~ilit~c~s: The Cortt~xtof 1:il~~irorrnrcwtd Reparr atid Kcsorrrrc3, Research Monograph no. 4 0 (Pr~nceton:Center of Intern,~r~onal S t u d ~ e s Pr~nceron , LJniversity, 1974).
120
Widening Security
56. Knorr (fn. 39), 6. 57. Kolodziej (fn. 29) warns against consigning security studies to "a ghetto within the academy" and suggests that such studies be integrated into "as inclusive a spectrum of disciplinary units as possible" (pp. 436-37). On "reintegrating" strategic thought "into the mainstream of the theory of international politics," see also Laurence Martin, "The Future of Strategic Studies," Journal of Strategic Studies 3 (December 1980), 91-99. 58. E.g., Lyons and Morton (fn. 5); Bock and Berkowitz (fn. 5);Smoke (fn. 5); Knorr (fn. 39); and Haftendorn (fn. 19). 59. William Yandell Elliott et al., United States Foreign Policy: Its Organization and Control (New York: Columbia University Press, 1952), 159. This view of foreign policy would be broad enough to include even tank tactics, which are specifically excluded from the purview of security studies by Nye and Lynn-Jones (fn. 5), 7; and Smoke (fn. 5), 251. 60. On the dominance of realism in courses, see Hayward R. Alker and Thomas J. Biersteker, "The Dialectics of World Order: Notes for a Future Archaeologist of International Savoir Faire," International Studies Quarterly 28 (June 1984); and Alfredo C. Robles, Jr., "How International Are International Relations Syllabi?" PS 26 (September 1993), 526-28. 61. Waltz (fn. 33), 186. 62. Clausewitz (fn. 42), 605. 63. Schelling (fn. 23); and idem, Arms and Influence (New Haven: Yale University Press, 1966). 64. Walt (fn. 19), 226. 65. For discussion of the logic of evaluating techniques of statecraft, see David A. Baldwin, Economic Statecraft (Princeton: Princeton University Press, 1985). 66. Bull, "Strategic Studies and Its Critics," World Politics 20 (July 1968), 599-600. Bull's concept of strategic studies is roughly equivalent to the conventional American view of security studies in terms of the threat, use, and control of military force. 67. In fairness to Bull, it should be noted that he was opposed to separating strategic studies from the wider study of international relations. 68. On this point, see Walt (fn. 19); Kolodziej (fn. 29); and Samuel P. Huntington, "Recent Writings in Military Politics: Foci and Corpora," in Huntington, ed., Changing Patterns of Military Politics (Glencoe, 111.: Free Press, 1962), 240. As early as 1949, Dunn (fn. 18) noted this tendency and expressed concern about allowing "the consumers of research, and especially the governmental decision-makers, to determine the questions on which academic researchers shall work" (p. 84). 69. Wolfers (fn. 18), 481. 70. For other studies referring to national security as a symbol of importance, see Buzan (fn. 36), 19, 370; and Brodie (fn. 40). 71. Although it could be argued that American scholars were simply following standard governmental terminology, even this justification may disappear. President Clinton's National Security Strategy of Engagement and Enlargement (Washington, D.C.: White House, July 1994) emphasizes economic prosperity, population growth, environmental degradation, mass migration of refugees, narcotics trafficking, and promoting democracy, as well as traditional military concerns. 72. Buzan (fn. 36), 372. 73. Lasswell (fh. 18), 55-56. 74. Susan Strange, "International Economics and International Relations: A Case of Mutual Neglect," International Affairs 46 (April 1970), 304-15.
Identity and Security: Buzan and the Copenhagen School Bill McSweeney
Barry Buzan, People, States and Fear: A n Agenda for I.nternat~onal Secunty Studzes zn the Post-Cold W a r Era, Hemel Hempstedd, Harvester, 2nd edn, 199 1. Ole Waever et al. (eds.), European Polyphor~y:Perspectzves beyond East West Confrontatmn, London, Macm~llan,1990. Barry Buzan et al., T h e t u r o p e a n Securzty Order Recast: Scenarms for the Post-Cold W a r Era, London, Pmter, 1990. Ole Waever et al., Identzty, Mlgratron and the N e w Securzty Agenda ln Europe, London, Pinter, 1993.
S
ince the publication in 1983 of the first edition of People, States and Fear, Barry Buzan's work has established itself - for European scholars, at least - as the canon and indispensable reference point for students of security. His book and the revisions of the second edition (1991) have been the stimulus for further exploration of the security problenl at the Centre for Peace and Conflict Kesearch in (;openhagen. Together with Kuzan, the collaborators have produced several publications on the security theme, sufficiently interrelated to warrant the collective shorthand, the 'Copenhagen school' of security studies. The revision of security studies, which Buzan announced in 1983, has taken a new turn with a recent publication by the Copenhagen school. The need to refine the concept of security and to focus greater attention on 'social identity' appears to have emerged more from the pressure of events suggesting a move in this direction than from particular doubts previously expressed at the theoretical level. With Buzan as a principal contributor, the new thinking is set out in the recent publication of Waever et a/.' Since Buzan has shared authorship of a new direction of his initial project, it merits scrupulous attention by all who have spent the last decade reading and teaching l'rople, States and Fear and, in Ken Booth's words, 'writing footnotes to it'.? Source: Kerww
of
Itzte?nntro~~~rl Strriitcs, 221 1 ) ( 1996): X 1-93
122
Widening Security
At first glance, the new emphasis on society and identity answers the main body of criticism levelled at Buzan's inability, arising from his conceptual model giving ontological primacy to the state, to accord significance or autonomy to human beings as an object of security and to the sub-state groups to which they belong3 His collaboration in the abandonment of state primacy shifts the weight of his contribution to security studies - and his reputation - to this later joint publication. Another factor that will contribute to its appeal and influence is its focus on societal identity as the core value vulnerable to threats and in need of security. Identity had been a fashionable preoccupation of social scientists for many decades prior to its emergence in the media as the major cause of upheaval in central and eastern Europe and the source of resistance to integration in the European Union. Waever et al. have thus given an old idea a new angle in discourse on international affairs. Identity is a good thing, with a human face and ephemeral character which make it at once appealing and difficult to grasp. From the pens of scholars who aim to situate their work in the neorealist tradition, it betokens a break with the image of that hard-bitten class which formerly consigned identity to the category of soft concepts suitable for novelists and sociologists. The analysis of collective identity can be approached from a deconstructionist, sociological angle, which focuses on the processes and practices by which people and groups construct their self-image. O r it can be approached from the more common objectivist viewpoint, similar to that adopted in respect of the state in Buzan (1991). Waever et al. appear unsure and to want to have a foot in each camp. The discussion setting out their basic approach is obscured by uneven and sometimes slippery language, suggesting some doubts as to the force of their argument and the degree of continuity of approach with Buzan (1991). There are passages that suggest the deconstructionist agenda, but these are radically at odds with the bulk of the work which remains firmly objectivist, indeed realist. In this paper, I examine critically the authors' central concepts of society and societal security, and offer an alternative understanding of identity which has implications for security. Finally, an assessment will be made of the continuity of Waever et al. with the seminal work of Buzan.
Society and Societal Security
The societal dimension which was subordinated to the state in People, States and Fear, is retained by Waever et al. as a sector of the state, but also given a new status as an object of security in its own right. There is now 'a duality of state security and societal security, the former having sovereignty as its ultimate criterion, and the latter being held together by concerns about identity'.4 This elevation of society to the level of an independent object of security is the major shift in thinking which provides the core of the argument. It is the security of society, as distinct from that of the state, and in interaction
'
i i
t
Buzan in Copenhagen
123
with it, which focuses attention throughout. What is meant by 'society' and 'societal security'? It is clear that the term 'society' is not meant to connote a process of negotiation, affirmation and reproduction, or even to embrace the 'system of interrelationships which connects together the individuals who share a common culture', in a more traditional sociological formula.' Such a definition leaves as a n open question the extent to which individuals in fact share a common culture. Waever et al. prefer a less fluid reality: 'a clustering of institutions combined with a feeling of common id en tit^'.^ It is an objectivist, Durkheimian conception, as they acknowledge. In fact, throughout the book, their concept of society loses all touch with fluidity and process, resulting in a near-positivist conception of identity. The key to society is that set of ideas and practices that identify individuals as members of a social group. Society is ahozit identity, about the self conception of communities and of individuals identifying then~selves as members of a community.In a more tellmg passage by a d~fferentco-author, we are left In no doubt that the value to be secured under the r u b r ~ cof 'soc~etalsecur~ty'IS soc~etal ident~ty: If it is societies that are the central focus of this new security problematique, then it is the issues of identity and migration that drive the underlying perceptions of threats and vulnerabilities. Societies are fundamentally
about identity8 The point is laboured: 'societal security concerns the ability of a society to persist in its essential character under changing conditions ...'' Both 'society' and 'identity' are here projected as objective realities, out there to be discovered and analyzed. If, then, 'the purpose of this book is to examine the agenda o f societal insecurity', we can take it that other components of society, and other values which that collectivity of individuals and social groups hold in esteem, are of little significance to the task in hand. The authors are clear that the intention is not to humanize the concept of security in line with 'those theorists whose search for an alternative to state security leads them to individual security . . . ' l o The reason that individuals and social groups are not the object of the study is similar to that given in Buzan (1991): it we are to avoid methodological individualism, we must treat society as a 'reality of its own', in Durkheimian fashion, 'not to be reduced to the individual level'." Who speaks for the state? The question which poses itself in relation to the state-centric approach of People, States and Fcar arises with renewed force in the new formulation of the problem: Who speaks for society? 'Whose security?' now leads back to a prior question: 'Whose identity is to be secured?' To their credit, the authors raise the same question themselves in
124
Widening Security
presenting some counter-arguments to their approach in their final chapter. Referring to the legitimacy of societal security claims, they acknowledge: Anyone can speak on behalf of society, claiming that a security problem has appeared. When should this be taken seriously?12 It depends on what they mean by 'seriously'. There are three different stages in interpreting identity claims and taking them 'seriously' with respect to security. The first two are the familiar, strictly empirical, problems relating to the extent and intensity of beliefs. The third is more a philosophical problem, which will be addressed below. It suffices for the moment to note that the authors never move beyond the first stage and seldom address even that as a serious problem. Their work begins and remains at a level of reification which excludes discussion of these questions of process. Even allowing that they work on a very wide canvas where detail is inevitably sacrificed to the overall picture, the general lack of concern with these fundamental methodological questions is disturbing. It shows in the ambiguity of their thesis. In a puzzling retrospective comment, the authors reject the charge of reification on the grounds that their main interest is not in what increases or decreases security, but in the process of defining security threats.I3 But this and similar reflections are far from clear, are contradicted by several others, and are impossible to match with the treatment of 'society' and 'identity' in the book they have actually written. They would appear to undermine the authors' entire work. If they were truly concerned with the process of social construction, they could not regard society as 'a social agent which has an independent reality'14 (as they do) and they would have to conduct the analysis at the sub-social level (which they emphatically reject). Despite the disclaimers, they do in fact view society as an 'independent variable',15 a social fact immune to process inquiry, whose values and vulnerabilities are as objective as those of the state. Their response to their own question as to when security claims (and this implies identity claims) should be taken seriously is, unhelpfully, 'In hindsight'. Only hindsight will reveal 'how much legitimacy an actor does have when trying to speak on behalf of society ... [Actors] become consequential on a political scale only when society actively backs them up . . . ' I 6 Whether in hindsight or in foresight, the problem remains the rudimentary one of our conception of society as process or as object. How do we know when society 'actively backs them up'? We cannot unravel the concept of society in action by appealing to the same problematic concept in hindsight.
The Problem of Identity
We must ask why the authors choose identity from among the countless values which people are concerned about and which can be attributed to the collectivity of society, thus coming under the umbrella of 'societal security'.
Llchiii
c.iiia\
Buzan in Copenhagen
125
It is clear that 'societal security' is the object of an assumption about its referent, not the object of inquiry. That would entail an inquiry into which of the indeterminate values susceptible to threat - including identity - may be vulnerable and require security. A society's survival is a matter of identity, they assert. N o evidence or argument is offered in support, other than the comment that 'this is the way a society talks about existential threats: if this happens, we will no longer be able to live as "us"'." This observation is made analytically true, of course, if we accept the definition of society in terms of 'individuals identifying themselves as members of a community'.'" But that is to reduce our conception of society to its most ephemeral and empirically contentious component and to ignore other elements. The authors briefly acknowledge that econon~icthreats to particular groups within a society can affect the security of society as a whole." But this passing interest in the multi-dimensionality of threats is not sustained. Neither does it reflect interest in the multi-diniensionality of values susceptible to threat. The only value which they can conceive as vulnerable in the event of economic threats is societ:il identity. If, rather than assuming that identity is the unique value vulnerable to threat, the authors had pos&l as a problkrn, 'What i s the focus of the security concerns of the people who comprise "society"?', the intuitive evidence alone would have suggested a range of values, with economic welfare prominent. This would force the level of analysis down trom society as a whole to its social-group components. That would open up not just a methodological can of worms for the a ~ ~ t h o-r sas they realize"' - but a theoretical one rllso. Their focus o n the domestic dimension of the security problem could no longer remain at the macro-level of society, and a new conceptual schema would be r e q ~ ~ i r eto d deal with the dynamics of sub-societal, societal and state interaction. This would have resulted in a quite different approach, in which the apparent fact of societal identity was exposed as an integral, political aspect of the security problem, rather than a taken-for-granted reality which defined the problem. Identity is not a fact of society; it is a process of negotiation among people and interest groups. Being English, Irish, Danish is a consequence of a political process, and it is that process, not the label synibolizing it, which constitutes the reality that needs explication. We cannot decide the status, or even the relevance, of identity LI priori. Where it is relevant, it is not necessarily the cause o f a security problem, as the authors assume. It is just as likely to be its effect. Which it is can only be revealed by deconstructing the process o f identity formation at the sub-societal level, but the authors reject this approach as leading inevitably to individualism. The security prohlem in the Russian Federation, former Yugoslavia, or Northern Ireland is not there just because people have separate identities; it may well be that they have separate identities because of the security prohlem. Contrary to the authors' claim," identity is not to be taken as an independent variable, tout court; it is often the outcome of a labelling process which reflects a conflict of interests at the political level.
126
Widening Security
We get some sense of the applicability of the authors' theoretical approach to identity and security in the case-studies which form the bulk of Waever et al. and which comment interestingly on European integration, migration, the Middle East, the former Soviet Union and other areas of conflict. A brief examination of one of these studies, which is representative of the approach of all, is i n s t r ~ c t i v e . ~ ~ Most of the story is a straightforward, albeit excellent, piece of traditional political science, giving customary attention to state actors and employing a familiar shorthand of ethnic labels for political leadership, which we have no difficulty in translating. 'Kosovo Albanians repeated their 1968 demand for a republic', 'the Serbs insisted on living together', 'the Croats finally recovered their own state', and so on.23This is vintage security analysis without pretension to broader concepts or sociological deconstruction. The question does not arise, since throughout most of the chapter the author pays little attention to the new focus on identity to which his contribution has been recruited; indeed he scarcely mentions the word. The concept of identity makes its appearance in a few pages of conclusion where Hakan Wiberg reflects on his own analysis in the light of the thee - lack of evidence, he oretical agenda of the pLincipa1 authors. ~ e s ~ i tthe asserts that the conflict is really about the twin concepts of identity and the state24- defined as objects of security by the principal authors, even though his analysis has touched, inter alia, on economic deprivation among urban workers, and has nowhere shown how collective identity was constructed and articulated. Among several unsupported claims to illustrate this point, he states that the secessions of Croatia and Bosnia 'would be seen by Serbs there as identity threats ... as deadly threats to the security of the Serb communities ...'25 And again: 'The identity problem can be succinctly described by recalling that Macedonia is surrounded by Bulgaria ...'26 Would that it were so easy! This is one example of the manner in which most of the case-studies are approached in a traditional way and then overlaid with the identity thesis. There is nothing in this case-study to support the identity thesis of the principal authors, unless it be the reification of identity itself. The opportunity is missed to explore the extent to which Yugoslavia, far from exemplifying the autonomy of identity as a social fact, is perhaps an outstanding example of the manipulation of identity by political Clites in an area remarkable for its historical forgetfulness.
Identity and Moral judgment The human and moral connotations of identity give it a popular appeal. Its apparent subjectivity makes everyone an expert. Its fundamental character as an inalienable human property blocks all criticism and makes its secure possession a matter of elementary justice. We are who we think we are; no one else can judge us. Though Waever et al. would reject this popular notion as the basis for their understanding of collective identity, their thesis, paradoxically, commits them
,
-i i
Buzan in Copenhagen
127
to the same relativism. In effect they have an objectivist theory with relativist consequences. In their view, identity is a property of society, not to be confused with human beings. It 'emerges' (a frequently used term) from the peculiar interactions of people and institutions in each society, fixed and incorrigible like the computer output of a complex arithmetic. Identity describes the society, and society is constituted by identity. Since its computation or construction does not crucially depcnd o n human decisions, i t rnakcs n o sense to speak
of correcting it. Societal identity just is. We are stuck with it. There is no way we can replace it, except by adopting multiple identities, each of which is, in principle, as inviolable as the next." It follows that we are stuck with every other comn~unity'saccount of its identity also, and have no intellectual means of passing judgment on these accounts. We may not like who they are, but if they think that way, so be it. This aspect of the identity thesis is disturbing because of its implications for security policy in general and for particular security issues in Europe. It lies at the other extreme to racism. The one view claims to judge races and to allocate each a position in an ontological hierarchy. The other refuses all judgment and allocates to each society an objective identity proper to it. Fortunately, there is more to be said about it than just to disapprove.
Collective identity and security share a similar dependence on subjective awareness and the need for objective verification. Collective identity is first a matter of perception, just as security and insecurity also begin in our perception of vulnerabilities and threats. A critical difference appears, however, when we consider that the perception and fear of threats to security can, in principle, be checked by observing and evaluating the facts external to the subject. To privilege perception would, in effect, turn security policy over to demagogues and paranoiacs. It is plainly critical for security, both that we take perceptions seriously and that we have some criteria for correcting them, for assessing their objectivity. Paranoia, or complacency, can be challenged by evidence. There seems to be no parallel in regard to identity. There is no court of appeal that can perform the same scholarly task for our sense of identity, personal or collective. The authors acknowledge part of the problenl in their concluding reflection^.^^ They see that not everyone who claims to articulate the identity of a society must thereby be accepted as an authority. In other words, they recognize that there may be an empirical problem. Their choice of examples to illustrate this - fascism, racism, xenophobia hints a t awareness of a deeper, normative problem," but the discussion is not extended to explore it. When a claim is made about collective identity, their solution is to wait until hindsight reveals the truth:'" But what kind of 'truth' could it reveal? What if Le Pen manages to manufacture a majority consent, verified by polls or other measurement techniques, around the idea of racism and xenophobia, or if the IRA creates a 'collective identity1 which incorporates intense anti-British sentiment into a
128
Widening Security
symbol of Irish solidarity? Such hypothetical developments are not wildly improbable, and would immediately present a serious security problem in France and Ireland. From the traditional security point of view, the state would intervene and speak objective security for the society. This means that the racist perception of security would be countered by a decision of the state and a policy strategy to implement it. Prior to settling the security problem in this manner, however, there is the more basic epistemological task of 'correcting' the identity claims which gave rise to it, the task of speaking 'objective' identity for the society. Who will judge what counts as the parameters of collective identity, and by what criteria must be judgment be made? Not to arbitrate is to abandon the problem and leave its resolution to the state or to the anarchic struggle of the most powerful interests. Waever et al. offer no basis or criteria for arbitration between competing identity claims. Faced with the fact that identity disputes are a special case, not susceptible to objective resolution by empirical observation, they conclude, in effect, that such disputes are beyond all resolution. Their case-studies, their style and their apparent intention stand solidly within a theoretical tradition not noted for its affinity with relativism. Ironically, their solution to this problem of identity disputes - or rather their failure to offer any solution to it leaves them, and us, in something of a postmodernist maze. The problem of resolving disputes about identity is, at root, a philosophical one in which moral judgment inescapably intrudes. Parallel with Freedom An analogy between identity and individual freedom will serve to illustrate the point. The test of freedom cannot be reduced to a test of the absence of obstacles to the fulfilment of desires. By that criterion, a happy slave might be judged free and a frustrated professor enslaved. Neither can it be reduced to perception. The slave may perceive himself more free than the professor, but it is obvious that the concept of personal freedom loses the meaning we invest in it, if we limit it to the perception of either. We need a test to judge the needs which are relevant to personal freedom if we are to rescue the concept from being merely an expression of taste. The test of freedom must begin from a positive judgment about human needs and rights, not from a negative assessment of obstacles. The philo~ ' fact that sophical starting-point must be some ideal of human n a t ~ r e . The we have no authoritative, epistemological basis for constructing such an ideal is no argument against its necessity. We can, and we routinely do, make judgments about personal freedom. But they are not judgments which can be validated by empirical observation alone. If we want a test allowing us to transcend individual perception and to judge personal freedom in the light of the human competence to which the concept refers, then we are in the business of making a moral decision. We stand some chance of making a more reasoned judgment if we address its
normative character explicitly than if we hide it from view behind a veil of false respect for the authenticity of the person. The implication for personal and collective identity should be clear. The bas~sof judgment about person'11 rdentlty overlap closely w ~ t hthe judgment about personal freedom. The answer to the questlon 'Who am I?' clearly does not rest simply on empmcal ev~dence,though the fxtual, historical data collected in o u r passport, our diary and our past
experiences
are very relevant.
Ne~thercan ~tbe decided exclus~velyIn terms of sublect~veperception. We routmely 'correct' the ~ d e n t ~ cla~ms ty not only of others but of ourselves. It rests also on the contrast and balance between a normative view of human nature and the facts of personal biography. It entails an element of decision as well as self-observation. Similarly, the collective question, 'Who are we?' cannot be answered simply by reference to opinion polls, ancient myths, folk music or other measures of collective history. It too entails a decision based on a theory which relates some of the countless biographical facts of our collective past and present to a view of who we want to be. 'We are who we choose to be' overstates our freedom in the matter but makes the point forcefully that collective identity is a choice made by people, not a property of society which transcends their agency. We choose from an array of possible identities, so to speak. (Clearly, this is to analyze identity formation in the abstract. No society exists where we could observe this process from the starting-point o f a tabula rasa without an already-existing identity and the consequent pressures of socialization to adopt and to affirm it.) The question is how these diverse individual choices come to cohere in a clear or vague collective image, and how disputes about identity, with security implications, are settled. If we reify the notion of societal identity, in the manner of Waever et al., the answer is that it just happens. If sub-societal groups see things differently from the majority, Waever et al. offer no criteria by which to judge and resolve the dispute. For them, society has an identity by definition. People d o not choose it; they recognize it, they belovzg to it." This is sociologically untenable. It is blind to the moral choices which go into the melting-pot of the process of identity forn~ation.To answer the question raised above: individual and group choices come to cohere in a societal identity - when they d o - only by virtue of higher-level moral decisions about what counts and what does not in the image we want to have of ourselves. Whether it is the state, the Supreme Court or simply the most powerful hidden interests which settle the matter is less important than that we recognize the inescapable ethical judgment in the process of choosing the components of a collective identity. These agencies are political instruments, made necessary by the fact that social order requires a referee with the mandate to speak for society. In Buzan ( 1 991), as noted, the state was not only given the political mandate in relation to security, it was also ontologically identified with the needs and rights of the people whose security was at stake. The moral judgment involved in Buzan's account is hidden within the
130
Widening Security
function of the state. In the new focus on societal identity, there is no referee and there are no criteria for legitimizing decisions about identity. In effect, the construction of identity and the resolution of identity disputes are left to emerge, incorrigible and beyond assessment, from the mysterious workings of society. The element of normative judgment in the negotiations which constitute the permanent process of identity formation is lost. Collective identity is not 'out there', waiting to be discovered. What is 'out there' is identity discourse on the part of political leaders, intellectuals and countless others, who engage in the process of constructing, negotiating and affirming a response to the demand - at times urgent, mostly absent - for a collective image. Even in times of crisis, this is never more than a provisional and fluid image of ourselves as we want to be, limited by the facts of history. The relevance of this argument to the concept of societal security should be clear.
Conclusion Three general points which summarize the main threads of the foregoing discussion will be made, in addition to a brief comment on the implications of the identity thesis for Buzan's analysis of security in People, States and Fear. The validity of the identity thesis hinges on the objectivism of the authors' concepts of 'society' and 'identity'. Society is conceived as a social fact, with the same objectivity and ontological status as the state. Notwithstanding several passing comments to the contrary, the authors' definition and analysis of society is essentially Durkheimian. This perspective determines the methodology and skews the inquiry and level of analysis away from that required for a process which is constituted by social practices. Such a focus would view 'society' and 'state' as an 'objectification' of social interaction, in Berger and Luckmann's sense of the term;33 they are a particular class of dependent, not independent, variable. Secondly, the misunderstanding of 'identity' follows from the definition of society. Who we are is not a matter of fact imposed on individuals who 'belong' to the 'society' of Waever et al. Their idea of collective identity as a social fact projects the image of a collective self to be discovered: we are who we are. The evidence and philosophical argument point more convincingly to process and negotiation: we are who we want to be, subject to the constraints of history. Such constraints set limits to the boundaries of possibility; the case for an ecumenical harmony of identity between Danes and Swedes is clearly more plausible than that between Danes and Zulus. Within such constraints, disagreements about identity can and do flourish and, where they give rise to conflict and have security implications, can be settled, but only by moral decision informed by factual observation, not by observation alone. A third and related point is that this decision in regard to identity and its security is a normative one. We cannot assume, by definition, that 'society'
i
I
i
Buzan in Copenhagen
131
embodies a single value or interest - identity - which stands alongside the values of the state as the only object of vulnerability and threat which is relevant to security analysis. The problem is, rather, to investigate which interests are at stake and who are the interested parties pursuing them. The political concepts of interests and legitimacy suggest themselves as being more fruitful analytical tools for understanding and interpreting recent or past events in Europe than identity and societal security. The concept of
interests captures the political reality prior to the emergence into the security arena of any sense of common identity. From the macro-side of the state, its legitimacy to speak identity and security on behalf of all takes priority over 'socio-political cohesion', in Buzan's understanding of the term, as the value that determines the strength of the state, and thus the state's capacity to integrate with other strong states in a mature anarchy." In addition to their immediacy and common-sense fit with the empirical evidence, 'interests' have the merit of exposing the normative concerns of the actors whose values are at issue, while 'legitimacy' directs attention to the viability of the decision of the state or other agency which must judge the claims of rival interests. Media interpretation of recent events in Europe has highlighted the rise of nationalism and national identity, because these are the terms most frequently employed by the principal political actors. It is media myth-making to interpret the evidence of the first Danish referendum on Maastricht as 'Denmark says N o to the State', or in the Macedonia dispute to assert that 'Greeks defend ancient rights'. The reification of identity makes intellectuals the unwitting accomplices of these journalistic conventions. No one can deny that some sense of common identity is a product of living together in common institutions, or that national identity can become a security problem. The problem is to interpret identity claims, rather than assume their validity and coherence. It behoves security theorists to take care not to make the task of particular interest groups - and journalists - easier by postulating identity as a social reality to which people subscribe. Waever et 31.3 book will make claims for the protection of national identity all the easier to substantiate, without investigation of the interests underlying them or of the moral choices involved in any decision to authenticate them. It may in time be used by EU states as theoretical support for the renationalization of common policies, for tougher policies on migration and for a state-biased interpretation of subsidiarity. In such an eventuality, Waever et al. may be viewed by IR theorists and historians as a significant straw in a familiar wind of theoretical change, propelled, yet again, by events which serve policy interests. Finally, Waever et al. are silent o n how they see the continuity between Buzan (1991) and the identity thesis. There is only passing reference to the two central ideas on which Buzan's broader concept of security pivots: security complex and the concept of strondweak states." Rejecting the realist idea that domestic affairs had no relevance to international security, Buzan (1991) dipped into domestic waters with his concept of sociopolitical cohesion, but he ventured no further. Cohesion had to be
132
Widening Security
seen as an instrument and property of the state, if his general model of international security within anarchy - which entailed state primacy - was to be preserved. Human beings were ultimately the reason for all security, but they had no place in the analysis which explained its dynamics; their agency was blocked by the theoretical decision to explain security only at the levels of the state and the international system. Now Waever et al., and Buzan as joint author, emphatically reject the primacy of the state and appear to have gone much further in the domestic direction. After all, what could be more human and domestic than to counterpose society and its identity to the state as an object of security in its own right? However, it is clear that 'societal identity' is not the identity of a collectivity of human beings. 'Societal security is not used in this book as a "more human" concept of security ...'36 Society is a technical term, defined not as a human process but as a reality transcending the individuals who belong to it. Where does the new focus on societal security leave Buzan's concept of the 'strong state'? As Steve Smith suggests, one can discern a prescriptive dimension in Buzan's ' could argue that understanding of strong states in a mature a n a r ~ h y . ~One the substantive policy implications of his book are not those under the heading 'Implications for P o l i ~ y ' but , ~ ~are contained in the prescriptive treatment of his concepts of strong state and security complex. A mature anarchy is, after all, a position on his continuum of regional security configurations, related to the idea of a 'security community'. If the move from security complex to security community is desirable, as it clearly is, so too is the move from weak to strong states in the international arena. Becoming a strong state is a condition of participating in a security community. In Buzan (1991),the primacy of the state is the pivot on which the domestic dimension of the strong state and the international dimension of regional security turn. The seminal character of People, States and Fear lay in the break with the realism of traditional security studies marked by these two ideas. The movement on a spectrum of weak to strong states directed attention to the domestic level, and the corresponding movement from immature to mature anarchy (or, in regional terms, from security complex to security community) introduced the possibility and need for change at the international level. Together, they represented a more complex and adequate picture of reality and of the possibilities of change than the realists could envisage. Theoretically, this advance depended on maintaining the realist doctrine on state primacy. The agency of change in the domestic as in the international sphere could not be attributed to sub-state or supra-state actors. If sub-state actors were credited with the capacity to shift the state, then something close to anarchy would rule at the domestic level. By definition, there could be no stability in the socio-political cohesion which Buzan understood as a statemanaged domestic order and which was a defining characteristic of his 'strong state'. On the other hand, if the international system were allowed to determine shifts in the security position of the state, Buzan would have to reformulate his entire theoretical framework. His version of realism sees anarchy as a constant, with modifications in regional configurations brought
Zli\~vecnc \
Buzan in C o p e n h a g e n
133
about by the actions of states. It is on the security of the state that the security of people and of the international system depends. While an overall environment of anarchy determines the range of state actions, any change in the character of the state from weak to strong can only be brought about by the state itself. The problem, then, is to understand how the identity thesis is compatible with Buzan's security thcory. The concept of a strong state rested on the subordination of society to the state. Now, in Waever et al. the state is no longer the uniquely privileged actor. Domestic resistance to the state cannot be viewed as some kind of pathology. The vulnerability of identity to external threats is now viewed as the vulnerability no longer of the state, but of an autonomous actor and potential rival within its houndaries: society. The management o f societal identity, which Buzan saw as the business of the state in building the social cohesion essential to becoming strong and fit for membership of a security community within a mature anarchy - this task is now in the hands of society itself. A strong sense of societal identity could very likely, and not just pathologically, coincide with resistance to the state. How changes in identity are effected, or disputes about identity arc resolved, is not addressed by Waever et al. Who would judge? Buzan's implicit answer was 'the state', and this allowed for the possibility of change from weak to strong state which was critical to his thesis. If society is now an independent variable, no longer subordinate to the state, then it appears that the Copenhagen school has undermined Buzan's original thesis. Ruzan himself has collaborated in an analysis of security which purports to develop his analysis of 1983-91 but, in fact, subverts it, without enhancing our understanding of the problems of security.
Acknowledgements T h e author wishes t o thank I'aul 'Iiiylor a n d anonymous refel-ees tor comnients o n a n earlier draft, w h ~ c halso benefited from exposure t o students of the hll'liil ( T C D ) programme in the Centre for I'race S t u d ~ r s .
Notes 1. ldrntrty, Migrtrtion. To , i v o ~ dc o n f u s ~ o nd u e t o c o m m o n n i ~ t h o r s h ~ pthe , authors of this hook will be referred t o in the text as Waever et al. Similarl>, Buran (1991) will distinguish Tlu~an'sauthorship of the second edition o f I'eop/e, States an<{Ce~w. 2. Ken Booth, 'Security , ~ n dEmancipation', Revieic~of Int~~rniztional Studies, 17 ( 199 1 ), pp. 313-26. 3. h i d . ; Steve Smith, 'hIature Anarchy, Strong States a n d Security', In Arms Cotztrol, 12 (1991), pp. 325-39; Martin Shaw, 'There is n o such Thing as Soc~ety:Beyond Individualism a n d Statism in Intern.~tionalSecurity Studies', in Reuielc~of Intcrri~rtiotzalStudies, 19 ( 1993), pp. 1.59-75. 4. Waever er al., ldent~t):Migration, p. 25. 5. Anthony G ~ d d e n s Socrology , ( C x n h r ~ d g e ,19891, p. 32. 6 . Waever et nl., Itlentrty, M~grutron,p. 2 I.
134
Widening Security
7. Ibid., p. 24 (emphasis added). 8. Ibid., p. 6 (emphasis added). 9. Ibid., p. 23. 10. Ibid., p. 24. 11. Ibid., p. 18; Buzan, People, States and Fear, pp. 35ff. 12. Waever et al., Identity, Migratcon, p. 187. 13. Ibid., p. 189. 14. Ibid., p. 26. 15. Ibid., p. 185. 16. Ibid., p. 188. 17. Ibid., p. 26. 18. Ibid., p. 24. 19. Ibid., p. 20. 20. Ibid., p. 20. 21. Ibid., p. 185. 22. Hakan Wiberg, 'Societal Security and the Explosion of Yugoslavia', in Waever et al., Identity, Migration, ch. 5, pp. 93-109. 23. Ibid., pp. 99, 101, 98. 24. Ibid., p. 105. 25. Ibid., p. 106. 26. Ibid., p. 108. 27. Though the authors raise the question, 'When (if ever) can national identity be replaced by another identity?' (p. 28), the only discussion of this possibility concerns the overlaying of a European on a national identity. Ibid., ch. 4; see also Buzan et al., European Security Order, pp. 36ff. 28. Waever et al., Identity, Migration, pp. 187-9. 29. Ibid. 30. Ibid., p. 188. 31. See the discussion of personal freedom, from which this analogy is drawn, in Martin Hollis, Invitation t o Philosophy (Oxford, 1989), pp. 138ff. 32. Waever et al., Identity, Migration, p. 21. 33. Peter Berger and Thomas Luckmann, Social Construction of Reality, Pt 2 (London, 1969), pp. 6Sff. 34. Buzan, People, States and Fear, ch. 2. 35. While security-complex analysis is adopted in Waever et al., Identity, Migration, ch. 7 on 'Europe and the Middle East', it is not integrated with the identity concerns of the book. As with Wiberg's discussion of Yugoslavia, ch. 7 imposes an 'identity' relevance on an essentially traditional security discussion. 36. Waever et al., Identity, Migration, p. 24. 37. Smith, 'Mature Anarchy'. 38. Buzan, People, States and Fear, pp. 374ff.
Broadening the Agenda of Security Studies: Politics and Methods' Keith Krause and Michael C. Williams
D
ebates over the nature and meaning of "security" and the future of security studies have become a staple of the field's post-Cold War agenda (Buzan, 199 1 : 14; Crawford, 1991; Haftendorn, 1991: 15; Kolodziej, 1992a, 1992b; Baldwin, 1995). These debates have three roots: a discontent among some scholars with the neorealist foundations that have characterized the field, a need to respond to the challenges posed by the emergence of a post-Cold War security order, and a continuing desire t o make the discipline relevant to contemporary concerns. But despite much discussion, scholars have not arrived at a consensus o n what a more broadly constructed conception of security should look like. The diverse contributions to the debates on "new thinking on security" can be classified along several axes. One - associated inter alia with such ( 1989), authors as Richard Ullman (19831, Jessica T ~ ~ c h m aMathews n Theodore Moran (199019 I ) , Brad Roberts ( 1 990), Myron Weiner (1992/93), and Beverly Crawford ( 1 994) - attempts to hroilcicn the neorealist conception of security to include a wider range of potential threats, ranging from economic and environn~entalissues to human rights and migration. This challenge has been accompanied by discussions intended to deepen the agenda of security studies by moving either down to the level of individual or human security or up to the level o f international or global security, with regional and societal security as possible intermediate points (Rubenstein, 1988; Buzan, 1991; Grant, 1992; Tickner, 1992; Waever et ul., 1993). Others have remained within a state-centric approach but have deployed diverse terms (common, cooperative, collective, comprehensive) as modifiers to "security" to advocate different multilateral forms of interstate security cooperation that could ameliorate, if not transcend, the security dilemma (Palme Commission, 1982; Kupchan and Kupchan, 199 1; Carter, Perry, and Steinbruner, 1992; Dewitt, 1994).' This essay review concentrates on the efforts to broaden and deepen our conceptions of security. Source: Mcrd~orzIiztrr~tat~or~iz/ Stzlcfics Rel~icu:40(2) ( 1996): 229-54
136
Widening Security
What unites these efforts is a conviction that the neorealist focus on safeguarding the "core values" of a state from military threats emanating from outside its borders is no longer adequate (if it ever was) as a means of understanding what (or who) is to be secured, from what threats, and by what means. The theoretical targets being debated are the conceptualizations of security (state security) and threat (military force) and the assumption of anarchy (the security dilemma) that have characterized neorealist scholarship in security studies (Walt, 1991: 212; Posen, 1993a: 82; Schultz, Godson, and Greenwood, 1993: 2; Mearsheimer, 1995).3 By the neorealist account, as Stephen Walt (1991: 212) defines it, security studies is "the study of the threat, use, and control o f military force ... [that is] the conditions that make the use of force more likely, the ways that the use of force affects individuals, states and societies, and the specific policies that states adopt in order to prepare for, prevent, or engage in war" (emphasis in the original). Not surprisingly, attempts to broaden and deepen the neorealist agenda of security studies have been met by a spirited defense. Calls to expand the field, although they may appear compelling and even seek laudable ends, are viewed from the neorealist perspective as taking security studies away from its traditional focus and methods and making the field intellectually incoherent and practically irrelevant (Dorff, 1994; Mearsheimer, 1994195; Gray, 1995). Even though it is considered responsible scholarship to permit additions and amendments to the core of security studies, to throw away its foundation is deemed intellectually unsupportable. According to neorealists (Mearsheimer 1995: 92), alternative approaches have provided neither a clear explanatory framework for analyzing security nor demonstrated their value in concrete research. Moreover, some neorealists (Walt, 1991: 213) have argued that the adoption of alternative conceptions is not only analytically mistaken but politically irresponsible. Rather than presenting another polemical overview of the contrasting positions in these debates (see Mearsheimer, 1994195, 1995; Keohane and Martin, 1995; Kupchan and Kupchan, 1995; Wendt, 1995), this essay review takes seriously Walt's (198710: 146) claim that "critical evaluation is ... the key to scientific progress." The review proceeds in three stages. It starts by evaluating, on their own terms, neorealist claims regarding the scope and nature of contemporary security problems. This initial section discusses the way in which the usually implicit foundational claims or assumptions of neorealism underlie its vision of security and security studies. It suggests how these claims shape neorealism's stance toward debates over whether (and how) the concept of security should be "broadened" to incorporate nonstate and nonmilitary dimensions, concluding that these commitments have tended to close debate prematurely and thus constrain our understanding of current issues and dilemmas. The section takes the debates surrounding "environmental security" as an exemplar to highlight the exclusionary and inclusionary strategies at work (Lapid and Kratochwil, 1996: 109). The second section examines whether neorealist security studies lives up to the promises of its foundational claims, and how controversies within
h
t
I
I
I
.
Broadening the Agenda of Security Studies
137
recent research illuminate critical tensions in its methodological claims. It argues that, judged by the standards of rationalist science that its own authors use to assess other work, current research within the neorealist paradigm fails to measure up. The section focuses on debates concerning alliance formation, offenseldefense theory, and the attempts to incorporate nationalism and national identity into security studies. The goal is to show that a recognition of the methodological and epistemological issues at stake creates openings for alternative research strategies and formulations that cannot be foreclosed by appeals to standards of "science" that neorealist scholarship itself is unable to meet. The third section scrutinizes some of the alternative formulations to security studies by examining recent scholarship that focuses on how security is "constructed" and "practiced." The discussion parallels that in the first section, unwrapping the core claims and assumptions of alternative approaches to determine what is involved in accepting a different research agenda in studying security studies. The section shows that the issues raised in this review pose significant challenges to these alternative approaches as well. The co~iclusionasks whether (and in what way) different approaches to security s t ~ ~ d i eare s incommensurable or reconcilable in some fashion. Although this review does not "compare and contrast" different approaches (because the question of whether they are dealing with the same " s ~ ~ b j e c t " is a key issue ot dispute), the intent is to spark a dialogue among scholars about the foundations of security studies, the different directions future research might take, and the implications of these issues for political practice.
The Disciplinary Authority of the Neorealist Conception of Security Stephen Walt's (1991) "Renaissance of Security Studies" represents a typical and influential formulation of the neorealist conception of security that constitutes the core of much of the field. For him, the field has gradually evolved into an objective, scientific discipline in which the "laws" governing the realm of security are discovered or, at least, the correct method for their discovery has been identified. Walt's (1991: 222) view that "security studies seeks ctinzulatiue krzoudedgc about the role of military force" requiring scholar5 to "follow the standard canons of scientific research" is echoed by others, such as Helga Haftendorn (1991: 12), who stress the need "to construct an ernpirically testable paradigm" that involves a "set of observational hypotheses," a "hard core of irrefutable assumptions," and a "set of scope conditions." For Walt (1991: 222), the "increased sophistication of the security studies field and its growing prominence within the scholarly community is due in large part to the endorsement of these principles by most members of the field" (see also Walt, 1987b; Nye and 1,ynn-Jones, 1988). This interpretation of the evolution of strategic studies sets up the assumptions and methods of neorealist security studies as the standards against which alternative claims are judged. Such is hardly a new argumentative tactic in the
138
Widening Security
history of strategic thought. The search for the "laws of war" goes back at least to the Enlightenment (Gat, 1989: 29, 25-53, 1992: 1-45) and, as John Shy (1986: 184-185) argues, this vision of truth and method "has become, during almost two centuries, so deeply embedded in Western consciousness that many adherents refuse to accept it as a 'mode' of thinking at all." Viewed historically "contemporary strategists echo Jomini (in his defense against Clausewitz) by insisting that [their] critics fail to meet the urgent demand of strategy for clarity, rigor, and utility" (Shy, 1986: 84). The claim to scientific knowledge underlying neorealist security studies is supported by a series of foundational claims that are presented as "facts" about the world. The most important of these claims concerns the centrality of the state as the subject of security. Paradoxically, this vision emerges neither from a theory of the state nor of the international "structure" but from an implicit theory of the "subject" seen in terms of an individual person. The subject is presented as an autonomous, rational actor confronted by an environment filled with similar actors. These others are a source of insecurity - hence, the classic security dilemma and the popularity of "state of nature" analogies supposedly drawn from Hobbes or Rousseau (Waltz, 1959; Williams, 1989, 1996). Whether this situation arises from the nature of the actors or from the context in which they find themselves (the traditional debate between first-, second-, and third-image explanations) is less important here than the recognition of the common foundation from which both possibilities spring: an assumption of methodological individualism in which all social action (cooperation and conflict) is strictly the product of the interaction of wholly self-contained, instrumentally rational subjects (Ordeshook, 1986: 1; Waltz, 1986b: 90-91, 115; Luke, 1987; Grieco, 1988: 487-488; Wendt, 1992: 392). From this starting point, there can be no security in the absence of authority. The state, accordingly, becomes the primary locus of security, authority, and obligation. Contractual obligations between citizens represent the limit (underwritten by the authority of the state) of effective coordination for collective action (or of "community"). The security of "citizens" is identified with (and guaranteed by) that of the state; and, by definition, those who stand outside it represent potential or actual threats. Relations between states are thereby rendered purely "strategic" (or contractual) in the instrumental sense of the word. This foundation provides the basis for claims about international anarchy. A particular state, as a "rational subject," looks to its own interests and security (and those of its constituents) first and foremost. Despite the fact that in the long term its interests might be better served through cooperation, a state cannot rationally assume that other states will act in a cooperative fashion. Therefore, it acts solely in its own interest, and all others do the same. The problem is not the lack of central agency to enforce promises but the absence of a central authority to prevent the use of violence to destroy or enslave (Grieco, 1988: 497-498; Milner, 1993; Mearsheimer, 1994195: 9-13).
I
11
ii 1 1
Broadening the Agenda of Security Studies
139
The declaration that the state is the subject of security and anarchy the eternal condition of international relations is, thus, premised not on objective facts or structural determinants but is grounded in a deeper set of claims about the nature of political subjects and their relationship to sovereignty. The "fact" of anarchy is based on an a priori claim about autonomous individual human subjects and the kind of contractarian political order that these subjects necessarily require. At the international level tl,e essence of this conceptualization is not simply a world of self-regarding states operating under the "security dilemma," but the assumption that there is a particular form of individual rationality in state action as both the source and outcome of that anarchy. The above are, however, more than simplifying theoretical assun~ptionsadopted for analytical convenience as some have argued (Achen and Snidal, 1989: 150; Powell, 1993: 117). They are inextricably tied to a particular set of episten~ologicalclaims and related methods (Walker forthcoming). The neorealist conception of security studies claims to be founded on an objective representation of reality. This claim to know objectively means that the discipline must treat the phenomena under consideration as given, unproblematic o&cts. This instrumental-rational conception of human and state action has consistently created difficulties in security studies (Steinbruner, 1974; Jervis et al., 1985; Levy, 1989: 272-289; Sagan, 1994) and in international relations more generally (Hollis and Smith, 1991). In neorealism, the concept of rational self-interest provides the bridge that allows one to treat state actions as the externally observable "objective phenomena" that are required by a rationalist epistemology. The reduction of states to instrumentally rational actors, embedded in a contractual theory of sovereignty and tied up within a specific claim about scientific knowledge and its progress, is a powerful theoretical move. Grounded in a series of assumptions deeply ingrained in the culture from which it emerges, neorealist security studies can confidently declare what is and is not a "security" issue, or what threats are, and to whom they refer. The reader should note, however, that these claims to objectivity and science rely on a prior definition of the political object and the conditions of its (in)security. These foundations are at the heart of the neorealist appraisal and rejection of attempts to bring "new issues" onto the security agenda. The debates surrounding efforts to link "environment" and "security" provide an excellent illustration of this process.
Perhaps the most w~despreadcall to redefme security has emerged from the claim that env~ronmentaldegradation poses a threat to the ecosystem or to human well-being that transcends part~cularstates and conceptions of natlonal security. The severe consequences of continued env~ronmentaldegradat~on are mewed as more urgent than external threats that could lead to organ~zed
140
Widening Security
violence. Moreover, national interest and sovereignty are considered less important than the well-being of the individual or the species. Such a recognition has led to a demand for "a redefinition of what constitutes national security" because "the assumptions and institutions that have governed international relations in the postwar era are a poor fit with these new realities" (Tuchman Mathews, 1989: 162). Scholars making these arguments accept the neorealist claim that "security" is reducible to an objective referent and set of threats. They seek to reorient security studies (and policies), however, by calling on the authority of the natural sciences to demonstrate that environmental change "in fact" represents a threat to human well-being, and by asserting that what is really threatened is not an abstraction like "the state" but the material wellbeing of individuals (Myers, 1993: 31; see also Dabelko and Dabelko, 1995). According to these researchers, the constraints imposed by traditional categories of thought have limited our grasp of this reality; our conceptions of security and our policies and institutions for providing security need to change to meet the new challenges (Ullman, 1983; Mische, 1989). But these calls to redefine security meet resistance because they do not conform to the a priori political and methodological foundations underlying the neorealist view of security. Those interested in broadening the agenda of security studies fail to see that the field is not premised on the straightforward observation of objective phenomena that threaten human life, and that rejection of the individual as the locus of security is not an oversight. The concept of national security does not simply represent a reaction to objective conditions; it is built on a series of political and epistemological choices that define what is considered security. To appeal to the reality of environmental threats, or to the security of individuals, runs up against the sovereignist resolutions that form the basis of neorealist thinking. Illustrations of this resistance are found in Marc Levy's and Robert Dorff's exclusionary responses to the environment and security literature. Levy (1995a, 199Sb) concedes the existence of potential environmental hazards to human well-being, but he argues that their place as security issues cannot be sustained. The attempt to make the environment a security issue is marked more by a desire to heighten the political profile of environmental concerns by placing them within the rhetoric of security than by any sustainable status as security issues. Likewise, Dorff (1994: 27) asserts that although a broader definition of security highlights significant contemporary problems, these do not constitute security issues because "'problems' is not a concept ... [it] provides us with no ordering of reality that we can use to create a common understanding of what it is that we are talking about ... [nor a] range of possible policy approaches to address those problems." These arguments rely on two analytic moves that have significant consequences. First, by describing the broadening of the concept of security as a political rather than an analytical act, neorealists implicitly position their view as an apolitical stance that is not equally driven by (or established upon) a set of value commitments. Second, by thus positioning themselves, neorealists implicitly establish their view as the yardstick against which
1
I
i
I
7,
Broadening the Agenda of Security Studies
14 1
alternative conceptions of security are to be judged: how well d o these alternative views fit within and contribute to the purportedly objective neorealist categories, in particular the concern with violent interstate conflict? Not surprisingly, as a result, environmental threats are not deemed security issues. Although Levy (199Sa: 40-41) admits that it is possible to conceive of "global security," he proceeds to define security as "national security" a situation in which threats t o a "nation's most important values" come
from the actions of "foreigners." The political assumptions underlying neorealist security studies, however, do not represent a neutral point against which alternative conceptions can be judged. Levy's vision of security brings with it the sovereignist conception of politics (and epistemology) outlined above. Moreover, it effectively makes security synonymous with "citizenship": security comes from being a citizen, "threats" are directed toward people qua citizens (that is, toward their states), and the theory and practice of "security" strive to mitigate these threats through concerted action by the citizens' representatives (Gray, 1992). Levy's (199Sb: 44) subsequent claim that the "existential visions" of environmental security have little chance of influencing the "conventional security agenda" simply restates this foregone conclusion. The debate over whether "security" should be broadened, therefore, takes on a circular character. Each side appeals to "security" as something with an objective referent and source without acknowledging that its position rests on prior commitments that are rarely discussed. Disagreement is only explained as a result of empirical ignorance or the intervention of subjective value commitments that skew understanding. As a result, each side can endlessly accuse the other of politically motivated myopia, and charges of ecological opportunism confront charges of statist conservatism in an unresolvable cycle. There is an important alternative position within this debate that is more inclusionary. Even though it distances itself from a broad conception of "security as individual well-being" and remains within the neorealist framework of interstate security, this position still allows for a new conception of threat. Researchers involved in projects on Environmental Change and Acute Conflict and Environment, I'opulation, and Security have attempted to assess the role of environmental scarcities in the outbreak of violent conflict (Homer-Dixon, 199 1 , 1994). Gleick ( 1 993) and I.owi (1993), for example, have placed access to, and control over, water within an expanded conception of "geopolitical" conflict. Likewise, studies of the communal conflict in Rwanda (Percival and Homer-Dixon, 1995a), the relationship between urban growth or migration and violence (Gizewski and Homer-Dixon, 1995; Howard and Homer-Dixon, 1995), and the post-apartheid transition in South Africa (Percival and Homer-Dixon, 199Sb) have sought to determine the extent to which scarcity and varying forms of violent conflict are linked. These studies move closer to the traditional concerns of security studies, while reorienting analysis away from relations among the military forces of states (and classical security dilemmas) to the underlying dynamics that can serve as the sources of interstate conflict. Even though some (Levy, 1995b: 46)
142
Widening Security
have suggested that sophisticated analysts have been aware of these issues all along, the innovations support Baldwin's (1995: 119, 125; see also Chipman, 1992) argument for a broader agenda on the grounds that the "the study of national security grew more narrow and rigid during the Cold War than it had been before," and that Cold War security studies "militarized the study of security" in ways that occluded a rich tradition of thought on "the nature, causes, effects and prevention of war." Yet, the results of this research have been varied and inconclusive. In Rwanda, great scarcities did not seem significant in the outbreak of conflict; in Chiapas, land maldistribution and weakly enforced property rights were more important than environmental scarcity per se. In other cases, the primary conflict was not between states but within them. Even where environmental factors appeared causal (as in broader patterns of migration and the emergence of conflicts), such factors seemed linked to larger questions of political identity and regime legitimacy that challenge the state as the orthodox object of security (Homer-Dixon, 1994; Ayoob, 1995). Claims closest to neorealist concerns - that scarcity dynamics can lead to the rise of "hard-core" authoritarian states more likely to attack their neighbors - have become embroiled in theoretical disputes regarding causality and method (Homer-Dixon, 1994: 36-37). Although such research shows that international and environmental factors can play a role in violent conflict, the links between environmental scarcity and interstate violence are far from clear. Moreover, the question of the correct "object" of study (states or peoples) remains contested even within this narrower agenda. The debate over "environment and security" illustrates how the neorealist conception of security studies rests on a claim regarding the appropriate referent object of security that both insulates it from seriously engaging alternative formulations and forces the latter to be judged on neorealism's terms. Unfortunately, alternative formulations are seldom explicit about the need to come to terms with the important political assumptions that are at the heart of neorealism. As a result, the debate remains pitched at a frustratingly superficial level.
The Quest for Scientific Objectivity in Neorealist Security Studies The aspiration to objective, scientific knowledge is crucial to neorealist security studies. Indeed, it is the foundation for many neorealist critiques of alternative approaches. According to John Mearsheimer (1994195: 37-39, 41), for example, neorealist security studies can be distinguished from "idealistic" approaches by the fact that "realists maintain that there is an objective and knowable world, which is separate from the observing individual." More critical approaches, Mearsheimer (1994195: 37-39, 41) argues, adopt an "anything goes" attitude toward social science that can be seen as stemming from the general tendency of nonrealist approaches (including institutional, critical, and other theories) to slide into pure idealism: the belief that ideas are the driving force of history and easily malleable. Obviously, if neorealist
/,\I
Broadening the Agenda of Security Studies
143
scholarship can claim the mantle of science, it has a powerful preemptive response to calls for refornlulating the research agenda of security studies. But does research within the neorealist paradigm conform to this "scientific" picture? This section highlights some tensions (and contradictions) within the neorealist literature that render rather problen~aticits foundational claim to scientific objectivity. The section examines research o n alliance formation, "offense-defense theory" (and related works), and recent attempts to theorize about nationalisnl and identity. Of particular interest are the problem of interpretation as a validation strategy; the treatment of beliefs, intentions, and perceptions; and the problematic status of identity groups as an "object" of security.
Recent work on alliance formation represents a fruitful starting point for analyzing the "scientific objectivity" of security studies, particularly because the scholars engaged in this work are explicitly committed to the developnlent of parsimonious sets of deductive hypotheses that will provide "cumulative knowledge," lead to "clear and more powerful theories, along with careful attempts to test their validity" (Walt, 1992: 448-473), and permit "determinate predictions at the foreign policy level" (Christensen and Snyder, 1990: 138). Yet, these goals have proven controversial, even among scholars sharing similar perspectives. Debate essentially revolves around whether or not a strict focus on the distribution of capabilities can capture the behavior of policymakers (Walt, 1985, 19873, 1992), whether bandwagoning or balancing behavior is more prominent among states (and when) (Kaufnian, 1992; Labs, 1992; Schweller, 1994), and whether or not the research on alliance formation ignores internal dimensions of threat that apply especially to Third World states (David, 1991). A precise stipulation of the content of these debates is not crucial here; what is important is bow well the empirical research meets the neorealist postulated canons of science. For example, how successful are scholars at classifying state actions as either bandwagoning or balancing behavior in response to particular threats? Walt (1992: 452) criticizes Kaufman (1992) for assuming "that the Nazi threat was unambiguous and unmistakable as soon as Hitler came to power in 1933," arguing that "the threat from Nazi Germany was anything but obvious." A more conipiex answer to this question is presented by Schweller (1994: 79), who proposes that Walt's definition of "bandwagoning" ("a form of capitulation") is too narrow and status-quo oriented. This definition led Walt to ignore alliance choices based on opportunities for gain and to understate the occurrence of bandwagoning behavior. To support this claim, Schweller constructs a classification of state behaviors that includes lions, lambs, jackals, and wolves to describe differences in the willingness of states to bear costs 3s they protect or extend their "possessions."4 He uses these
144
Widening Security
categories to classify state behavior across a wide historical period ranging from Alexander the Great to Hitler, his allies, and his victims. The problem is that these scholars are committed to a version of science in which acts or policies have to be unambiguously and objectively identified and classified (see King, Keohane, and Verba, 1994). In Schweller's case, this process would require a clear specification of the rules of classification and evidence for how he arrives at his four zoological categories of state action. Likewise, Walt and Kaufman should be able to agree on what they will look for to know whether a particular act represents a threat or not and whether states are engaged in balancing or bandwagoning behavior. These scholars could argue that greater precision and objective specification will be achieved with time, but such is not the route that is generally taken. Instead, they concede that even in principle their disagreement cannot be resolved in an objective fashion; classification criteria are arbitrated within a community of scholars who share common understandings that are not "objective." Thus, Walt (1992: 452) argues that even though Kaufman's view may be "consistent with the popular mythology of the interwar period, the scholarly literature does not support it." If interpretations are ultimately the foundation of proper classification, then the participants' understandings of whether or not they were "bandwagoning" or "balancing," were "initiators" or "respondents," or had issued threats or not (and of what kind) become critically important to the social scientific task at hand. Schweller's transhistorical categories, for example, would need to be grounded in the understandings actors have of how their social world is organized lest they conceal ways of organizing that world that cut across his four categories (or that would not be captured by them). As Peter Winch (1957: 87) puts it: whereas in the case of the natural scientist we have to deal with only one set of rules, namely those governing the scientist's investigation itself, here what the sociologist is studying ... is a human activity and is therefore carried on according to rules. And it is these rules, rather than those which govern the sociologist's investigation, which specify what is to count as "doing the same kind of thing." (emphasis in the original) Studies of the ways in which policies are constructed, explained, and justified are thus needed to validate the interpretations that scholars in neorealist security studies advance (Milliken, 1995a). This use of interpretation to validate theoretical propositions raises questions about the quest for transhistorical, acontextual, generalizable theory.
Beliefs, Intentions, a n d Perceptions The second issue - how we study beliefs, intentions, and perceptions -can be illuminated by examining research on offense-defense theory, which claims general applicability to situations ranging from ethnic conflicts in the former
,
I
, \\ I I I
i
Broadening the Agenda of Security Studies
145
Yugoslavia (Posen, 1993b) to war in sixteenth-century Europe (Hopf, 1991). Recent proponents assert that "the offense-defense balance can ... be incorporated into structural-realist theories of international politics," that its central explanatory variable (as a theory of foreign policy) can be perceptions (LynnJones, 1995: 664, 682), and that "domestic and perceptual forces can be cleanly plugged into parsimonious international system theories" (Christensen and hyder, 1990: 144) as explanatory variables to account for different nlliance strategies. These scholars also argue (or accept) that the actual offensedefense balance can be objectively specified (Hopf, 1991; Lynn-Jones, 1995: 66.5, 667). Leaving aside this question, the focus here is on the parallel hypothesis that decision makers' sub;ective perceptions and beliefs about the balance between offensive and defensive capabilities are accessible to scholars and can be specified in a precise and objective fashion. There are at least three problems with this proposal. An initial problem is that perceptions, beliefs, and intentions are complex individual and sociLz1attributes, not qualities possessed by a personified construct called "the state" (see, for example, Sagan, 1994). Yet, this introduces a ~lnit-levelfactor that violates Waltzian structuralism. This problem is not obviated by the response "that no Realist maintains that unitlevel factors exert no influence at all" (Walt, 1992: 473). But if unit-level factors matter, it structures only "shape and shove," if "the shaping and shoving of structures may be successfully resisted," and if "states affect the system's structure even as it affects them" (Waltz, 1986b: 3 4 3 , 3 3 1 ), then the scope for agency is wide and the explanatory power of structural accounts is severely compromised. Indeed, the possibility that agents can change the structures themselves (that is, transcend anarchy or the security dilemma) seems to be excluded only by definitional fiat. More precisely, the assumption that interests are exogenously determined excludes the chance that "through interaction, states might form collective identities and interests, redefining the terms" o f the security dilemma altogether (Wendt, 1994: 384). As Alexander Wendt points out, we cannot determine a priori whether or not this assun~ptionis appropriate. We need to research it. A second problem centers on the claim that beliefs and perceptions can be treated as objectively specifiable variables. Despite including "intentions" in his theory, Walt ( 19873: 263), for example, still argues that his goal is to provide "greater explanatory power with equal parsimony" - as long as intentions can bc measured (and aggregated) thro~tghrationalist methods. One way of accomplishing such a result is by using "meaning-oriented behavioralism" (Neufeld, 1993a), which treats beliefs, perceptions, and intentions as intervening variables to be precisely specified in causal explanations. As Mark Neufeld points out, however, such an enterprise requires careful techniques and n~ethodologicalinnovations in areas such as content analysis, survey design, and case-study strategies. Unfortunately, little of this concern appears in security studies, even in areas linking psychology and deterrence, in which arguments about individual beliefs and motivations have been prominent (I.evy, 1989; for a n exception see DeNardo, 1995).
146
Widening Security
What is actually being studied here, however, is not individual beliefs and intentions but collective meaning structures - shared understandings concerning the nature of warfare, the goals of foreign policy, the potentials of existing military technologies, and the limits of the politically and institutionally possible. Consider the evidence and analyses presented in discussions of the "cult of the offensive." Neorealist scholars argue that the cult of the offensive (or military doctrine in general) emerges from the organizationaVinstitutional interests of professional military organizations that are not under civilian control (Snyder, 1984a, 1984b; Posen 1984);it derives from "the political objectives and alliance commitments of the great powers" (Sagan, 1986: 153);and it has roots in the social stratification of European societies and social orders (Van Evera, 1986: 95, 99-100). The evidence adduced for these claims comes from the writings of major political and military figures, the contents of military training manuals, examinations of general attitudes toward warfare and the military profession, and discussions of the role of nationalist and imperial myths in perpetuating social control. "Meaning-oriented behaviorism," however, is not an appropriate method for the study of the kinds of collective meanings invoked above. The role that perceptions play in discussions of the offenseldefense balance bears a closer resemblance to sociological and anthropological "thick descriptions" of the practices, socialization, and "culture" of actors within social institutions whether narrowly military or more broadly political and societal. "Thick description" is an interpretive research strategy (Geertz, 1973),not an empiricistlrationalist one intended to reduce beliefs and perceptions to measurable "units." Its goal is to offer an account of particular historical circumstances and choices that is faithful to the understandings of participants and captures the nuances in their positions and acts. Walt's (1992: 4 7 4 4 7 5 ) dissection of Kaufman's (1992) rendition of interwar history - criticizing it for including questionable characterizations of particular leaders' actions, sweeping statements about domestic politics, and misreadings of policy choices and options - points toward a commonsense use of thick description. Only rarely, however, do we find scholars who recognize how the need to make judgments of this sort might affect the research strategy needed to validate their theoretical claims. One exception in the offense-defense literature is Elizabeth Kier's (1995) study, which explicitly situates her "culturalist" approach within broader methodological debates - a rare admission of epistemological and methodological pluralism. A third set of problems focuses on the twin propositions that (1)beliefs and perceptions only matter when we want to make determinate predictions of foreign policies, and (2) the only issue of importance, therefore, is how well the subjective perceptions of actors fit or clash with the underlying reality of the situations. According to neorealists, for all intents and purposes perceptions can be ignored by assuming that "states weigh options and make policy decisions in a more-or-less rational fashion" (Walt, 1992: 473) because an "ecological natural selection" process punishes those states and leaders who
I
i
\!
I
Broadening the Agenda of Security Studies
147
deviate from this norm over the long run (Waltz, 1986a: 66-67; Christensen and Snyder, 1990: 140, 142-1 43; Posen, 1993a: 82). The idea that perceptions either fit or clash with reality (which ultimately punishes errors) does not take into account the role of perceptions and beliefs in constructing the social world in which actors make choices and act. Consider Walt's ( I 987a: 263) refinement of balance-of-power theory, which argues that policymakers "balance againat the states that pose the greatest threat," whether or not these are the most powerful states in the system. Threats here are not objectively specifiable in the same sense that capabilities are because they include offensive intentions (Walt, 198.5: 9). Once we deviate from a tight linkage to capabilities, however, we move into a constructed world. Indeed, the world of interests, threats, and intentions requires an understanding of history, culture, ideologies, and related factors (O'Tuathail, 1993; Weldes, 1993, forthcoming). In principle, the absence of threatening intentions could allow actors to override completely the suspicions that would be generated (in a pure Waltzian world) from capabilities, opening the way for a whole range of resolutions to the security dilemma. Such a proposition might explain why post-1945 Western Europe did not balance against the United States, or why the U.S. Pentagon is not concerned about British and French nuclear weapons. Here we become interested in the construction of the Western Alliance security community, for which competing accounts can be offered that run counter to neorealist arguments (Lhlby, 1988, 1990; Klein, 1990; Adler and Rarnett, 1996).
The rise in ethnic and nationalist conflicts has put the question of what (or whom) is being secured (and from what) back on the agenda of security studies. Neorealist scholars propose that questions of identity (and interest) formation can be analytically suspended (Wendt, 3 992: 392, 1994: 384) because they change relatively slowly or hecome "solidified" during circumstances of conflict and war (Kaufmann, 1996: 153). As a result, the challenge posed by identity conflicts is resolved by integrating the issues raised by ethnicity and nationalism into neorealist foundations without reopening thorny epistemological or ontological questions. Steven Van Evera's (1994) "hypotheses on nationalism and war" and Barry Posen's (1993b)work on ethnic conflict in the former Yugoslavia illustrate with clarity this process. Both face the challenge o f explaining the ge:erzesis of nationalism within an approach that treats social actors as giucn and their ideational origins as exogenous. Dynamics of political identity are dealt with through an objectivist epistemology; identity groups are conceived of methodologically as individuals who simply replace states as the new objects of security analysis. These analytic constructs are then cast back into the neorealist dynamics of anarchy and the security dilemma vis-a-vis other "actors." The idea that taking questions of identity seriously may require a
148
Widening Security
different understanding of group formation and interaction is never raised. Each author's treatment, however, suggests why such questions need to be considered. Van Evera (1994: 6) proposes to generate a series of testable hypotheses about nationalism by leaving aside the question of its origins, treating it as an empirical fact and defining it as a political movement in which members give their primary loyalty to their own ethnic or national community and desire an independent state. Despite his interest in treating nationalism as an existing fact, however, Van Evera is forced to account for how political movements emerge in order to explain the link between nationalism and war. Given that not all these emergent nationalisms exist yet, he has to discuss the conditions under which they will arise. The basis of nationalism seems to be preexisting lirtguistic groups. As Van Evera (1994: 11)notes, many of the more than six thousand such groups that have been identified "have dormant or manifest aspirations for statehood." The question of why some of these groups emerge as nationalist movements and others do not is answered in terms of the central state's ability to exercise its power and prevent their emergence. Thus, "if nationalism is unattainable it may not even appear: the captive nation will submerge the nationalist thought ... [Nlationalism is in part simply a function of capability: it emerges where it can" (Van Evera, 1994: 16). Yet, this formulation raises significant dilemmas for understanding the relationship between nationalism and security, at least within an empiricist conception of knowledge. Simply put, if nationalism does not appear, then how do we know "it" is there and that "it" is only held in abeyance by other powers? If the "thought" has been submerged, how do we know it is still there to reemerge when circumstances allow, or, indeed, that it was ever there in the first place? Further, the idea of preexisting primordial ethnic or national communities appears to miss the point: nationalism is about the creation of these communities (or loyalty to them). Moreover, if one views all groups as latently nationalistic (and, hence, as sources of mutual insecurity), it is difficult to understand the dynamics of multiethnic states in which ethnicllinguistic groups do not see themselves in nationalistic terms and, instead, commit themselves to the legitimacy (and perpetuation) of the existing political order. Posen's (1993a) analysis of the relationship between nationalism and war represents another attempt to address some of these problems. Nationalism, he argues, should be understood in the context of the historical development of mass armies and the necessity for states to be able to raise such armies to survive. The adoption of nationalism and nationalistic institutions is caused by the pressures of the international system: by the existence of other states that have adopted such ideas and institutions and can now (threateningly) use them to mobilize mass armies (Posen, 1993a: 82, 84, 122). As a result, states are forced to adopt similar policies or fall by the wayside. As Posen (1993a: 81) argues, "It is not merely coincidental that nationalism seems to cause intense warfare; I argue that it is purveyed by states for the express purpose of improving their military capabilities" (see also Mearsheimer, 1990: 12,25). To test this
I
,I
I
,
Broadening the Agenda of Security Studies
149
hypothesis, Posen examines the French-PrussiadGerman relationship between the end of the eighteenth century and World War I. Nationalistic educational, cultural, and political transformations were tied in significant ways to the need to raise mass armies in response to the abilities of other states to d o so. "Elites" drew on nationalism to generate the military capabilities such an emotional climate made possible: mass armies of highly motivated soldiers backed by a n entire social structure that could be mobilized for war. Posen's rich and nuanced analysis contains valuahle insights, but it falls short on several counts as a compelling neorealist synthesis of the connections among nationalism, war, and society. First, as Lapid and Kratochwil (1996) have argued, Posen' approach does not develop the concept nationalism ( o r ethnicity). Rather, nationalism is considered a consequence of state ( o r elite) choices and needs in their ~ state power. Once again struggle for survival. It is reduced t o a f t l ~ z c t i oof nationalism is treated as a preexisting "fact," as a social resource for entrepreneurs t o draw on in consolidating state ( o r their o w n ) power. But where did this "fact" come from? Even leaving aside the extreme instrumentalism of this view, Posen's historical analysis focuses on what Benedict Andcrson ( 1 9 8 3 ) has termed "official nationalism." For this political resource t o be available for nlobilization, however, a series of prior transformations has t o have taken place. The role of these transformations (such as the rise of print culture) in creating the modern world is assumed rather than understood in Posen's analysis. Why, for example, did elites not appeal t o concepts of civilization, empire, o r religion, and what difference might such appeals have made? More important, how can we invoke notions of "hypernationalism" to explain contemporary conflict dynamics (Mearslleirner, 1990: 20-21) while leaving aside questions concerning identity formation and the emergence and continued vitality of nationalism? Second, Posen's discussion of an interactive relationship between domestic and international politics does not demonstrate the validity of a "structural realist" explanation. A similar stress on the relational element in international politics is also at the core of analyses that stand outside the neorealist position. Eric Ringmar ( 199S), for example, puts relational dynamics at the heart of his understanding of Sweden's expansionist military policy in the seventeenth century. But the relationship he adduces is the Swedish desire for "recognition" (in the Hegelian sense) in the eyes of other states rather than in any neorealist structural imperative. Posen's historical rendition is also close to certain sociological perspectives (Giddens, 1987; Shaw, 1993). In short, taking account of relational dynamics in security policy does not commit one to a structuralist perspective; taking these dynamics seriously can lead to consideration of forms of analysis that neorealist security studies usually rejects. Finally, I'osen's vision of nationalism re-evokes long-standing issues of change a n d agency in neorealist analysis. Within his formulation, the possibility for change is obscured by the eternal r e c ~ ~ r r e n cofe neorealist structuralism. Despite the massive social transformations surrounding the rise of nationalism, imperialisni, mass armies, and the niodern democratic state,
150
Widening Security
things in essence remain the same. Interstate relations, and their propensity for conflict, are determined by structures not by any social or political changes within states or cultures, no matter how profound they may seem. This view cannot, by definition, conceive of shifting identities that could allow greater cooperation or broader structures of identification (such as "Europe") linking people and groups in ever-widening forms of political order (Mearsheimer, 1994195). The contemporary implications of this position become clear at the end of Posen's analysis. Because nationalism is a consequence of insecurity and insecurity is tied to the threat that other states pose, decreases in nationalism and conflict are attributable to decreases in the threat posed by mass armies. The reduction in West European nationalism (and conflict) is, thus, attributable to the American nuclear umbrella. Hence, nuclear disarmament could have negative consequences, and nuclear proliferation could be beneficial (Posen, 1993a: 124). Other options for overcoming the security dilemma are viewed as hopelessly "idealistic."
The Construction a n d Practice of "Securitization" As observed in the previous discussion, a productive dialogue among students of security studies is only made possible by acknowledging the thorny problems of knowledge, interpretation, and historiography that are associated with all research efforts. The last task in this essay review is to examine and critique some recently proposed alternative approaches to security studies that engage these concerns directly. The goals are twofold. First, the review describes a literature in security studies that moves away from neorealist formulations in directions that could be called "critical" or "constru~tivist."~ Rather than treating states, groups, or individuals as givens that relate objectively to an external world of threats created by the security dilemma, these approaches stress the processes through which individuals, collectivities, and threats become constructed as "social facts" and the influence of such constructions on security concerns. As Wendt (1995: 81) observes, the goal is "to analyze how processes of interaction produce and reproduce the social structures - cooperative or conflictual - that shape actors' identities and interests and the significance of their material contexts." Second, the review shows that, contrary to claims that "the distinguishing feature of the critical theory literature ... is its lack of empirical content" (Mearsheimer, 1995: 92), there is a rich and interesting research program under way, albeit in its early stages. Two exemplary literatures are discussed: (1)research on societal security, and (2) research on the social construction of threats. In the process of doing research on new conceptions of who or what is being secured, from what threats, and by what means, many scholars have found themselves challenging the core foundations of the neorealist position. It is important to note, however, that not all these scholars oppose all elements of the neorealist position. Scholars such as Barry Buzan, Charles Jones, and Richard Little (1993), for example, have contributed greatly to
I
,
I
\\
I
Broadening the Agenda of Security Studies
151
advancing the logic of Waltzian structural realism, while others, specifically Wendt ( 1995: 75) and Michael Barnett (1992), "fully endorse the scientific project of falsifying theories against evidence." Still others argue that a commitment to an interpretive method does not imply rejection of the idea that there are better or worse interpretations - only a rejection of the idea that these are arbitrated against some external "reality" rather than against social actors' understandings of their world. The basic claims of the critical and constructivist approaches are that "security" is not an objective condition, that threats to it are not simply a matter of correctly perceiving a constellation of material forces, and that the object of security is not stable or unchanging. Instead, questions about how the object to be secured (nation, state, or other group) . is constituted, and how particular issues (cconomic well-being, the risk of violence, environmental degradation) are placed under the "sign of security" become central. "Security" (especially, "national security") is understood as a particular set of historical discourses and practices that rest upon institutionally shared understandings. The research goal is to study the process by which threats are represented politically: to examine "who can 'do' or 'speak' security successfully, on what issues, under what conditions, and with what effects ... [Wlhat is essential is the designation of an existential threat ... and the acceptance of that designation by a significant audience" (Waever, 1995a: 4). The concept and usage of "national" (or state) security is not rejected as either outmoded or in need of transcendence; instead, it is taken seriously as a n important historical resolution to central problems of political life (Weldes, 1996). From a methodological perspective, three propositions appear to form the core of these alternative approaches to security studies and to differentiate them from neorealism:
1. O u r knowledge about the subjects, structures, and practices of world politics is not "objective" (in the materialist sense of neorealism) because no straight-forwardly objective world exists separate from its collective construction by observers or actors. 2. Interpretive methods that examine actors' practical understandings of t ~ echang~ng) s t h e ~ social r world are the o r g a n ~ ~ a t l oofn (and p o s s ~ b ~ l ~for central to dolng research. 3. The purpose of theory 1s not to search for p r e d ~ c t ~ own~ t h i nthe context of determ~nate,transh~stor~cal, and generalizable causal c l a ~ m sbut rather contextual understdnd~ngand practical knowledge. These issues are addressed in different ways within these emerging bodies of research. But this lack of methodological unity should not be taken either as a n easy excuse for dismissal or as evidence of the intrinsic strength of the neorealist enterprise. Obviously, scholarship in these new research programs will fail to stand up if measured against the standard of neorealist security studies. But oncc the scientific aspirations of neorealism are called
152
Widening Security
into question, alternative approaches can be judged on their own terms, and the issues raised by (and between) these alternatives can be examined seriously as a stimulus to critical reflection in the field. Identity, Society, and Societal Security
For Buzan, Ole Waever, and others involved with the "Copenhagen School" (McSweeney, 1996), a crucial starting point for restructuring security studies is the distinction between state and society. They argue that security studies needs to adopt an understanding of the "duality" of security: that it combines state security, which is concerned with sovereignty, and societal secuvity, which is concerned with identity (Waever et al., 1993: 25). Societal security takes into account the origins, structures, and dynamics of collective identity formation (Neumann, 1996a) and the connection between identities and interests (and threats to them) (Wendt, 1994). "At its most basic, social identity is what enables the word 'we' to be used" as a means by which to identify collectively the "thing" to be secured (Waever et al., 1993: 17). But "society," as used by these scholars, cannot be reduced to an aggregation of individuals nor made synonymous with the state because to do so would risk misunderstanding many of the most salient contemporary security dynamics. It is not simply the identities of states that are constructed, but the entire set of practices that designates the object to be secured, the threats it is to be secured from, and the appropriate responses to these threats. In ethnonationalist conflicts, for example, competing claims to sovereignty, rather than the competition between existing sovereignties, often provide the source of conflict. What people are attempting to secure is an idea. Even though material elements are still important, such conflicts cannot be reduced to the competing interests among pre-given political objects. These conflicts are about the creation of these objects and the way in which different identities are developed (Anderson, 1983). The case of Macedonian identity, as Hikan Wiberg explains it, is suggestive (from Waever et al., 1993: 107): to the extent identity is anchored in language, Bulgaria is the main threat: it regards Macedonian as a Bulgarian dialect ... To the extent it is anchored in religion, the Serbs are the main threat: the Macedonian church [is] still under the Serb patriarchate ... To the extent it is anchored in statehood, the Albanian minority will not accept Macedonians defining themselves as the state carrying people. When it is defined by territory and history, the Greeks object strongly. Likewise, Ukrainian nationalism takes some of its force from a denial of a shared origin with Russians in the original "Kievan rus." "[Flor Ukrainian nationalists, the Russians are imposters and pretenders only ... [Yet,] Russian nationalists tend not to recognize Ukrainians as a nation at all, but regard
i
t r
\ I
I
Broadening the Agenda of Security Studies
153
them as 'polonised' - corrupted - Russians" (Pierre Lemaitre in Waever et al., 1993: 112). Russian-Ukrainian security relations are not just about economic relations, the Black Sea fleet, the status of the Crimea, nuclear weapons on Ukrainian soil, or the possibility of forceful reintegration with Russia. By reconstructing the identity relationship, we gain a different understanding about some of the sources of reciprocal threats and the possible avenues for ( o r difficulties in) overcoming them. Like the neorealist analyses discussed above (Mearsheimer, 1990: 56; Posen, 1993b: 44), this research stresses the importance of history in the construction of national identities, but it also holds that interests cannot be postulated as prior to identities and that identities themselves are ~zot fixed in time but are relationally constructed (Neumann, 1996a, 1996b). A stress on identity and society as flexible constructs allows us to examine the integrative dynamics under way, for example, in Europe currently. Stress solely on states and the security dilemma makes such research unnecessary or inconiprehensible (Mearsheimer, 1990). The push of states for integration in the European Union may be seen as jeopardizing the security of significant parts of their societies (either economically or culturally). Thus, state action can be interpreted as creating societal insecurity. Conversely, societal resistance can threaten the authority of the state or its ability to carry out its policies. But as long as both state action and societal resistance are studied as political practices, they are in principle subject to evolution and change. This approach provides researchers with a way of understanding the possibility of changes in security relations among communal groups. The attempts by the Copenhagen School to incorporate "societal security" into the security studies agenda have generated some criticism. At the heart of the challenges is the claim that making society synonymous with identity risks reifying both society and identity and, in the process, losing a critical purchase on security as a political practice. Lapid and Kratochwil (1996: 1 1 8-120), for example, argue that by equating identity with "society" Buzan, Waever, and their collaborators create the foundation for yet another variant of statism and the neorealist structuralism they want to transcend. Bill McSweeny ( I 996: 85) has voiced a similar concern: that by asserting the link between society and identity, "identity" becomes, by definition, the security concern of a "society." The important questions of how a society comes to conceive of its identity and its security can be neither asked nor answered. Both society and identity become fixed objects, and, as a result, impervious to critical analysis and an understanding of their internal dynamics. "Identity describes the society, and society is constituted by identity ... Societal identity just is. We are stuck with it. There is no way we can replace it, except hy adopting multiple identities, each o f which is, in principle, as inviolable as the next" (McSweeney, 1996: 87). The practical implications of this criticism can be seen by considering research on new security issues such as migration (Heishourg, 199 1; Larabee, 1992; Weiner, 1992193; Waever et id.,1993). A central theme of this research concerns the security of a society's "cultural and national identity" in the
154
Widening Security
face of large-scale population movements. What is threatened here is the very cultural identity that neorealist understandings take as primordial. Security is no longer an "objective" condition but "a social construct with different meanings in different societies"; a "security threat ... is often a matter of perception" and "perceptions of risk change" (Weiner, 1992193: 95, 110-111). Not surprisingly from this perspective, "different states and nations have different thresholds for defining threats: Finns are concerned about immigration at a level of 0.3% foreigners, where Switzerland functions with 14.7%" (Waever, 1995a: 3). A central task of security analysis becomes determining how these threat thresholds are defined as well as how they change as a result of different state policies and political practices. There is nothing mechanistic (or "causal") about this process. For example, in the post-1945 period, the crystallization of the welfare state as part of European "identity" appears to have subtly changed the way in which migrants are integrated into communities, and increased the perception of the threat they pose to these communities (Waever et al., 1993: 153-162). If identity is made a concern of security, then who judges "what counts as the parameters of collective identity, and by what criteria must judgments be made" (McSweeney, 1996: 88)? What, for example, can be said against LePen's declarations that migrants (or "foreigners") are threats to French (societal) security? An unease over these kinds of issues pervades discussions of migration and security. Despite noting the "socially constructed" nature of security, Weiner (1992193: I l l ) , for example, warns that it is necessary to separate racist or xenophobic paranoia from legitimate concerns, implying that one can distinguish between a "perceived" security threat and a "genuine conflict of interest" Similarly, Waever (1995b: 65-66) argues that "if this area is securitized in an unsophisticated way, its effect can easily be to legitimize reactionary arguments for defining migrants as security problems and presenting nations as threatened by Europeanization." Likewise, Jef Huysmans (1995) contends that treating security in terms of identity, and migrants as threats to it, risks concretizing identity, radicalizing the issue, and legitimizing violence against migrants. These concerns illustrate some of the ethical and practical questions raised by an alternative view of security. Even if we treat the realist raison d'Ctat as only one possible discourse, it still needs to be weighed against alternatives that are not selfevidently more peaceful (Mearsheimer, 1995). None of these concerns has an easy resolution; they deserve serious discussion by parties with a variety of perspectives. Constructing Threats and R e s p o n s e s
How are threats defined and constructed? In other words, how, from the welter of information and interaction among states and their representatives, are threats constructed and mobilized against? Most research on this question has focused on the American construction of the "Soviet threat." Bradley Klein's (1990; see also Nathanson, 1988) analysis of major documents surrounding
, I
t
Broadening the Agenda of Security Studies
I 55
the early Cold War and the creation of NATO shows that capabilities played hardly any role in the assessment of the Soviet threat. "[Wlhat carried the day, in the absence of reliable intelligence estimates, was a series of discursively constructed claims about the nature of the Soviet totalitarian state and about its implacable global purposes" (Klein, 1990: 313).Jennifer Milliken's ( 1995b) study of the Korean War highlights the effort involved within Western policy circles to construct the North Korean invasion o f the South as part o f a Moscow-led aggressive expansionism and not as an internecine struggle among Koreans. Both these works parallel some of the postrevisionist scholarship on the origins of the Cold War emphasizing the effort involved in creating an American consensus over its international role (Caddis, 1982; Leffler, 1992). Simon Dalby's (1990) book focuses on the construction of the Second Cold War and analyzes the uses made by the American Committee on the Present Danger (and associated advocates) of geopolitical logic, historical determinism, and nuclear war-fighting logic to construct a series of interlocked arguments for the military buildup and European nuclear deployments that characterized the Reagan presidency. This analysis of threat construction directly challenges the argument that the "end of ditente" was inevitable. The post-Cold War threat environment has also provided fertile ground for critical analysis, as in David Mutimer's (forthcoming) examination of the way in which the metaphorical and linguistic construction of a "proliferation threat" for the United States (and its alliance partners) has been used to mobilize resources aimed at dismantling the Iraqi nuclear, chemical, and biological weapons programs; to isolate North Korea over its possible nuclear weapons program; to create an activist "counterproliferation" policy within the Clinton administration; and to mobilize support for the development of ballistic missile defenses. A second line of research tackles the way in which appropriate responses to the threats are constructed in security policymaking. Most attention in this area has been focused on deterrence and arms control policies. Emanuel Adler (1992) examined how the arms control "epistemic community" that emerged in the United States after the Cuban missile crisis charted a path out of the sterile debates over "disarmament" of the previous period and generated cooperative security policies hetween the superpowers. Others (Chilton, 1985; Chhn, 1987; Luke, 1989; Mehan, Nathanson, and Skelly, 1990) have studied the elaboration and implementation of nuclear deterrence policies, drawing attention to the linguistic construction of the nuclear debate and the ways in which weapons were "normalized" or opponents trivialized in order to promote particular nuclear deterrence policies. Security policies also involve the securing of the stable identity of entities. David Campbell (1992), for example, argues that threats need to be understood in part as powerful elements in securing a society's collective identity in an essentially rootless modern world. According to Campbell (1992: 54), "the state requires discourses of 'danger' to provide a new theology of truth about who and what 'we' are by highlighting who or what 'we' are not, and what 'we' have to fear." Likewise, Iver Neumann and Jennifer Welsh
I56
Widening Security
(1991; see also Neumann, 1996b) have examined the way in which "Europe" was constituted in relation to a "Turkish other" from which it needed to be secured; Karin Fierke (forthcoming) has explored how the end of the Cold War provoked a rearticulation of the political categories through which identities and threats had been articulated within Europe. All these authors are concerned with how questions. How was an American or Western interest in opposing so-called Soviet expansionism created and what forces did it mobilize? How did the language of nuclear deterrence operate to tame these weapons and exclude particular options for dealing with them? How do different discourses construct "others" as the source of threats? The most common objection raised to all this research is that constructions operate as simple glosses over the "real interests" that lie behind "the veil of facts." The response to this complaint is a complex one. All these authors challenge, for example, the neorealist argument that the way in which the confrontation between East and West unfolded was inevitable, that the construction of the Soviet threat was merely the public gloss on the operation of real interests in great power clashes, and that the particular form this confrontation took was unimportant to an understanding of its causes and consequences. Hence, the researchers go beyond a demonstration of the constructed nature of threat discourses to show how these constructions could have been different given the concrete historical circumstances in which political choices were made. These arguments are not purely of the idealist "if only" kind; they evince a clear concern with the conditions of contemporary policy choices. Scholars in the constructivist tradition often seek to shift the grounds of debate to a pragmatic political or discursive perspective in order to avoid determining what security "actually is" precisely because they view security as a convention (Dalby, 1992, forthcoming; Waever 1995b). The thrust of their arguments concerning the "practice of security" presumes that the process of constructing a meaningful discourse of threats is not politically neutral. Thus, one ought to question whether or not the construction of a articular "problem" as a "threat" is desirable. As Daniel Deudney (1990) has observed, for example, making the environment a national security issue may subvert the goal that proponents of this change seek to achieve. Environmental issues pose significant and pressing dangers, but placing them on the security agenda means subsuming them within concepts and institutions of state security (that is, military responses against a particular "target") that are unlikely to further the agenda of "environmental security" (Deudney, 1990; Matthew, 1995: 19). In a similar vein, Kaufmann (1996) indicates that identities (and threats to them) cannot be changed by a simple act of will or wishful thinking; under extreme circumstances (such as communal war), the boundaries of identities can be hardened and thickened in ways that exacerbate conflict and make creative resolutions difficult if not impossible. The question of the relationship of theory to practice in alternative approaches to security studies is central here, as is the issue of the political processes through which policies and practices can be modified or altered.
Krdii'.
II
td \\ i I l l i r i l 5 Broadening the Agenda of Security Studies
157
Conclusion This review essay does not claim to cut the Gordian knot into which contemporary security studies has tied itself. The conlplex methodological and political issues raised above touch on every branch of security studies (and its current political relevance). Moreover, they reflect concerns that are not limited to this small outpost of social science. Nor can these issues be resolved simply by declaring that alternative approaches to security studies are little more than the expression of postmodern nihilism (Mearsheimer, 1994195: 39-41) and withdrawing to the supposedly safer harbors of theoretical and political orthodoxy. This review has attempted to show that despite the analytic divides that appear to demarcate different approaches to security studies, the various approaches actually share a number of the same problems. Such a statement does not mean that different approaches are commensurable, but it does suggest a need for all scholars to consider seriously the issues central to approaches other than their own. It cannot be underscored enough that neorealists and their challengers "see" a different world. The former see, over the past several centuries of world politics (and perhaps before), a ceaseless repetition of con~petition among political units for power in a world of suspicion and insecurity. As Steven Krams and Mark Kilgour (1988: viii) note, "[Tlrue, the world is confusing, but considerable order and stability often can be found below the surface ... This search for order is the hallmark o f scientific inquiry; without it ... there could not be a coherent intellectual understanding of the regularities we observe." Unfortunately, when claims to transhistorical continuity and generalizability are examined closely, they often turn out to rest upon tendentious or implausible readings of history that are little better than Whig or Toynhee-esque (Schroeder, 1994, 1995; Elman and Elman, 1995). The latter scholars see in the tapestry of recent world history variation, change, and contingency. For them, the rise and decline of absolutism, the advent of modern nationalism and iniperialism, the emergence of claims for self-determination and decolonization, and the more recent influence of ideas of democracy and human rights have all embedded the interaction of political units in a complex web that gives ~ r a c t i c a land shifting content to their understandings of interests. It is no accident that researchers within this more historicist tradition do not regard positivist methods and apodictic prediction as the hallmarks of social understanding. There are, however, at least two reasons for stopping short of the implication of this argument and claiming that competing accounts are simply incommensurable and irreconcilahle (Neufeld, 1993b). The first is thc "division of labor" argument, presented most straightforwardly in the distinction between "why" and "how" questions - "with explaining why particular decisions resulting in specific courses of action were made" versus with understanding "hozu the subjects, objects, and interpretive dispositions were socially constructed such that certain practices were made possible" (Doty, 1993: 298, emphasis hers; see also Hollis and Smith, 1991). "How" clues-
158
Widening Security
tions are in some senses prior to "why" questions: before particular courses of action can be selected (and thus explained), the range of possible or plausible options has to be constructed and scholars have to understand the way in which certain options acquire meaning or value. In security studies, this process involves ascertaining how the nature (and source) of threats is constructed, the "object" being secured, and the possibilities for reinforcing, ameliorating, or even overcoming "security dilemmas." Neorealist approaches take all these issues as givens. An enlarged conception of security studies needs to make room for both sorts of research agendas. Without both "how" and "why" research, we are not adequately "explor[ing] the conditions that make the use of force more likely, the ways that the use of force affects individuals, states and societies, and the specific policies that states adopt in order to prepare for, prevent, or engage in war" (Walt, 1991: 212). The inability of neorealist security studies to meet (even in principle) the standard of science to which it aspires should also moderate rejection of the more interpretive scholarship that informs approaches concerned with "how" questions. Of course, there are thorny methodological problems that bedevil interpretation as well (some interpretations are always more plausible, coherent, and convincing than others), but the "truth value" of the claims is arbitrated within a social context. The neglect by neorealist security studies scholars of the crucial role that interpretation plays in their own arguments and the implication this has for their claims to objectivity is difficult to explain, except, perhaps, by their eagerness to gain the disciplining power conveyed by the mantle of science. Ultimately security studies research would be enhanced by a more direct engagement with the difficult issues associated with historical interpretation. Such would certainly seem more preferable than claiming to be "wary of the counterproductive tangents that have seduced other areas of international studies" (Walt, 1991: 223) or preserving the coherence of neorealist theory by tautological and definitional fiat (Hall and Kratochwil, 1993; Kratochwil, 1993; Schroeder, 1995). None of the positions in this debate has yet found the epistemological or methodological grail. The second reason for not claiming that the various schools of thought in security studies are incommensurable and irreconcilable is that all security studies scholars are engaged in intensely practical and political projects, whether these are defined as "policy relevant knowledge" or "praxis." On the one hand, it is not the case that alternative approaches, whether addressing- new issues such as migration and nationalism or old issues such as deterrence and arms control, court political irrelevance or are "diverted into a prolix and self-indulgent discourse that is divorced from the real world" as some (Walt, 1991: 223) have argued. This statement would be true only if one holds a truncated view of politics that sees the relevant actors in the process of defining security as states and their policymakers (supported, of course, by appropriate academic experts) and believes that scholarship should "concentrate on manipulable variables, on relationships that can be altered by deliberate acts of policy" (Walt, 1991: 212, emphasis his). Even neorealist scholars like Mearsheimer, Van Evera, and Posen have noted that important aspects of conflictual relationships include the creation and perpetuation of national
/
( I ,
(1
\ ,I1
Broadening the Agenda of Security Studies
159
myths (through education, for example), symbolic gestures (threatening or otherwise), and political rhetoric. Such factors are manipulable variables in only a loose and indirect sense, yet they are the stuff of security in contemporary world politics. O n the other hand, the concern that neorealist scholarship has with the central role of organized violence in shaping our political world is something that scholars using alternative approaches to security studies must address seriously. Institutions o f , ideas about, and instruments o f organized violence play a central role in domestic and international political life and cannot be wished away. Likewise, if the processes of "securitization" can have dark sides (as in the migration and security debate), then even scholars using critical analysis cannot escape the question: How should security studies he used in the world of political practice? Coming full circle, should the agenda of security studies be "broadened" or "restricted" to meet the intellectual and practical challenges of the post-Cold War world? Critics could object that the arguments for methodological pluralism presented here will neither maintain disciplinary coherence nor generate a "progressive research program." This review actually suggests a paradoxical response: It may be necessary to broaden the agenda of security studies (theoretically and n~ethodologically)in order to narrow the agenda of secztrity. A more profound understanding of the forces that create political loyalties, give rise to threats, and designate appropriate collective responses could open the way to what Waever (199%) has usefully termed "desecuritization" -the progressive removal of issues from the security agenda as they are dealt with via institutions and practices that do not implicate force, violence, or the "security dilemma." There is nothing inevitable or idealistic about this idea. Contemporary political debates over the enlargement and restructuring of NATO, the appropriate preventive responses to nascent comniunal conflicts, and the imperatives of dealing with rapid environmental change all suggest that policymakers engage daily with the complexities and possibilities of "security" in a broad sense. Rather than calling for a restriction of its theoretical agenda, the field of security studies needs to pursue these issues and debates with even more energy and with an openness that will, in turn, foster intellectual development and political engagement with the dynamics of contemporary world politics.
Notes 1. O u r thanks to Lene H,lnsen, lenniter Milliken, Thomas Schmalherger, and the reviewers and editors of the Mershon Internirtion~rlStudzes Revieto for helpful comments o n this essay. 2. Scholars who d o not tit neatly Into these categories include Edward Azar and Chung-in Mooti ( 1988) and Mohammed Ayoob ( 1995). 3. Insofar ,ls debate ha\ focused o n neorealist securlty studies, it has C L I ~ I ~ L I S Ignored I~ a large nonrealisr literature - ~ncludlngcognitive, organiration;ll, and cybernetic ,ippronches, as well as the l i t e r a t ~ ~ on r e ciome\tic \ourcrs o f strategy (see, for example, Jervis, Lehow, and S t e ~ n 1985; Barnett and Levy 199 1 ; Rarnett 1992; Rosrcrance and Stein 1993; Sagan 1994; Smoke 1996).\r willingness t o l o o k heyond neorc,ilist security studies might strengthen the arguments of the crit~cs.
160
Widening Security
4. Lions are "states that will pay high costs to protect what they possess but only a small price to increase what they value"; lambs "will pay only low costs to defend or extend their values"; jackals "will pay high costs to defend their possessions but even greater costs to extend their values"; and wolves "are predatory states [that] value what they covet far more than what they possess" (Schweller 1994: 101-103). 5. We use the labels "critical" and "constructivist" loosely in this review, acknowledging that the very term critical contains no connotations that link it extricably to either a positivist or reconstructive approach. Thus, it may allow both proponents and opponents to stop at the theoretical level, without reflecting on the practical implications of scholarship. It is also worth noting that few of the scholars mentioned in what follows appear in Mearsheimer's (1994195) review of "critical theory" and international relations.
References Achen, Christopher and Duncan Snidal (1989) Rational Deterrence Theory and Comparative Case Studies. World Politics 41:143-169. Adler, Emanuel (1992) The Emergence of Cooperation: National Epistemic Communities and the International Evolution of the Idea of Nuclear Arms Control. International Organization 46:lOl-146. Adler, Emanuel and Michael Barnett (1996) Governing Anarchy: A Research Agenda for the Study of Security Communities. Presented at the annual meeting of the International Studies Association. San Diego, California, April 19. Anderson, Benedict (1983) Imagined Communities. London: Verso. Ayoob, Mohammed (1995) The Third World Security Predicament. State-Making, Regional Conflict and the International System. Boulder: Lynne Reinner Publishers. Azar, Edward E. and Chung-in Moon (1988) Legitimacy, Integration and Policy Capacity: The "Software" Side of Third World National Security. In National Security in the Third World: The Management of Internal and External Threats, edited by Edward E. Azar and Chung-in Moon, pp. 77-101. College Park: University of Maryland Press. Baldwin, David (1995)Security Studies and the End of the Cold War. World Politics 48:117-141. Barnett, Michael (1992) Confronting the Costs of War. Princeton: Princeton University Press. Barnett, Michael and Jack Levy (1991) Domestic Sources of Alliances and Alignments: The Case of Egypt, 1962-73. International Organization 45:369-395. Brams, Steven and Marc Kilgour (1988) Game Theory and National Security. Oxford: Basil Blackwell. Buzan, Barry (1991) People, States and Fear. Second edition. Heme1 Hempstead: Harvester Wheatsheaf. Buzan, Barry, Charles Jones and Richard Little (1993) The Logic of Anarchy. New York: Columbia University Press. Campbell, David (1992) Writing Security: United States Foreign Policy and the Politics of Identity. Minneapolis: University of Minnesota Press. Carter, Ashton, William Perry, and John Steinbruner (1992) A New Concept of Cooperative Securrty. Washington, DC: The Brookings Institution. Chilton, Paul, ed. (1985) Language and the Nuclear Arms Debate: Nukespeak Today. London: Frances Pinter. Chipman, John (1992) The Future of Strategic Studies: Beyond Even Grand Strategy. Survival 34:109-131. Christensen, Thomas and Jack Snyder (1990) Chain Gangs and Passed Bucks: Predicting Alliance Patterns in Multipolarity. International Organization 44:137-168. Cohn, Carol (1987) Sex and Death in the Rational World of Defense Intellectuals. Signs 12: 687-718. Crawford, Beverly (1994) The New Security Dilemma under International Economic Interdependence. Millennium 23:25-55.
h r,l I
.
I
I
i I\1 1 '
1
.
Broadening the Agenda of Security Studies
161
C r ~ w f o r d Ncra , ( 1991) Once and F u t ~ ~ Security re Studies. S c c ~ t r ~Studies ty 1:283-3 16. Dabelko, Geoffrey D. and I h v i d D. Ilahelko ( 1 995) Env~ronrnenralSecurity: Issues of Conflict rind Resolution. En~~irrrnnzentdC:hrrtige and S e c ~ t ~ i tI'rolect y Report 1:3-13. Woodrow W ~ l s o nCenter, l'rincrton University. Dalby, Simon ( 1988) Geopolitical Discourse: The Soviet Union as Other. Alternatives 13:4 1.5443. Lhlhy, S ~ m o n( I99Oi Crcatirrg the Srmt?d (:old War. T / J CDiscmtrsc of Po/itrcs. New York and London: Guilford and 1'1ntcr. Dall,): Simon ( 1992) Secur;ry, M<xiern;ry,F c ~ l c , The ~ ~ : D;lcmn,as of Post-(:old Wnr Secur~ty Discourse. Altc~r~zatitvs 17:95-1 34. Dalhy, Simon ( t o r r l i c o m ~ n g Contesting ) an Essent~,ll (hncept: Reading the Dilcrnmas In Contemporary Security Discourse. In (:ritrcal Security Studies: Concepts and Casrs, e d ~ t c d hy Krith I < ~ , I L and I ~ M~chaelC. Will~,~ms. Minneapolk: University o f Minnesota I'ress. David, Steven ( 199 I ) E x p h i n ~ n gT h ~ r dWorld Alignment. World Politrcs 433233-256. DeNardo, J,~mes( 1995) T h c Amiltcirr Striztegrst: Intrrit~ivDctcvwnce and the P o l i t ~ so f tl~cz e: Un~vers~ry I'rrss. N~tclenrArms Rare. < : a ~ n h r ~ d g(:ambridge Ikudney. Danlel (1990) The ( h s e Agmnst [.inking Environnienta1 Ikgradation and National Security. M~lle~r~lilorr 1 Y:46 1-1 76. Ilewitt, David ( 1 994) Common, C:omprehrns~veand (:ooperCltive Security. The Pizcific K ~ v i e ~ c , 7:l-15. Lhrff, Robert H (1994) A C:<)~nnientary on Securrty Studies for the 1'990s as a Model Core Curriculum. Irrtc~r~zatrorrd Strtdies hrotes 1 9 2 - . 1 I. Iloty, Roxanne ( 1993) Forelgn Policy as Social Construct~on: A Post-positivist Amlysis of U.S. Counterins~~rgenq Pol~cyin the Phdippines. Inter~tntiomilStudies Quarterly 37297-320. Elman, Chlin atid Miriam Fenciius Elman ( 1995) Correspondence: History vs. Neo-rcnli\m: A Second 1.ook. l~~trrnntioirirl Sccur~ty20: 182-1 95. Fierke, Karen (Forthcoming) Changing Worlds of Secur~ty. In Critical Securit)~St~ldrps: . C o ~ z ~ c p ~t st r dC~zses,edited by Kelt11 Krausc and .Mich,lel C. W ~ l l i a ~ n sMinneapolis: University ot Minncsor,i I'res\. <;addis, l o h n L e w s ( 1 9 8 2 ) .Strirtcyc,s of ( h r t a ~ i i m r n t New . Yo]-k: Oxford University Press. (ht, A u r ( 1989) '/-he Ori,y~rsof Mil~trlryThoright. Ouford: Oxford Un~vercityPress. Gat, A.ur (1992) T h e L)c~~,clopnrrwt o f M111tirryThorlght: T h c N ~ ~ z e t e e n tCentury h Oxford: (:larendon Pres.;. <;eertz, Clifford ( 1973) T h e Irrterprrttrtro~z of Cultrtrrs. New York: Basic Books. <;iddens, Anthony ( 1 9 8 7 ) T l ~ eNatmn-State atzd \ ' ~ o h ~ - c 1.0s . hngeles: University of California I'ress. Gizewskl, Peter and Thomas Homer-D~xon( 1995) UrOan Griru& and Vtolence: Will the Putttrt, Resr~nblrthr I'i~st?Project on Environment, PopuLltion and Security, University of Toronto. Gleick, I'eter H. (1993) Water ,tnd Conflict: Fresh Water Reuources m d lntcrnatlonal Security. Interrzat~onnl.%wirity 1 8:79-1 12. Grant, Rebecca ( 1992) The Quagmire of Gender and Internation,il Security. In Gendered States, editcd hy V . S p k e Peterwn, pp. 83-97. Boulder: Lynne Kcinner Publishers. Gray, Colin (1992) New D~rectionsfor Strategic Studies? H o w Can Theory Help I'racrice. Secrtrity Strdics I :6 10-6.35. Gray, Colin ( 1995) Villans, V~rttnzsm d Sheriffs: Scc~rrrtyStttd~esand Security for an Inter- War Period. Hull: University of Hull Press. G r ~ c c o ,Joseph (1988) Anr~rchyarid the limits of C:ooper,1tion: A Realist Crirlque of the Newest 1.iberal Institi~tional~sn~. l~~ternntronal C)rganrztrtrorr 42:48.5-507. Haftendorn, Helga (1991) The Security Puzzle: Theory-Building and Discipline-Building in International Security. Intrrn~rt~on~zl Studies Qirizrterly .3.5:3-17. Hall, Rodney Bruce and Friedrich Krarochw~l( 1 993) Med~ev'll Tiles: Neo-Realist "Science" and the Abuse o f History. lnternatro~~nl Organization 47:479-500. H e i s b o ~ ~ r gFranqois , (199 1 ) Populatio~i Movements in a Post-Cold War Europe. S u r ~ ~ i v a l 3 3 3 1-43. Hollis, M a r t ~ nand Steve Smith ( 199 1 ) Explaining and Understanding International Relations. Oxford: Oxtord University Press.
162
Widening Security
Homer-Dixon, Thomas (1991) On the Threshold: Environmental Changes as Causes of Acute Conflict. International Security 16:76-116. Homer-Dixon, Thomas (1994) Environmental Scarcities and Violent Conflict: Evidence from Cases. lnternational Security 19:5-4O. Hopf, Ted (1991) Polarity, the Offense-Defense Balance, and War. American Political Science Review 85:475-493. Howard, Philip and Thomas Homer-Dixon (1995) Environmental Scarcity and Violent Conflict: The Case of Chiapas, Mexico. Project on Environment, Population and Security, University of Toronto. Huysmans, Jef (1995) Migrants as a Security Problem: Dangers of "Securitizing" Societal Issues. In Migration and European Integration, edited by Robert Miles and Dietrich Thranhardt, pp. 53-72. London: Pinter Publishers. Jervis, Robert, Richard Ned Lebow, and Janice Gross Stein, with contributions by Patrick M. Morgan and Jack L. Snyder (1985) Psychology and Deterrence. Baltimore: Johns Hopkins University Press. Kaufman, Robert (1992) To Balance or to Bandwagon? Alignment Decisions in 1930s Europe. Security Studies 1:417-447. Kaufmann, Chaim (1996) Possible and Impossible Solutions to Ethnic Civil Wars. International Security 20:136-175. Keohane, Robert 0 . and Lisa L. Martin (1995) The Promise of Institutionalist Theory. International Security 20:39-51. Kier, Elizabeth (1995) Culture and Military Doctrine: France between the Wars. International Security 1Y:65-93. King, Gary, Robert 0 . Keohane and Sidney Verba (1994) Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton: Princeton University Press. Klein, Bradley (1990)How the West Was Won: Representational Politics of NATO. lnternational Studies Quarterly 34:311-325. Kolodziej, Edward (1992a) Renaissance In Security Studies? Caveat Lector! International Studies Quarterly 36:421-438. Kolodziej, Edward (1992b) What Is Security and Security Studies? Lessons from the Cold War. Arms Control 13:l-31. Kratochwil, Friedrich (1993) The Embarrassment of Changes: Neo-Realism as the Science of Realpolitik without Politics. Review of lnternational Studies 19:63-80. Kupchan, Charles and Clifford Kupchan (1991) Concerts, Collective Security, and the Future of Europe. International Security 16:114-161. Kupchan, Charles and Clifford Kupchan (1995) The Promise of Collective Security. lnternational Security 20:52-61. Labs, Eric (1992) Do Weak States Bandwagon? Security Studies 1:383416. Lapid, Yosef and Friedrich Kratochwil (1996) Revisiting the "National": Toward an Identity Agenda in Neorealism? In The Return of Culture and Identity in IR Theory, edited by Yosef Lapid and Friedrich Kratochwil, pp. 105-126. Boulder: Lynne Reinner Publishers. Larabee, Steven F (1992)Down and Out in Warsaw and Budapest: Eastern Europe and East-West Migration. International Security 165-33. Leffler, Melvyn P (1992) A Preponderance of Power. Stanford: Stanford University Press. Levy, Jack S (1989)The Causes of War: A Review of Theories and Evidence. In Behavior, Society and Nuclear War, vol. 1, edited by Philip Tetlock et al., pp. 209-333. New York: Oxford University Press. Levy, Marc A (1995a) Is the Environment a National Security Issue? International Security 20:35-62. Levy, Marc A (1995b) Time for a Third Wave of Environment and Security Scholarship. Environmental Change and Security Project Report 1:4446. Woodow Wilson Center, Princeton University. Lowi, Miriam R (1993) Bridging the Divide: Transboundary Resource Disputes and the Case of West Bank Water. International Security 18:113-138. Luke, Timothy (1987) Methodological Individualism: The Essential Ellipsis of Rational Choice Theory. Philosophy of Social Science 17:347-348.
I
.
I
I, ,,
I
Broadening the Agenda of Security Studies
163
Luke, T ~ ~ n o t h( 1y9 8 9 ) What's Wrong with Deterrence? A Semiotic lnterpretat~onof National r t ~ ~ . ~ t ~edited ~ i z l hy J a m e s Oer Derian m d Security I'ol~cy. In I n t r ~ n i ~ t r o n ~ ~ l / I ~ ~ t eKelatrons. Michael Shapiro, pp. 207-229. Lexington, MA: Lexington Kooks. Lynn-Jones, Sean ( 1 9 9 5 ) Offense-lletense Theory and its C r i t i o . Sec~trrtyStudics 4:660-69 1. M'ltthew, Richard A ( 1995) Env~ronrnentalSecurity: Dernysr~fyingthe Concept, C l a r i t y ~ n gthe Stakes. t.:nt~~ronnzcntalC I ~ ~ z n gand r Srrttuity Project Report 1: 14-23, W o o d o w Wilson Center, Princeton Univers~ty. McSwccncy, Rill ( 1 9 9 6 ) IJrl>tiry . l n J Sccur;ry: B u ~ a n< ~ n thc d (:<,pet~l,agen Sch<)<)l.R c z ~ i c of ~~, Itzternationnl Stttdtes 22:8 1-93, Mearslieinier, J o h n ( 1 9 9 0 ) Back t o the Future: Instability in Europe after the Cold War. I n t e r n a t ~ o n ~S~~Im r i t y1 5:5-Sh. Mearshemer, John ( 19941951 T h e False Promise of International Institutions. Intern~zt~onnl Sec-ur~ty19:5-49. Mearsheimer, John ( 1 9 9 5 ) A Ilealist Reply. Interniztir~nnlSrrrtrrty 20:82-93. Mehan, Hugh, C:h,~rlesNathanson, a n d James Skelly ( 1 9 9 0 ) Nuclear Discourse In the 1980s: Ilnravellwg the Conventions of the Cold War. D~scotlrseond Society 1 :l33-16.5. Milliken, Jennifer ( 1 9 9 5 a ) Adding Oranges a n d Embargoes: A Critique of State Action in Internat~onalRelations. I',lper presented a t the ,innual meeting of the British I n t e r n a t i ~ n ~ i l Studies Associ,itmn. S o ~ ~ t h a n i p t o nDecember , 18-20. Milliken, Jennifer (199Sb) Identity and fntervent~on:Reconstructing the West in Korea a n d the Balkans. Paper presented a t the SSRC project rneet~ngo n "Culture a n d the Production of Insecur~ty." Minneapoli\, October 26-28. M~lner,Helen ( 1 9 9 3 ) The Assumption of Anarchy in International Relations Theory: A Critque. In Nrorealijnt and Ncol~hcralisnz: The Contenzporory I l c l ~ t c ~edited , by h v i d Raldwin, pp. 143-169. New York: C o l ~ ~ m b University ia I'ress. Mischc, Patricia ( 1 9 8 9 ) Ecolog~c,ll Security a n d the Need t o l<econceptualize Sovereignty. Alternatit~es 14:389-427. M o r a n , Tlieociore ( 199019 l ) l n t e r n a t ~ o n a lEconomics and N,ltional Security. Foreign Affirm 69:74-90. Mutimer, David (Forthcoming) R e ~ m a g i n i n gSecurity: 'The Metaphors of Proliferat~on.In (;ritrc~ilSecttuity Studws, edited by Keith Krause ,lrrd hl~cliaelC. Williams. M~nncapolis: Un~versiryof M ~ n n e s o t aI'ress. Myers, Nornictn ( 1 9 9 3 ) U l t n m t e Semrity. New York: Norton. N'ithanson, Ch'lrles ( 1 9 8 8 ) T h e S o c ~ a lConstruction o t t h e Soviet Threat: A Study in the Pol~ticsof Representation. Altrrnnt~tws 13:443-48.3. Neufeld, M a r k ( 1993a) Interpret,~tionand the "Science" of Intcrn,ltional Relations. R c ~ w r co~f Intcrnnt~on'zlStardics 19:.39-62. Neufeld, M a r k ( 1993b) Ketlex~vityand International K e l a t ~ o n \'I'heory. Mdlcnnnnn 22:j.i-76. ) Identity Formation: Selt a i d Other in International Relations. Neumann, lver ( 1 9 9 6 ~Collective Ertropean lonrnal of Intc~rnat10ni71KeLztrons 2: 139-1 74. N e u n i a ~ i n ,lver ( 1996h) RLISSIJa\ Europe's Other. P,lper presented a t the Second Pan-Furopc,ln Conterence o n I ~ i t e r n a t ~ o n uKelarions. l Paris, September I .3-16. Neumann, lver a n d J e n n ~ f e rWelsh ( 1991 ) T h e O t h e r in European Self-identificat~o~i. Ke~~icw, of Intrmi7tioml Stridir>s 17:327-,348. Nye, Joseph a n d Sean L.ynn-\ones ( 1 9 8 8 ) Intert~arional Sccur~ry Studies: A Report of a ( h f e r e n c e on the State ot the Field. lnt~u11~2tionill , S c c ~ t r ~12:s-27. t~' Ordeshook, Peter ( 1986) C;mw 7hrorj~mztf Politicirl 7'heory. C,lmtxkige: Cambridge linlversity Press. O'Tuathail, Gearoid (199.3) ,lapan as Threat: G e o - E c o n o m ~ cI)iscourses o n the IJSA-Japan Relationship in US C i v ~ lSociety, 1987-9 1. In T / J PP o l i f ~ ( - ~Geography z/ o f the Nezo W'orki Order, edited h! C o l ~ nWilliams. pp. 181-209. 1-ondon: Relhaven I'ress. I'alme C o m n i ~ s s i o n(Independent Corumission o n D~s.lrmamenta n d Security Issue\). ( 1 9 8 2 ) (:onzmon Sec-urrty: A Blnrprint for Sttrlv~~ill. N e w York: Simon a n d Schuster. Percivol, Valerie a n d Tliomns H o m e r - D ~ x o n (1995,i) E r ~ ~ ~ ~ r o n ~ n eScarcity t z t a l anti Violent Ccmflict: T/JL.C'lse of R ~ i w ~ t iProlect ~ r . on Environment, PopulLlrion and Security, I J n ~ v e r s ~ t y o f 'Ibronto.
164
Widening Security
Percival, Valerie and Thomas Homer-Dixon (1995b) Environmental Scarcity and Violent Conflict: The Case of South Africa. Project on Environment, Population and Security, University of Toronto. Posen, Barry R (1984) The Sources of Military Doctrine: France, Britain and Germany between the World Wars. Ithaca: Cornell University Press. Posen, Barry R (1993a) Nationalism, the Mass Army and Military Power. International Security 18:80-124. Posen, Barry R (1993b) The Security Dilemma and Ethnic Conflict. Survival 35:27-47. Powell, Robert (1993) Guns, Butter, and Anarchy. American Political Science Review 87:115-131. Ringmar, Eric (1995) The Relevance of International Law: A Hegelian Interpretation of a Peculiar Seventeenth-Century Preoccupation. Review of International Studies 21:87-104. Roberts, Brad (1990) Human Rights and International Security. Washington Quarterly 13:65-75. Rosecrance, Richard and Arthur A. Stein, eds. (1993) The Domestic Bases of Grand Strategy. Ithaca: Cornell University Press. Rubenstein, Robert A (1988) Cultural Analysis and International Security. Alternatives 13:529-542. Sagan, Scott (1986) 1914 Revisited. International Security 11:151-175. Sagan, Scott (1994) The Perils of Proliferation. International Security 19:66-107. Schroeder, Paul (1994) Historical Reality vs. Neorealist Theory. International Security 19:108-148. Schroeder, Paul (1995) Correspondence: History vs. Neo-realism: A Second Look. lnternational Security 20:193-195. Schultz, Richard, Roy Godson and Ted Greenwood, eds. (1993) Security Studies for the 1990s. New York: Brassey's. Schweller, Randall (1994) Bandwagoning for Profit. lnternational Security 19:72-107. Shaw, Martin (1993) "There is N o Such Thing as Society": Beyond Individualism and Statism in International Security Studies. Review of lnternational Studies 19:159-176. Shy, John (1986) Jomini. In Makers of Modern Strategy, edited by Peter Parer, pp. 143-185. Oxford: Clarendon Press. Smoke, Richard, ed. (1996). Perceptions of Security: Public Opinion and Expert Assessments in Europe's New Democracies. New York: Manchester University Press. Snyder, Jack (1984a) Civil-Military Relations and the Cult of the Offensive, 1914 and 1984. lnternational Security 9: 108-146. Snyder, Jack (1984b) The Ideology of the Offensive: Military Decision Making and the Disasters of 1914. Ithaca: Cornell University Press. Steinbruner, John D. (1974) The Cybernetic Theory of Decision. Princeton: Princeton University Press. Tickner, J. Ann (1992) Gender and International Relations: Feminist Perspectives on Achieving Global Security. New York: Columbia University Press. Tuchman Mathews, Jessica (1989) Redefining Security. Foreign Affairs 68:162-177. Ullman, Richard (1983) Redefining Security. International Security 8:129-153. Van Evera, Stephen (1986) Why Cooperation Failed in 1914. World Politics 38:80-117. Van Evera, Stephen (1994) Hypotheses on Nationalism and War. lnternational Securzty 185-39. Waever, Ole (1995a) Security Analysis: Conceptual Apparatus. In Environmental, Economic and Societal Security: Working Papers 10, by Barry Buzan, Ole Waever, and Jaap de Wilde, pp. 1-13. Copenhagen: Centre for Peace and Conflict Research. Waever, Ole (1995b) Securitization and Desecuritization. In On Security, edited by Ronnie Lipschutz, pp. 46-86. New York: Columbia University Press. Waever, Ole, Barry Buzan, Morton Kelstrup and Pierre Lemaitre (1993) Identity, Migration and the New Security Agenda in Europe. London: Pinter. Walker, R.B.J. (Forthcoming) The Subjects of Security. In Critical Security: Concepts and Cases, edited by Keith Krause and Michael C. Williams. Minneapolis: University of Minnesota Press.
I
1
1
I
I
Broadening the Agenda of Security Studies
165
Walt, Stephen M. (1985) A l l i ~ ~ i cFeo r ~ n ~ ~ t iand o n the Balance of World Power. Intern~ttron~rl Security 9.3-4.3. Walt, Stephen M. (19873) T l ~ C)rrgr~ts r of Alliances. Ithaca: Cornell Univers~tyPress. Walt, Stephen M. (1987b) The Search for a Science ot Straregy. Internatio~tal S ~ ~ u r r t y 12:140-165. Walt, Stephen M. ( 1991) The Rena~ssmceof Sccur~ryStudies. I~~ternntroltal Studies Quarterly 35:21 1-239. Walt, Stcphcn M . (1992) Alli~~unces.Thrc.lts . ~ n d11.S. Gr.~ncl Strategy. See-zrrity Strr
Collective Identity in a Democratic Community: The Case of NATO Thomas Risse-Kappen
The Puzzle
W
hy was it that the United States, the undisputed superpower of the early post-1945 period, found itself entangled in the North Atlantic Treaty Organization (NATO) with Western Europe only four years after the end of World War II? Why was it that a pattern of cooperation evolved in NATO that survived not only the ups and downs of the Cold War and various severe interallied conflicts - from the 1956 Suez crisis to the conflict over Euromissiles in the 1980s - but also the end of the Cold War? Why is it that NATO has emerged as the strongest among the post-Cold War security institutions - as compared to the Organization for Security and Cooperation in Europe (OSCE), the West European Union (WEU), not even to mention the EU'S Common Foreign and Security Policy (CFSP)? Traditional (realist) alliance theory1 at least has a simple answer to the first two questions: the Soviet threat. But what constituted the Soviet threat? Was it Soviet power, ideology, behavior, or all three combined? I argue in this essay that the notion of the "Soviet threat" needs to be unpacked and problematized if we want to understand what it contributed to the emergence and the endurance of NATO. I also claim that realism might provide first-cut answers to the questions above but that it is indeterminate with regard to explaining particular Western European and U.S. choices at critical junctures of the Cold War, not even to mention its aftermath. Moreover, sophisticated power-based arguments that try to account for these choices do so at the expense of parsimony. Why should they be privileged as providing the baseline story, while more elegant alternative explanations are used to add some local c ~ l o r a t i o n ? ~ I provide an account for the origins and the endurance of NATO different from the conventional wisdom. NATO and the transatlantic relationship can be better understood on the basis of republican liberalism linking domestic polities
Source: Peter J. Katzenstein (ed.), The Culture of Nutiom1 Security: Norms and Identity in World Politics (New York: Columbia University Press, 1996), pp. 357-99.
i
I[ 1
I
Collective Identity in a Democratic Community
167
systematically to the foreign policy of states.' 1,iberal democracies are likely to form "pacific federations" (Immanuel Kant) or "pluralistic security communities" (Karl W. Deutsch). Liberalism in the Kantian sense, however, needs to he distinguished from the conventional use of the term, as in neoliberal institutionalism, denoting the "cooperation under anarchy" perspective of rationalist regime analysis.4 I present a social constructivist interpretation of republican liberalism, emphasizing collective identities and norms of appropriate behavior. To illustrate my argument, 1 discuss the origins of NATO, the transatlantic interactions during two major Cold War "out-of-area" crises (the 1956 Suez crisis and the 1962 Cuban missile crisis), and the persistence of NATO after the end of the Cold War.
Theorizing about Alliances
Traditional alliance theory is firmly grounded in realist thinking. Realism, however, is indeterminate with regard to explaining the origins of, the interaction patterns in, and the endurance of NATO.
Realism and the Origins of NATO Strttctural realism contains a straightforward alliance theory.' States balance rather than bandwagon; alliances form because weak states band together against great powers in order to survive in an anarchic international system. Alliance patterns change because the international distribution of power changes. This is particularly true under multipolarity; great powers do not need allies under bipolarity. The latter structure consists of only two great powers, which are self-sufficient in terms of their ability to survive. As a result, alliances become a matter of convenience rather than necessity. It is hard to reconcile Waltzian realism with the history of NATO. The U.S. emerged from World War I1 as the undisputed superpower in the international system, enjoying a monopoly (and later superiority) with regard to the most advanced weapons systems, i.e., nuclear forces. Its gross domestic product (GDP) outweighed that of all Western European states combined, not even to mention the Soviet Union. If material capabilities are all that counts in world politics, one would have expected Western Europe to align with the Soviet Union rather than with the U.S.' But the Waltzian argument rests on some peculiar assumptions about bipolarity. While great powers may not need allies to ensure their survival, client states might become an asset in the competition between the two hegemonic rivals. After all, bipolarity means that the two great powers in the system have to cope primarily with each other. As "defensive positionalists," they are expected to be concerned about relative gains and losses vis-a-uis
168
Widening Security
each other and to compete fiercely.' The more important relative gains are, however, the more significant the acquisition of client states should become. While the loss or defection of one small ally might not be important, superpowers might fear that even small losses might set in motion a chain reaction. Thus, if we change our understanding of bipolarity only slightly, American Cold War policies of acquiring allies around the globe, i~lcludingthe Western Europeans, can be explained. In other words, structural realism can be made consistent with actual U.S. behavior during the Cold War, but the theory could also explain the opposite behavior. What about Stephen Walt's more sophisticated realism emphasizing the "balance of threat" rather than the "balance of power"?8 Does it reduce the indeterminacy of structural realism by adding more variables? Walt argues that states align against what they perceive as threats rather than against economic and military capabilities as such. States feel threatened when they face powers that combine superior capabilities with geostrategic proximity, offensive military power, and offensive ideology. One could then argue that the proximity of the Soviet landmass to Western Europe, Moscow's offensive military doctrine backed by superior conventional forces, and the aggressive communist ideology constituted the Soviet threat leading to the formation of NATO. There is no question that Western decision makers perceived a significant Soviet threat during the late 1940s and that this threat perception was causally consequential for the formation of NATO. The issue is not the threat perception, but what constituted it: Soviet power, ideology, behavior, or a combination of the three? As to Soviet power, the geographic proximity of the Soviet landmass - Walt's first indicator - could explain the Western European threat perception and the British and French attempts to lure reluctant decision . ~ it is still makers in Washington into a permanent alliance with E ~ r o p eBut unclear why the U.S. valued Western Europe so much that it decided to join NATO. The argument that the U.S. wanted to prevent Soviet control over the Eurasian rimlandlo makes sense only if we also assume that decision makers in Washington saw themselves as defensive positionalists in a fierce hegemonic rivalry rather than more relaxed Waltzian realists (see above). In this case, sophisticated realism is as inconclusive as structural realism. Moreover, the Soviet Union was not considered an offensive military threat to Western Europe during the late 1940s. Military estimates did increasingly point to Soviet military superiority in Europe, but that did not lead to the perception of an imminent attack. As John Lewis Gaddis put it, "Estimates of Moscow's intencions, whether from the Pentagon, the State Department, or the intelligence community, consistently discounted the possibility that the Russians might risk a direct military confrontation within the foreseeable future."ll Rather, the U.S. threat perception at the time focused on potential Soviet ability to psychologically blackmail war-weakened Western Europe and to destabilize these countries politically and economically. This American view of a significant Soviet threat was concerned about actual Soviet behavior in Eastern Europe and the Soviet offensive political ideology - the third of Walt's indicators. If this is indeed what constituted the Soviet threat in
I
p
Collective Identity in a Democratic Community
I69
Western eyes in the late 1940s, it can be better explained by liberal theories t h a n by even sophisticated realism (see below). At least, the t w o accounts become indistinguisl~ablea t this point. Realism a n d Cooperation Patterns in NATO Realism's indeterminacy with regard t o the origins of NATO also applies t o interaction patterns within the Western Alliance. To begin with, structural realism of the Waltzian variety has a clear expectation regarding cooperation among allies. If great powers d o not need allies under bipolarity, they also d o not need t o listen t o them. As Waltz put it, the contributions of smaller states t o alliances "are useful even in a bipolar world, but they are not indispensable. Because they are not, the policies and strategies of alliance leaders are ultimately made according t o their own calculations and interests."" If this argument holds true, one would not expect much European influence on U.S. decisions during the Cold War - particularly not in cases, such as the Cuban missile crisis, when the U S . perceived its supreme national interests at stake. I show later in this essay that this expectation proves t o be wrong. Close cooperation among the allies was the rule rather than the exception throughout the history of NATO - with regard to European security, the IJ.S.-Soviet relationship, and "out-of-area" cases. T h e power asymmetry within N A T O did not translate into American dominance. Kather, the European allies managed t o influence U.S. foreign policy significantly even in cases when the latter considered its supreme national interests t o be a t stake.'' More sophisticated realists, however, should not I,e too surprised hy these findings. If we assume that decision makers in Washington needed allies to fight the Cold War, we would expect some degree of cooperation within the Western Alliance, including E~lropeaninfluence o n U.S. policies. Allies who need each other t o balance against a perceived threat are expected t o cooperate with each other. linfortunately, this assun~ptionis demonstrably \vrong. Cooperation among allies is hy n o means assured. Allies are as likely to fight each other as they are t o fight non-allies - except for democratic alliance^.'^ Thus we need additional assumptions about the conditions under \vhich nations in alliances are likely t o cooperate. According t o realist bargaining theory, for example, we would expect a higher degree of interallied cooperation, 0 0
the h ~ g h e rthe percaved level of extern'll thrc'it the more ,lll~esfe'ir t h ~ tth e ~ rpartners m ~ g h t,ihandon them o r detect, part~cularlyIn crlsi5 sltuatlons the more ~ s \ ~ ~ e - s p e cpower hc resources are L I In ~mterall~edb , ~ r g , l ~ n lng sltuationc."
At this point, sophisticated realism loses much of its parsimony. Evaluating these propositions against alternative claims r e q ~ ~ i r edetailed s process-tracing of interallied bargaining. We cannot simply assume a realist bargaining process when we find outcomes consistent with one specific version of realist theory.
170
Widening Security Realism a n d t h e Endurance of NATO a f t e r t h e Cold War
The indeterminacy of realism also applies when we start using the theory to predict the survivability of NATO after the Cold War. Structural realists in the Waltzian tradition should expect NATO to wither away with the end of the Cold War. If great powers do not need allies under bipolarity for their survival, this should be all the more true when the hegemonic rivalry ceases to dominate world politics. In Waltz's own words, "NATO is a disappearing thing. It is a question of how long it is going to remain as a significant institution even though its name may linger on."I6 In the absence of indicators of what "lingering on" means, it is hard to evaluate the proposition. I argue later in this essay that NATO is alive and well so far, at least as compared to other security institutions in Europe. Sophisticated realism and "balance-of-threat" arguments are indeterminate with regard to the future of NATO. On the one hand, one could argue that the Western Alliance should gradually disintegrate as a result of the Soviet withdrawal from Eastern Europe and the drastically decreased military threat. On the other hand, the Russian landmass might still constitute a residual risk to Western Europe, thus necessitating a hedge against a potential reemergence of the threat." In any case, the Western offer for a "partnership for peace" to Russia is difficult to account for even by sophisticated realism. In sum, a closer look at realism as the dominant alliance theory reveals its indeterminacy with regard to the origins of, the interaction patterns in, and the endurance of NATO. In retrospect, almost every single choice of states can be accommodated somehow by realist thinking. As a Waltzian realist, the U.S. could have concluded that the direct confrontation with the USSR was all that mattered, while the fate of the Western Europeans would not alter the global balance of power. As a more sophisticated realist, the U.S. would have decided - as it actually did - that the fate of the Eurasian rim was geostrategically too significant to leave the Western Europeans alone. If decision makers in Washington listened to their allies during the Cuban missile crisis, we can invoke realist arguments about reputation and the need to preserve the alliance during crises. Had the U.S. not listened to the Western Europeans during the crisis, one could have argued that superpowers do not need to worry about their allies when they perceive that their immediate survival is at stake. If NATO survives the end of the Cold War, it is "lingering on" as a hedge; if it disappears, the threat has withered away. As others have noted before, realism is not especially helpful in explaining particular foreign policy choices.18 I now look at a liberal account emphasizing a community among democracies, collective identity, and alliance norms. Democratic Allies in a Pluralistic Security Community: A Liberal Constructivist Approach
The U.S. had quite some latitude as to how it defined its interests in Europe. Thus we need to "look more closely at this particular hegemon" in order to ~ politics "determine why this particular ... agenda was p ~ r s u e d . " 'Domestic
I'
1 1 ;
Collective Identity in a Democratic Community
1 71
and structure\ have to be cons~dered,and the realm of llberal theorzes of ~nternationalrelat~ons1s to be entered. To a v o ~ dconfuswn, part~cularlyw ~ t hwhat IS \ometimes called neollberal ~nstztut~onal~sm, I rewrve the term lzberal theories of ~nternationalrelattons for approaches agreemg that"' individuals acting in a social context - whether governments, domestic society, o r international institutions; 2. the interests and preferences of national governments have to be analyzed as a result of domestic structures and coalition-building processes responding to social demands as well as t o external factors such as the (material and social) structure of the international system; 3. ideas - values, norms, and knowledge - are causally consequential in international relations, particularly with regard to state interests, preferences, and choices; 4. international institutions form the social structure of international politics presenting constraints and opportunities to actors. 1 . thc fundamental agents in international p l i t i c s are not states but
Immanuel Kant's argumentx that democratic institutions characterized by the rule of law, the respect for human rights, the nonviolent and cornpromiseoriented resolution of domestic conflicts, and participatory opportunities for the citizens are a necessary condition for peace has been empirically suhstantiated. Most scholars agree that liberal democracies rarely fight each other, even though they are not peaceful toward autocratic regimes." The reasons for these two findings are less clear, since explanations focusing solely on democratic domestic structures miss the point that liberal states are not inherently peaceful. Rather, we need theoretical accounts that link the domestic level to interactions on the international level." Two domestic-level explanations prevail in the literature.'"he first emphasizes institutional constraints. Democracies are characterized by an elaborate set of checks and balances - between the executive and the legislature, between the political system and interest groups, public opinion, and so o n . It is then argued that the conlplexity of the decision-making process makes it unlikely that leaders will readily use military force unless they are confident of gathering enough domestic support for a low-cost war. This explanation is theoretically unconvincing. Why is it that the complexity of democratic institutions seems to matter less when liberal states are faced with authoritarian adversaries? The second explanation focuses on the norms governing democratic decision-making processes and establishing the nonviolent and compromiseoriented resolution of political conflicts, the equality of the citizens, majority rule, tolerance for dissent, and the rights of minorities. These norms are firmly embedded in the political culture of liberal states and shape the identity of political actors through processes of socialization, communication, and enactment. This norm- and identity-based account appears t o offer a
172
Widening Security
better understanding of why it is that democratic governments refrain from violence when dealing with fellow democracies. But its exclusive focus on the domestic level still does not show why such restraints disappear when liberal governments deal with autocratic regimes. The norm- and identity-based explanation nevertheless can be easily amended and linked to the level of international interactions. Collectively held identities not only define who "we" are, but they also delineate the boundaries against "them," the "other."25 Identities then prescribe norms of appropriate behavior toward those perceived as part of "us" as we11 as toward the "other." There is no reason that this argument should not equally apply to the domestic and the international realm. A sociological interpretation of a liberal theory of international relations then claims that actors' domestic identities are crucial for their perceptions of one another in the international realm. As Michael Doyle put it, Domestically just republics, which rest on consent, then presume foreign republics also to be consensual, just, and therefore deserving of accommodation. ... At the same time, liberal states assume that non-liberal states, which do not rest on free consent, are not just. Because non-liberal governments are in a state of aggression with their own people, their foreign relations become for liberal governments deeply suspect. In short, fellow liberals benefit from a presumption of amity; nonliberals suffer from a presumption of enmity.26 Threat perceptions do not emerge from a quasi-objective international power structure, but actors infer external behavior from the values and norms governing the domestic political processes that shape the identities of their partners in the international system. Thus, France and Britain did not perceive the superior American power at the end of World War I1 as threatening, because they considered the U.S. as part of "us"; Soviet power, however, became threatening precisely because Moscow's domestic order identified the Soviet Union as "the other." The collective identity of actors in democratic systems defines both the "in-group" of friends and the "out-group7' of potential foes. Liberal theory posits that the realist world of anarchy reigns in relations between democratic and authoritarian systems, while "democratic peace" prevails among liberal systems. But liberal theory does not suggest that democracies live in perpetual harmony with each other or do not face cooperation problems requiring institutional arrangements. Kant's "pacific federation" (foedus pacificurn) does not fall from heaven, but has to be "formally instituted" (ge~tiftet).~' Since the security dilemmaZs is almost absent among democracies, they face fewer obstacles to creating cooperative security institutions. Actors of democratic states "know" through the process of social identification described above that they are unlikely to fight each other in the future. They share liberal values pertaining to political life and are likely to form what Deutsch called a "pluralistic security community," leading to mutual responsiveness in
I
t
K
Collective Identity in a Democratic Community
173
terms of "mutual sympathy and loyalties; of 'we-feeling,' trust, and consideration; of at least partial identification in terms of self-images and interests; of the ability to predict each other's behavior and ability to act in accordance with that prediction. " I " While Deutsch's notion of pluralistic security colnmunities is not confined to democracies, it is unlikely that a similar sense of mutual responsiveness could emerge among autocratic leaders. There is nothing in their values that would prescribe mutual sympathy, trust, and consideration. Rather, cooperation among nondemocracies is likely to emerge out of narrowly defined self-interests. It should remain fragile, and the "cooperation under anarchy" perspective to international relations should apply."' If democracies are likely to overcome obstacles against international cooperation and to enter institutional arrangements for specific purposes, what about the rules and decision-making procedures of these institutions? One would expect the regulative norms"' of these institutions to reflect the constitutive norms that shape the collective identity of the security community. Democracies are then likely to form detnocrL~tirinternational institutions whose rules and procedures are aimed toward consensual and compromiseoriented decision-making respecting the equality of the participants. The norms governing the domestic decision-making processes of liberal systems are expected to regulate their interactions in international institutions. Democracies externalize their internal norms when cooperating with each other. Power asymmetries will be mediated by norms of democratic decision-making among equals emphasizing persuasion, compromise, and the non-use of force or coercive power. Nornis of regular consultation, of joint consensus-building, and of nonhierarchy legitimize and enable a habit of mutual influence on each other's preferences and behaviors. These norms serve as key obligations translating the domestic decision-making rules of democracies to the international arena. This is not to suggest that consultation norms exist only in alliances among democracies. Kut consultation means "codetennination" when democracies are involved. But how are these regulative norms expected to affect interaction processes among democratic allies? First, decision makers either anticipate allied demands or directly consult their partners before preferences are formed and conclusions are reached. Actors then make a discernible effort to define their preferences in a way that is compatible with the allied views and to acconimodate allied demands. Second, norms serve as collective understandings of appropriate behavior, which can be invoked by the participants in a discourse to justify their arguments. Consultation norms affect the reasoning process by which decision makers identify their preferences and choices. Actors are expected to invoke the norms to back up their respective views and to give weight to their arguments. Third, the cooperation rules and procedures are also expected to influence the hrrrgaining processes among the allies. This is fairly ohvious with regard to consultation. In addition, democratic decision-making procedures
174
Widening Security
deemphasize the use of material power resources in intra-allied bargaining processes, thereby delegitimating to play out one's superior military or economic power in intra-alliance bargaining. Both the pluralistic security community and specific consultation norms work against the use of coercive power in bargaining processes among democracies. But norms can be violated. Norms compliance in human interactions is to be expected only in a probabilistic sense. Instances in which actors violate specific rules and obligations are of particular interest to the analysis. If norms regulate the interaction but are breached, one would expect peculiar behavior by both the violator and the victim, such as excuses, justifications, or compensatory action.32 Finally, the allied community of values does not exclude democracies' driving hard bargains when dealing with each other in conflictual situations. While using material power resources to strengthen one's bargaining position is considered illegitimate among democracies, references to domestic pressures and constraints are likely to occur frequently. After all, liberal systems have in common that their leaders are constrained by the complexities of democratic political institutions. Since these procedures form the core of the value community, it should be appropriate to play "two-level games" using domestic pressures - small domestic "win-sets," in Robert Putnam's terms - to increase one's bargaining le~erage.~" The argument presented above assumes that the values and norms embedded in the political culture of liberal democracies constitute the collective identity of a security community among democracies and that the regulative norms of the community institutions reflect these constitutive norms. This claim is subject to two objection^:^^
1. Why is it that domestic orders, norms, and political cultures shape the identities of actors in the international realm? Why not economic orders, such as capitalism? Why not geographic concepts, such as "the West," the "North Atlantic area," and the like? Why not gender and race, such as "white males" ? 2. Democratic identities appear to be constant and acontextual rather than historically contingent. Is there never any change as to what constitutes an identity as "liberal democrat"? As to the first point, it is, of course, trivial that actors hold multiple identities. Which of these or which combination dominates their interests, perceptions, and behavior in a given area of social interaction needs to be examined through empirical analysis and cannot be decided beforehand. I submit, however, that values and norms pertaining to questions of governance are likely to shape identities in the realm of the political - be it domestic or international. Moreover, such notions as "the West" do not contradict the argument here but seem to represent a specific enculturation of a broader liberal worldview. The same holds true for identities as "capitalists," particularly if juxtaposed against "communist order." The notion of the "free world," which Western policy
I< * r
i
Collective Identity in a Democratic Community
175
makers used frequently during the Cold War to refer to their collective identity and to demarcate the boundaries against "Communism," encompassed liberal values pertaining to both the political and the economic orders. As t o the second point, and unlike several versions of neoliberalism, a sociological interpretation of the liberal argument posits historical contingency and contextuality. The zone of the "democratic peace" in the Northern klemisphere did n o t fall from heavcn but was creatcd through processes of social interaction and learning." The emergence of NATO is part a n d parcel of that story. Moreover, the norms of the democratic peace can in principle be unlearned, since collective identities might change over time. But t o argue that the social structure of international relations is somehow more malleable a n d subject t o change than material structures represents a misunderstanding of social c o n s t r ~ ~ c t i v i s m . ' ~ The argument then can be summarized as follows: Democracies rarely fight each other: they perceive each other as peaceful. They perceive each other as peaceful because of the democratic norms governing their domestic decisionmaking processes. For the same reason, they form pluralistic security cornmunities of shared values. Because they perceive each other as peaceful and express a sense of community, they are likely t o overcome obstacles against international cooperation and to form international institutions such as alliances. The norms regulating interactions in such institutions are expected to reflect the shared democratic values and to resemble the don~esticdecision-making norms. In the following sections, I illustrate the argument with regard t o the formation of NATO, t w o cases of inter-allied conflict during Cold War crises, and the future of the transatlantic relationship in the post-Cold War environment.
A Liberal Interpretation of the Transatlantic Security Community
The North Atlantic Treaty Organization represents an institutionalization of the security community to respond to a specific threat. While the ~ e r c e i v e d Soviet threat strengthened the sense of common purpose among the allies, it did not create the community in the first place.'- NATO was preceded by the wartime alliance of the U.S., Great Britain, and France, which also collaborated closely to create various postwar regimes in the economic area. I'articularly the British worked hard to ensure that the U.S. did not withdraw from Europe, as it had after World War I, but remained permanently involved in European affairs.'" While the European threat perceptions a t the time might be explained on sophisticated realist grounds using Stephen Walt's "balance-of-threat" argument, U S . behavior as the undisputed hegemon o f the immediate post-World War I1 era is more difficult to understand. The U.S. faced several choices, each of which was represented in the administration as well as in the American
176
Widening Security
public. President Roosevelt, for example, tried to preserve the wartime alliance with the Soviet Union until his death and to realize a collective security order guaranteed by the "four policemen" (the U.S., the USSR, Great Britain, and China), a concept that he had first proposed in 1941. His successor, President Truman, continued on this path during his first months in office. After Truman had changed his mind, Secretary of Commerce Henry Wallace still advocated a modus vivendi with the Soviet Union and the need to respect a Soviet sphere of influence in Europe until he was removed from office in September 1946. In the U.S. public, Walter Lippmann became the leading advocate of that argument when responding to George F. Kennan's containment strategy. Early supporters of a tougher policy toward Moscow included the U.S. ambassador to Moscow, Averell Harriman, Kennan, and particularly Secretary of the Navy James Forrestal, while Secretary of State George Marshall steered a middle course until about 1948. How is it to be explained that this latter argument carried the day and that particularly President Truman became a firm advocate of a policy of c ~ n t a i n m e n t ? ~ ~ An obvious answer pertains, of course, to Soviet behavior. Western leaders, including Roosevelt, would have accepted a Soviet sphere of influence in Europe and were prepared to accommodate its security concerns - see Churchill's famous trip to Moscow in October 1944 and the Soviet-British "percentages agreement" on Southeast Europe.40 But when the Red Army moved into Eastern Europe in 1944, Moscow immediately started to suppress potential political opposition in Romania, Bulgaria, Hungary, and, above all, Poland. Stalin broke what Roosevelt considered a Soviet commitment to free elections negotiated at Yalta, provoking the president to complain, "We can't do business with Stalin. He has broken every one of the promises he made at Yalta."41 The Truman administration, which had supported friendly relations with the Soviet Union until December 1945, began to change its position in early 1946, in conjunction with the Soviet reluctance to carry out the Moscow agreements to include non-Communists in the governments of Romania and Bulgaria.42These early disputes focused on domestic order issues in Sovietcontrolled Eastern Europe. Had Stalin "Finlandized" rather than "Sovietized" Eastern Europe, the Cold War could have been avoided. In the perception of U.S. decision makers, the Soviet threat emerged as a threat to the domestic order of Western Europe, whose economies were devastated by the war. As the CIA concluded in mid-1947, "the greatest danger to the security of the United States is the possible economic collapse in Western Europe and the consequent accession to power of Communist elements."43 U.S. administrations from Roosevelt to Truman considered Western Europe vital to American security interests, both for historical reasons (after all, two world wars had been fought over Western Europe) and because it was viewed as a cornerstone of the liberal - political and economic - world order that both Roosevelt and Truman envisaged.44But it was not Soviet power as such that constituted a threat to these interests; rather it was the Soviet domestic order, combined
ki
, <,,;;r):~
Collective Identity in a Democratic Community
177
w ~ t hSov~etbehawor In Eastern Europe, i n d ~ c a t ~ nag wlll~ngnessto expand Communism beyond the USSR. In other words, Sov~etpower became threatenmg as a tool to expand the Sowet domest~corder. Moreover, the Sov~et U n ~ o nalso refused to loin the Bretton Woods Instltut~onsof the World Bank and the Internat~onalMonetary Fund, thus endlng hopes that ~tm ~ g h partlct lpate In the postwar ~nternat~onal economlc order. This is not to suggest that the Soviet Union was wlely responsible tor of domest~cand Interthe orlglns of the Cold W x . Rather, d ~ f t e r ~ nv1ew5 g n a t ~ o n a lorder clashed after World War 11. Moscow refused to join the Amer~c'ln l~bcralproject b x e d upon an open mternat~onalorder and free trade, free-market econom~es,and l~beralsystems of governance." Roosevelt and Truman t r ~ e dto accommodate the Sov~etvlew at f m t but then gradually abandoned that idea In favor of tougher p o h e s . Stalm's behavior 111 bastern Europe and elsewhere - Irrespective of whether tt was mot~vatedby genulne securttv concerns or aggressive ~ n t e n t ~ o n-s re~ntorcedthe emergmg perceptlons of thre'lt, both In the publ~cand In the ,ldrn~n~strat~on. Over , i g a ~ n ~ t those promotmg a modus vivend~ between the US. and the Sowet Umon, Stal~nhelped another worldv~ewto carry the d , ~ )111 Washmgton, one t h ~ t interpreted the post-World War 11 sltuatlon In terms of a long-last~ngstr'lteglc r~valrybetween the US.and the USSR - the Cold W x . The emergmg confl~ctwas ~ncreas~ngly f r a n e d In Man~chaeanterm\. A\ Anders Steph,~nsonput it, [The Cold War] was launched in fiercely ideological terms as an invn 51011 .' or delegitirnation of the Other's social order, a demonology combined of course with a mythology of the everlasting virtues of one's own domain. This is not surprising, considering the universalism of the respective ideologies."" L
ot Stal~n'sbehav~ortr,lnsformed the Sov~etU n ~ o n The hber,ll ~nterpret~tlon from a wartlme all). to an opponent, the "other":
... N a z ~ ,C o m m u n ~ s tor There ~ s n ' tany d~fterenceIn t o t a l ~ t a r ~ astates. n F a w s t , or Franco, or anyth~ngelse -they are all a l ~ k e . The 5tronger the volce of a people 111 the fortnulat~ono f nat~onal p o l ~ c ~ ethe s , less the danger of aggresston. When all governments d e r ~ v e t h e ~ rlust powers from the consent of the governed, there wdl be enduring peace.4The varlous declarat~onsof the Cold War - Kennan's "long telegram," and , the 1947 Church~ll's1946 " ~ r o ncurtam" speech In Fulton, M ~ s s o u r ~ Truman doctr~ne- ,111 m'lde the same connect~onbetween a lzberal mterpretatlon ot the \ o a ~ e tthreat sternrnmg from ~ t "total~tar~an" s domest~ccharacter, on the one hand, m d a rcallst balance of power ("conta~nment")strategy "X" a r t d e connected to counter ~ t Kennan's . "long telegram" and h ~ later \ s courx two I~beralInterpretations of the Sov~etthreat to promote h ~ preterred
178
Widening Security
of action.48He portrayed the Soviet Union as combining an ancient autocratic tradition that was deeply suspicious of its neighbors with a Communist ideology. Of course, cooperation was not an option with an opponent whose aggressiveness resulted from a historically derived sense of insecurity together with ideological aspirations that were ultimately caused by the fear of authoritarian rulers that they would be overthrown by their own people. To what extent were these interpretations of the Soviet threat merely justifying rhetoric to gather public support for U.S. foreign policy rather than genuine concerns of decision makers? First, as argued above, there was nothing inevitable about the emergence of the Cold War, as far as U.S. decision makers were concerned. Soviet behavior, U.S. responses, the clash of worldviews, and mutual threat perceptions reinforced each other to create the East-West conflict. Second, the historical record appears to indicate that Harry Truman genuinely changed his mind about the extent to which one could cooperate with the Soviet Union during his first year in office.49Third, an exaggerated rhetoric constructing the Soviet Union as the "empire of the evil" (Reagan)created the Cold War consensus in the U.S., since public opinion and Congress at the time were reluctant to accept new commitments overseas shortly after World War I1 had been won. The Truman doctrine, for example, deliberately oversold the issue of granting financial aid to Greece and Turkey as a fight between "freedom" and "totalitarianism" to get the package through Congress. But this point only confirms the power of the liberal argument in creating winning domestic coalitions in the U.S. Even after the perception of a Soviet threat had won out in Washington, the U.S. still faced choices. Joining NATO was only one of them. It could have fought the Soviet Union on its own in a bipolar confrontation. Another option was to negotiate bilateral security arrangements with selected Western European states, as the Soviet Union did with Eastern Europe between 1945 and 1948, and as British Foreign Secretary Ernest Bevin suggested in 1948.50 Instead, the U.S. chose to entangle itself in a multilateral alliance based on the indivisibility of security, diffuse reciprocity, and democratic decision-making procedures? Since it is impossible to present a detailed history of the North Atlantic Treaty in a few pages, some general remarks must suffice.52 First, NATO came about against the background of the emerging sense of threat in both Western Europe and the U.S. Soviet behavior in Eastern Europe and in its German occupation zone might have been motivated by Moscow's own threat perceptions and by an attempt to prevent a Western anti-Soviet bloc. But Stalin's behavior once again proved counterproductive and served to fuel Western threat perception. The Prague Communist "coup," for example, occurred precisely when negotiations for the Brussels Treaty creating the West European Union were under way and led to their speedy conclusion. The events in Czechoslovakia, as well as Soviet pressure against Norway, convinced U.S. Secretary of State Marshall that a formal alliance between the U.S. and Western Europe was necessary. The Soviet blockade of Berlin's Western sectors in 1948 not only "created" Berlin as the symbol of freedom
i I
I 11
Collective Identity in a Democratic Community
179
and democracy - i.e., the values for which the Cold War was fought - but also proved crucial to move the U.S. closer to a firm commitment to European security. Second, major initiatives toward the formation of a North Atlantic Alliance originated in Europe, mainly in the British Foreign Office." A close transgovernmental coalition of like-minded U.S., Rritish, Canadian, and later o n - Frcnch senior officials worked hard to transform t h e growing sensc of threat into a firm U.S. commitment toward European security. The negotiations leading to the North Atlantic Treaty resenihled a "three-level" game involving U.S. domestic politics, transgovernmental consensus-building, and intergovernmental bargains across the Atlantic. As to the last, probahly the most important deal concerned Germany: the French would support U.S. policies toward the creation of a West German state in exchange for an American security commitment to Europe in terms of "dual containment" (protection against the Soviet Union and Germany)." Third, a multilateral institution had advantages over alternative options, since it enhanced the legitimacy of American leadership by giving the Western Europeans a say in the decision-making process. In this context, it was selfevident and not controversial on either side of the Atlantic that an alliance of democratic states had to be based on democratic principles, norms, and decision-making rules. The two major bargains about the North Atlantic Treaty concerned, first, the nature of the assistance clause (article 5 of the treaty) and, second, the extent to which the consultation commitn~ent(article 4) would include threats outside the NATO area. Neither the commitment to democratic values (preamble) nor the democratic decision-making procedures as outlined in articles 2, 3, and 8 were controversial in the treaty negotiations. Rather, the controversy between the U.S. Congress, o n the one hand, and the administration together with the Western European governments, on the other, focused o n the indivisibility of the mutual security assistance." In sum, a liberal interpretation of NATO's origins holds that the Cold War came about when fundamental ideas - worldviews - about the domestic and the international order for the post-World War I1 era clashed. The Western democracies perceived a threat to their fundamental values resulting from the "Sovietization" of Eastern Europe. While the perceived Soviet threat certainly strengthened the sense of community among the Western democracies, it did not create the collective identity in the first place. In light of the liberal collective identity and its views of what constituted a "just" domestic and international order, Stalin's behavior and his refusal to join the liberal order confirmed that the Soviet Union could not be trusted. NATO then institutionalized the transatlantic security community to cope with the threat. The multilateral nature of the organization based on democratic principles and decision rules reflected the common values and the collective identity. Regulatory norms of multilateralism and joint decision making were not just rhetoric covering up American hegemony, but shaped the interallied relationship. These norms were causally consequential for transatlantic security cooperation during the Cold War, since they allowed for disproportionate
180
Widening Security
European influence on U.S. foreign policies. During the Korean war, for example, norms of consultation had an overall restraining effect on American decisions with regard to the localization of the war in Korea instead of its extension into China, the non-use of nuclear weapons, and the conclusion of the armistice negotiation^.^^ Western Europeans also had quite an impact on the early stages of nuclear arms control, especially during the test ban negotiations when the British in particular pushed and pulled the U.S. toward an agreement. As to NATO decisions pertaining to European security, joint decision making quickly became the norm. This has been shown to be true in most crucial cases, such as decisions on nuclear strategy and deployments." The evidence also suggests that the transatlantic relationship cannot be conceptualized as merely interstate relations; rather, the interaction patterns are significantly influenced by transnational and transgovernmental coalition-building p r ~ c e s s e s . ~ ~ I will briefly discuss here two cases of interallied dispute over policies during the Cold War. The first, the 1956 Suez crisis, probably constituted the most severe transatlantic crisis of the 1950s, leading to a temporary breakdown of the community. I argue, however, that reference to a conflict of interests alone does not explain the interallied confrontation, in particular not the United States' coercion of its allies. The transatlantic dispute can be better understood in the framework of norm-guided behavior, as a dispute over obligations and appropriate behavior in a security community. The second case, the 1962 Cuban missile crisis, was the most serious U.S.-Soviet confrontation during the Cold War. I argue that U.S. decisions during the crisis cannot be explained without reference to the normative framework of the transatlantic security community. The 1956 Suez Crisis: The Violation of Community Norms
A temporary breakdown of the allied community resulted from the 1956 Suez crisis when the U.S. coerced Britain, France, and Israel through economic pressure to give up their attempts to regain control of the Suez Canal. I suggest that the "realist" outcome of the crisis - the strong defeating the weak - needs to be explained by a "liberal" process. The American coercion of its allies resulted from a mutual sense of betrayal of the community leading to the violation of consultation norms and the temporary breakdown of the community itself. The conflict of interests between the U.S. and its two allies was obvious to both sides from the beginning of the crisis." The British and French governments knew that the U.S. profoundly disagreed with them on whether or not force should be used to restore control over the Suez Canal. The attitudes of the U.S. as compared with those of its allies were rooted in diverging assessments of the situation in the Middle East, of the larger political context, and of the particular actions by Egypt's Nasser. The U.S. made a major effort to restrain its allies from using military force by working for a negotiated settlement and the establishment of an international authority to take control of
i:
I gpl!
Collective Identity in a Democratic Community
181
the Suez Canal. Both sides frequently exchanged their diverging viewpoints through the normal channels of interallied communication, which remained open throughout most of the crisis. The U S . and its allies also knew that the British were economically dependent on American assistance for the pound sterling and for ensuring oil supplies to NATO Europe, should the crisis escalate into war."" Why, then, did the British a n d French w h o k n c w a b o u t their dependence a n d the American disagreement with them, nevertheless go ahead with their military plans a n d deceive Washington? H o w is their miscalculation of the U.S. reaction to be explained? The British and French governments reluctantly agreed to U.S. attempts for a negotiated solution, first through a n international conference in London in August 1956 and later through the proposal of a Suez Canal Users' Association (SCUA) in Septemher. But the allies were not seriously interested in the success of these efforts, since their ultiniate goal was not only to secure access t o the Suez Canal but also to get rid of Nasser. They endorsed the American efforts to huy time and t o create a favorable climate of opinion in the U.S. and the IJN. At the same time, the governments in London and Paris perceived Anlerican behavior during the crisis as a t best ambiguous, if not deceiving. John Foster Dulles earned himself a reputation o f "saying one thing and doing another," as Selwyn Lloyd, the British foreign minister, put it.6' There are indeed indications that Dulles favored stronger action if Nasser rejected reasonable proposals by the London conference. In September, for example, Dulles discussed a proposal with the British prime minister t o set up an Anglo-American working group that would consider means of weakening Nasser's regime.'' The British sense of heing betrayed by the Americans increased dramatically as a result of Dulles's handling of his own SCUA proposal. Prime Minister Anthony Eden viewed it as a means to corner Nasser further and to use his expected rejection as a pretext for military action. But in a n attempt to dampen the British spin on the proposal and to make it more acceptable to the Egyptians, Dulles declared that "the United States did not intend itself to try to shoot its way through" the Suez Canal. As a result, Eden concluded on October 8 that "we have been misled so often by Ihlles' ideas that we cannot afford to risk m o t h e r misunderstanding. ... Time is not on our side in this matter."": The British felt abandoned by the American government, which in their eyes had violated the community ot purpose. L.ondon then chose to deliberately deceive Washington about the ~nilitaryplans in October 19.56 without calculating the possible consequences. First, British officials thought, in a somewhat self-deluding manner, that the U.S. did not want to hear about the military preparations. Second, the British government was convinced in some strange way that the U.S. would ultimately hack it and that allied action would somehow force Washington to support what persuasion did not accon~plish.Eden and his foreign minister reckoned that the choice was clear for Washington if it had to take sides between Eg!.pt and its European allies.
182
Widening Security
What they perceived as Dulles's duplicity not only created a sense of betrayal leading to the deception in the first place, it also helped to reassure them that the Americans would ultimately support their action. In short, British decision makers firmly believed in the viability of the North Atlantic partnership. They convinced themselves that the U.S. was bound by the community and would ultimately value it. They relied on reassurances such as the one uttered by Dulles ten days before the invasion of the Suez Canal: "I do not comment on your observations on Anglo-American relations except to say that those relations, from our standpoint, rest on such a firm foundation that misunderstandings of this nature, if there are such, cannot disturb them."64 But Eisenhower and Dulles, despite all ambiguous statements, never wavered in pursuing two goals: (a)to prevent the use of force and (b) to reach a negotiated settlement guaranteeing safe passage through the Suez Canal. The administration mediated between its allies and the Egyptians while at the same time trying to restrain the British and French from resorting to military action. But this does not mean that Washington had to use its overwhelming power to force its allies to give up their adventure in Egypt. While the U.S. opposition to the allied action was to be expected, the use of coercive power was not. The allies could have agreed to disagree, since no supreme American interests were at stake.65 The U.S. could have confined its opposition to condemnatory action in the UN General Assembly. In other words, U.S. decision makers made choices as to how to react to the allied military action. The American decision to play hardball with the allies was triggered by a series of unilateral allied moves that violated norms of consultation and jeopardized the community of purpose in the eyes of American leaders. First, the British government decided at the end of August to get the North Atlantic Council involved in the crisis, against the explicit advice of the U.S. government. The allies apparently calculated that other Western Europeans would support their military preparations, while the administration thought that such a move would further complicate discussions at the London c ~ n f e r e n c e . ~ ~ Second, the British government told the U.S. in late September of its plans to refer the matter to the UN Security Council in order to preempt a likely Soviet move. John Foster Dulles advised against it, since he thought that such action would hinder his attempts to get the SCUA off the ground. On September 23, the British and French referred the Suez issue to the Security Council anyway. Third, immediately before the invasion, American decision makers complained that they were left in the dark about the British and French plans and that the interallied lines of communications had gradually broken down. The State Department asked the U.S. embassies in London and Paris to find out what the two governments were up to. It received reassuring messages, since the American embassies either were deliberately misled by their sources or just second-guessed the allied governments. Intelligence information gradually came in reporting Israeli plans to invade Egypt, with possible French and British inv~lvement.~'When &e Israeli invasion started on October 29,
i
I
I
Collective Identity in a Democratic Community
183
the U.S. administration had sufficient ~ n f o r m a t ~ oton suspect that France was involved in the action. Rut until the facts could no longer be dented, ne~ther F~senhowernor l h l l e s wanted to belleve that the Rrttlsh government had decelved them. The sense of comrnun~tyled to w~shfulth~nkingby Amer~can d e c ~ w mmakers. The U.5. then decided to bring the matter to the UN Secur~ty Councd but w ~ told s by the all~esthat they would never support a UN move agamst Israel. Cven then, tlsenhower d ~ dnot bel~cvcwhat he saw. He sent an urgent message to P r ~ m eMm~sterEden, expressing his confusion and demand~ng that the UK and the US quickly and clearly lay out their present views and intentions before each other, and that, come what may, we find some way of concerting our ideas and plans so that we may not, in any real crisis, be powerless to act i11 concert because of our misunderstanding of each other."" The extent of the Anglo-French-Israeli collusion became clear only a few hours later, when the British and French issued a joint ultimatum demanding that Israel and Egypt withdraw from the Suez Canal to allow for an AngloFrench occupation of the Canal zone. The plot was immediately apparent, since the Israeli forces had not yet reached the line to which they were supposed to retreat. Eisenhower now realized that he had been misled all along and expressed his dismay ahout the "unworthy and unreliable ally." Later that day, he declared that he was "inclined to think that those who began this operation should be left to work out their own oil problem - to boil in their own oil, so to speak." The secretary of state sun~monedthe French ambassador, telling him that "this was the blackest day which has occurred in many years in the relations between England and France and the United States. He asked how the former relationship of trust and confidence could possibly be restored in view of these develop~neilts."~" Eisenhower and Dulles were not so much upset by the Anglo-French-Israeli use of force itself as by the fact that core allies had deliberately deceived them. The allies had not broken some minor consultation agreements; they had violated fundamental collective understandings that constituted the transatlantic comnlunity - "trust and confidence." Once the degree of allied deception became obvious, decision makers in Washington concluded that they were themselves no longer hound by alliance norms. They decided to retaliate in kind and coerced their allies through financial pressure. Now the U.S. abandoned the community, leaving its allies no choice hut to back down. As the British ambassador in W'lshington put it, "We have now passed the point when we are talking to friends. ... IW]e are on a hard bargaining basis and we are dealing with an Administration of business executives."'" While the U.S. administration was coercing its allies to withdraw from the Suez Canal, it indicated at the same time that a major effort should be made to restore the community. As soon as November 7, the president called the
184
Widening Security
whole affair a "family spat" in a telephone conversation with Prime Minister Eden. He later tried to find excuses for the British behavior: "Returning to the Suez crisis, the President said he now believes that the British had not been in on the Israeli-French planning until the very last stages when they had no choice but to come into the ~peration."'~ If the British had "no choice," they could not really be blamed for deceiving the U.S. The two governments now engaged in almost ritualistic reassurances that their "special relationship" would be restored quickly. President Eisenhower and Anthony Eden's successor Harold Macmillan worked hard to reestablish the community. The Bermuda summit in March 1957 documented the restoration of the "special relationship." In the long term, the crisis resulted in a major change in U.S. policies toward nuclear cooperation with the British. In 1958, Congress amended the Atomic Energy Act to allow for the sharing of nuclear information with Britain, which London had requested throughout the decade. The violation of alliance norms during the Suez crisis reinforced rather than reduced the transatlantic ties. As for NATO in general, the crisis led to a reform of its consultation procedures. The "Report of the Committee of Three on Non-Military Cooperation in NATO" restated the need for timely consultation among the allies on foreign policy matters in general, not just those pertaining to European security. The North Atlantic Council adopted the report in December 1956.72 But the French-American relationship never recovered. While French leaders had already been more sanguine about the interallied conflict than the British, the crisis set in motion a trend of gradually weakening the transatlantic ties between Paris and Washington. This deinstitutionalization culminated in President de Gaulle's 1966 decision to withdraw from the military integration of NATO. The French learned different lessons from the crisis than did the British, as far as the collective identity of the transatlantic community was concerned. The case shows that actors' interpretations of specific events may lead to changes in how they perceive their identity, which then results in changing their practices. In sum, the confrontation between the U.S. and its allies developed because each side felt betrayed by the other in fundamental ways. The conflict of interests alone does not explain the confrontation. Such conflicts occurred before and afterward without leading to a breakdown of the transatlantic community, but they were usually resolved through cooperation and compromise note, for example, the almost continuous interallied disputes over nuclear strategy and deployment options, which involved the survival interests of both sides. During the Suez crisis, however, U.S. decision makers perceived the allied deception as a violation of basic rules, norms, and procedures constituting the transatlantic community. No longer bound by the norms of appropriate behavior, the U.S. used its superior power and prevailed. Both sides knew that they had violated the rules of the "alliance game" and engaged in self-serving rhetoric to cover it up. More important, the U.S. and the British worked hard to restore the transatlantic community, suggesting that they did
t
I
L
1:
Collective Identity in a Democratic Community
185
not regard the sort of confrontations experienced during the Suez crisis as appropriate behavior among democratic allies. I conclude, therefore, that the Suez crisis confirms liberal expectations about discourses and practices when fundamental norms governing the relationship are violated. Norm violation challenging the sense of community among the allies provides the key to understanding the interactions leading to the confrontation, the clash, and the restoration ot' the community.
While the Suez crisis is a case of norm violation, the Cuban missile crisis shows the collective identity of the security community in action. It represents the most serious U.S.-Soviet confrontation of the Cold War. While we k n o w today that neither side was prepared t o risk nuclear war over the Soviet missiles in Cuba, President John F. Kennedy and General Secretary Nikita Krushchev were each afraid that the other would escalate the conflict in ways that might get o u t of control." Decision rnakers in Washington were convinced that the supreme national interests of the United States were a t stake. Why care about allies when national survival is endangered? Indeed, the conventional wisdom about the Cuban missile crisis holds that the allies were not sufficiently consulted, even though U.S. decisions directly affected their security. Even senior officials in the administration, such as Roger Hilsman, then director of intelligence in the State Department, thought that the U.S. had chosen not to consult the allies in order to preserve its freedom of action: "If you had the French Government and the British Government with all their hangups a n d D e Gaulle's hangups we would never have done it, it's as simple as that."'" I argue that - except tor the first week of the crisis - there was far more interallied consultation than most scholars assume and that key allies, particularly the British and Turkish governments, knew about details of decision making in Washington. Moreover, the fate o f the Western Alliance was the most important foreign policy concern for U.S. decision makers, except for the direct confrontation with Moscow a n d Cuba. Strategic arguments about reputation a n d the credibility of commitments explain these concerns only t o a limited extent. First, as argued above, realism is indeterminate with regard to allied consultation when the alliance leader's survival is perceived t o be a t stake. Second, decision makers did not worry a t all about their reputation in the Organization of American States (OAS), for example, the other U S - l e d alliance, which was even more directly involved in the Cuban missile crisis. Rather, if we assume a security community of democracies, strategic concerns about reputation and credibility immediately make sense. At least, realism does not offer a better understanding of these concerns than liberal theory. Rut the Cuban missile crisis also poses a puzzle for liberal propositions about the allied community of values and norms, since the U.S. violated these
186
Widening Security
rules during the first week of the crisis. Whether or not to consult the allies was discussed during the very first meeting of the Executive Committee (ExComm) on October 16. Secretary of State Dean Rusk argued strongly in favor of consultation and maintained that unilateral U.S. action would put the allies at risk, particularly if the U.S. decided in favor of a quick air strike. The decision not to consult, however, did not free decision makers from concerns about the Europeans. Membership in the community of democracies formed part of the American identity, as a result of which decision makers continued to define U.S. preferences in terms of joint interests rather than unilaterally. There was unanimous consensus that U.S. inaction with regard to the Soviet missile deployment in Cuba would be disastrous for U.S. credibility vis-a-vis its allies.7" The reputation of the U.S. government was perceived to be at stake, in both domestic and alliance politics. Decision makers in the ExComm did not distinguish between the two. As a result, the decision not to consult key allies during the first week strengthened the position of the "doves" in the ExComm, who argued that an air strike and military action against the Soviet installations in Cuba without prior consultation would wreck NATO. During the second week of the crisis, the Europeans not only were regularly informed about the U.S. deliberations but had ample opportunities to influence American thinking through a variety of bilateral and multilateral channels. Among the key allies, only the British chose to take advantage of these opportunities, while France and West Germany strongly supported the U.S. courses of action. President Kennedy had almost daily telephone conversations with Prime Minister Macmillan - which even many of his staff members did not realize. The British were the most "dovish" of the major allies. They made sure, for example, that U.S. forces in Europe were exempted from the general alert status of U.S. troops. When Macmillan was briefed about the crisis, he assured the president that Britain would support the U.S., but he mentioned that Europeans had lived under the threat of Soviet nuclear weapons for quite some time. Since the British had internally concluded that the naval blockade of Cuba violated international law, Macmillan demanded that the U.S. made a good legal case in favor of the quarantine. He then wondered about possible Soviet reactions against the blockade, including attempts at trading American bases in Europe or even West Berlin for the withdrawal of the missiles from Cuba.76Kennedy perceived Macmillan's message as the "best argument for taking no action." The British prime minister was as concerned as President Kennedy that the crisis might get out of control, and he favored a cooperative solution. On October 24, he told David Ormsby-Gore, the British ambassador to the U.S.: "If I am right in assuming that the President's mind is moving in the direction of negotiations before the crisis worsens, I think that the most fruitful course for you to pursue at the present might be to try to elicit from him on what lines he may be contemplating a ~ o n f e r e n c e . " ~ ~ He suggested that the U.S. should raise the blockade if the Soviets refrained from putting more missiles into Cuba. When Macmillan phoned Kennedy
\
1
i;
i
i
I
Collective Identity in a Democratic Community
187
later, he urged the president not to rush and asked whether "a deal" could be done. When the president asked for Macmillan's advice on a possible invasion of Cuba, the prime minister strongly recommended against it.'x Whether the British proposals for de-escalation made a crucial difference in the U.S. decision-making process is unclear. It is safe to argue, however, that the close contact between Kennedy, Macmillan, and Ormsby-Gore during the sccond week o f the crisis strengthened and reinforced the president's view.
Given Kennedy's convictions about the importance of the Western Alliance, which he expressed time and again during the crisis, it was significant that a key ally whom he trusted fully endorsed his search for a "deal." Two alliance issues strongly influenced the president's thinking during the crisis. The first was the fate of Berlin. The American commitment to Berlin was one more reason to preclude inaction against the Soviet missiles in Cuba. As the president put it during the second ExComm meeting, if the Soviets put missiles in Cuba without an American response, Moscow would build more bases and then squeeze the West in Berlin." Concerns about Berlin also served as another restraining factor on US. decisions. The city's exposure inside the Soviet bloc made it an easy target of retaliatory action against American moves in Cuba. Kennedy worried about Berlin almost constantly. Fear of Soviet action against the essentially defenseless city was one reason for his decision in favor of the blockade and against more forceful military action."" Kennedy's personal and emotional commitment to Berlin was again apparent during the crucial ExComm meeting on October 27, when he was faced with the choice between an air strike and a "missile swap": What we're gomg to be faced w ~ t h1s - because we wouldn't t'lke the m~ssrlesout of Turkey, then maybe we'll have to invade or make a masslve strike on Cuba which may lose Berl~n. ... We all know how qu~cklyeverybody's courage goes when the blood starts to flow, and that's what's g o ~ n gto happen In NATO ... We start these thmgs and they grab Berlm, and everybody's gotng to say, "Well that was a pretty good p r o p o s ~ t ~ o n . " ~ ' The Berlin issue symbolized the role of the North Atlantic Alliance in the minds of U.S. decision makers throughout the crisis - precluding both inaction and a rush to escalation. Concerns about the city and the fate of Europe in general were causally consequential not by determining specific choices but by constraining the range o f options available to decision makers. President Kennedy and other ExComm members treated Berlin almost as if it were another American city, for which American soldiers were supposed to die in defense of their country. It did not seem to make a difference whether the fate of Berlin or that of New York was at stake. Berlin symbolized the allied community and the values for which the Cold War was fought. It was the city's very vulnerability to Soviet pressures that made it such a significant symbol for the U.S. commitment to the defense of Europe.
188
Widening Security
While Berlin was an important concern of U.S. decision makers during the crisis, it was peripheral to the solution to the crisis. The Jupiter medium-range ballistic missiles (MRBMS) deployed under NATO arrangements in Turkey and Italy became part and parcel of the crisis settlement. The Jupiter missiles had been deployed following a 1957 NATO decision, on U.S. request. In the meantime, the administration considered them dangerously vulnerable and militarily obsolete. Kennedy would have preferred their withdrawal long before, but the administration failed to persuade Turkey to give them up. By the time of the Cuban missile crisis, the Jupiter missiles had become a political symbol of alliance cohesion, of the U.S. commitment to NATO and to Turkey in particular, which had just returned to democratic rule. Not surprisingly, the Jupiter MRBMS became immediately linked to the Soviet missile deployment in Cuba. Throughout the crisis, the administration was divided over a "missile swap." The split cut across divisions between departments and even led to differences of opinion within specific agencies such as the State Department and the Pentagon. The topic of the Turkish Jupiter bases also came up in various interallied discussions. A "missile swap" was discussed in the British government, but London remained opposed to an explicit "missile trade" throughout the crisis, despite its support for a "deal." At the same time, the Turkish government began to raise concerns, particularly when the Soviet ambassador in Ankara began to argue that Moscow regarded the Jupiter missiles as its "Cuba." While Dean Rusk publicly denied any connection between the Cuban missile crisis and any situation elsewhere in the world, he hinted that, in the long run, disarmament negotiations could deal with the location of weapons.x2 The administration also considered speeding up ~ l a n for s the Multilateral Force (MLF), a sea-based nuclear force of American, British, and French systems under a joint NATO command, which had originally been proposed by the Eisenhower administration. The U.S. then set its diplomatic machinery in motion to anticipate how the allies would react to withdrawal of the Jupiter missiles in such a conte~t.~"he U.S. ambassador to NATO, John Finletter, responded along the lines already discussed in Washington. He argued that Turkey regarded the Jupiter missiles as a symbol of the alliance commitment to its defense and that no arrangement should be made without the approval of the Turkish government. Finletter strongly advised against any open deal, but then proposed a "small southern command multilateral seaborne force on a 'pilot basis"' using Polaris submarines and manned by mixed U.S., Turkish, and Italian crews. Such an arrangement could allow the U.S. to offer the withdrawal of the Jupiters to the soviet^.^^ While the U.S. ambassador to Turkey cabled a gloomy assessment from Ankara, he also concurred that a strictly secret deal with the Soviets was possible, together with some military compensation for Turkey.85 These cables were discussed in the ExComm meetings on October 27 and influenced the president's decisions. Various U.S. ambassadors to NATO allies apparently talked to their host governments about a secret "missile swap" despite an explicit directive by Rusk not to talk about it. The networks provided by the transatlantic
I
-
I
I
Collective identity in a Democratic Community
189
institutions made it impossible to exclude allied officials from the deliberations. British officials discussed a "missile swap"; so did NATO's permanent representatives in Paris. Most important, the Turkish foreign ministry indicated to the American and the British ambassadors that it was not completely opposed to a removal of the Jupiters, to be discussed after a suitable lapse of time and in a general NATO c o n t e ~ t The . ~ ~ president involved the British ambassador in his deliberations and also asked the British to approach their embassy in Ankara for a view on the matter.xWhen the crisis reached its climax on October 27, discussions that included the State Department, the Pentagon, U.S. diplomats in Europe, NATO representatives in Paris, and various allied governments - at least the British and the Turks - had been held, and a solution had emerged. The solution entailed a strictly secret deal between Washington and Moscow that included the removal of the Jupiter missiles from Turkey in exchange for military compensation, after the Soviets had withdrawn their missiles from Cuba. On October 27, the ExComm devoted nlost of its meeting time to discussing the options of an air strike against Cuba versus a "missile swap." The sense of allied community among ExComm members served as a frame of reference in which the various courses of action were discussed. Both sides in the debate referred to the need to preserve NATO. Supporters of an air strike argued that a missile trade would lead to the denuclearization of NATO and indicate that the U.S. was prepared to tamper with the indivisibility of allied security for selfish reasons. As McGeorge Bundy p ~it,~ "In t their (the Turkish1 own terms it would already be clear that we were trying to sell our allies for our interests. That would be the view in all of NATO. It's irrational, and it's crazy, but it's a terribly powerful fact."'" The president was primarily concerned that the Soviet public demand might provoke a public counterresponse by the Turkish government, which would jeopardize a secret solution to the crisis. He argued that the U.S. faced a dilemma. O n the one hand, the U.S. commitment to its allies was at stake. On the other hand, many alliance members around the world might regard a missile trade as a reasonable deal and would not understand if the U.S. rejected it.*' In the end, the proposal of a secret deal with the Soviets together with some military compensation for the allies carried the day with the president. It was agreed that the Jupiter missiles could not be removed without Turkish approval and that therefore the U.S. would have to persuade the government in Ankara. A small group of Kennedy's advisers assembled after the ExComm meeting and discussed an oral message to he transmitted to Anatoly Dobrynin, the Soviet ambassador, by Attorney General Robert Kennedy. Dean Rusk proposed that Kennedy should simply tell Dobrynin that the US. was determined to get the Jupiter missiles out o f Turkey as soon as the crisis was over. The group also agreed to keep absolute secrecy about this in order to preserve allied unity."" Shortly after the meeting of Kennedy's advisers, the president's brother met with Ambassador Dobrynin and told him in rather dramatic terms that
190
Widening Security
the crisis was quickly escalating and that the U.S. might soon bomb the missile bases in Cuba, which could lead to war in Europe. He then told Dobrynin with surprising openness that the U.S. was prepared to remove the Jupiter missiles from Turkey but could do so only if the deal was kept secret, since alliance unity was at stake.91 Khrushchev accepted the president's proposal, thereby solving the crisis. In sum, U.S. membership in an alliance of democratic states shaped the process by which decision makers struggled over the definition of American interests and preferences during the Cuban missile crisis. One could argue, though, that the U.S. decisions were perfectly rational given the risks and opportunities at hand and that reference to the transatlantic relationship is, therefore, unnecessary to explain American behavior. The blockade, the noninvasion pledge, and the secret "missile swap" were indeed perfectly rational decisions. But a rational-choice account proves to be indeterminate unless alliance considerations are factored in. The opposite arguments in favor of escalating the crisis through an air strike or even an invasion were as rational as those in support of the blockade or the "missile deal." Supporters of an air strike correctly argued that the risks of escalation were minimal given the overwhelming superiority of the U.S., both locally in the region and on the global nuclear level. Only if Soviet retaliation against Europe was considered a problem could one make a rational argument against the air strike and other escalatory steps. Berlin was the American Achilles heel during the crisis, not New York City. That U.S. decision makers did not distinguish between domestic and European concerns, that they worried as much about the fate of Berlin as about New York City, and that they regarded obsolete Jupiter missiles in Turkey as major obstacles to the solution of the crisis - these puzzles make sense if one assumes a security community of democratic nations, on behalf of which the Kennedy administration acted. Membership in the Western Alliance affected the identity of American actors in the sense that the "we" in whose name the president decided incorporated the European allies. Those who invoked potential allied concerns in the internal discourses added weight to their arguments by referring to the collectively shared value of the community. The alliance community as part of the American identity explains the lack of distinction between domestic and alliance politics as well as the sense of commitment that U.S. decision makers felt with regard to their allies. Reputational concerns and the credibility of the U.S. commitment to NATO were at stake during the Cuban missile crisis. But I submit that these worries can be better understood within the framework of a security community based on collectively shared values than on the basis of traditional alliance theory. T h e End of t h e Cold W a r and t h e Future of NATO
Since 1985, the European security environment has changed dramatically. The Cold War is over, the U.S.-Soviet rivalry gave way to a new partnership among former opponents, Germany is united, the Warsaw Pact and even the Soviet Union have ceased to exist. Fundamental parameters in the international
I
I
1
11
Collective identity in a Democratic Community
191
environment of the transatlantic relationship h'ive been profoundly altered. The world o f the 1990s 1s very different from the world of the 1950s and 1960s. Can we extrapolate anything from the study ot European-American relations d u r ~ n gthe h e ~ g h tof the Cold War for the future of the transa t l a n t ~ ct ~ e s ? Contrary to Waltz~anassumptions, NATO rernalns ahve and well so far, adlustmg to the new ~ n t c r n a t ~ o nenvironment: al In response to the end of the Cold War, NATO has started changing its force structure. lnstead of heavily armored and mechanized divisions, member states are setting u p intervention forces with increased mobility in accordance with the NATO decision to build an allied rapid reaction corps for "out-of-area" purposes.y2 As to relations with the former Cold War opponents, the North Atlantic Cooperation Council was instituted in 1991, linking the sixteen allies with Eastern Europe and the successor states of the Soviet Union. Two years later, these countries joined a "partnership for peace," creating institutionalized ties between NATO's integrated military command structure and the Cast European and Russian militaries. Current debates center around how central Eastern European countries such as Poland, Hungary, and the Czech Republic could join the alliance without antagonizing Russia and jeopardizing its legitimate security concerns." The alliance has started playing a subsidiary role in UN-sponsored international peacekeeping and peace-enforcement missions, such as in the former Y~goslavia.'~ It is remarkable in this context that the profound conflict of interest among the Western powers with regard to the war in BosniaHerzegovina has not at all affected NATO. Rather, the U.S., Britain, France, and Germany worked hard to ensure that their disagreements over Bosnia would not adversely influence the transatlantic alliance.
1 have argued here that the Western Alliance represents an institutionalization of the transatlantic security community based on common values and a collective identity of liberal democracies." The Soviet domestic structure and the values promoted by communism were regarded as alien to the community, resulting in a threat perception of the Soviet Union as the potential enemy. The democratization of the Soviet system initiated by Mikhail Gorbachev and continued by Boris Yeltsin then started ending the C:old War in Western eyes by altering the "Otherness" of the Soviet system. The Gorbachev revolution consisted primarily of embracing Western liberal v a l ~ ~ e s .While '~ "glasnost" introduced publicity into the Soviet political process, "perestroika" democratized it. In response, Western threat perception gradually decreased, even though at different rates and to different degrees. The Germans were the first to declare the Cold War over. They reacted not only to the democratization of the Soviet system but in particular to Gorbachev's foreign policy change toward "comnlon security." Americans came last; Gorbachev needed to give up Eastern Europe and the Berlin Wall had to tumble down in order to convince them.
192
Widening Security
It should be noted, however, that this explanation has its limits. Liberal theory as such does not suggest that democracies should behave cooperatively toward democratizing states, as the West did toward the Soviet Union under Gorbachev. The arguments put forward in the Kantian tradition pertain to stable democracies. Since they relate to the social structure of international relations, they cannot explain the specifics as well as the differences among the Western responses to the Gorbachev revolution, i.e., agency.97But unlike realism, a liberal argument about the transatlantic security community correctly predicts that these threat perceptions would wither away at some point when former opponents democratize and thus begin entering the community of liberal states. The end of the Cold War, then, not only does not terminate the Western community of values, it extends that community into Eastern Europe and, potentially, into even the successor states of the Soviet Union, creating a "pacific federation" of liberal democracies from Vladivostok to Berlin, San Francisco, and Tokyo.98But liberal theory does not necessarily expect NATO to last into the next century. It only assumes that the security partnership among liberal democracies will persist in one institutionalized form or another.99 If the democratization process in Russia gives way to authoritarian nationalism, however, liberal theorists do expect NATO to remain the dominant Western security institution and to regain its character as a defensive alliance. In this case, NATO would be expected quickly to extend its security guarantee to the new democracies in central Eastern Europe. But institutionalist arguments suggest that a transformed NATO will remain the overarching security community of the "pacific federation." It is easier to adjust an already existing organization, which encompasses an elaborate set of rules and decision-making procedures, to new conditions than it is to create new institutions of security cooperation among the liberal democracies in the Northern Hemisphere. The OSCE - not to mention the West European Union - would have to be strengthened much further until they reach a comparable degree of institutionalization. NATO also provides a unique institutional framework for Europeans to affect American policies. Liberal democracies successfully influence each other in the framework of international institutions by using norms and joint decision-making procedures as well as transnational politics. Playing by the rules of these institutions, they do not just constrain their own freedom of action; they also gain access to the decision-making processes of their partners. Reducing the institutional ties might create the illusion of independence, but it actually decreases one's impact.
Conclusions: How Unique is NATO? I have argued in this essay that traditional alliance theories based on realist thinking provide insufficient explanations of the origins, the interaction patterns, and the persistence of NATO. The North Atlantic Alliance represents an institutionalized pluralistic security community of liberal democracies.
I'
I
I
1
1
Collective Identity in a Democratic Community
193
Democracies not only do not fight each other, they are likely to develop a collective identity facilitating the emergence of cooperative institutions for specific purposes. These institutions are characterized by democratic norms and decision making rules that liberal states tend to externalize when dealing with each other. The enactment of these norms and rules strengthens the sense of community and the collective identity of the actors. Domestic features of liberal democracies enable the community in the first place. But the institutionalization of the community exerts independent effects on the interactions. In the final analysis, then, democratic domestic structures, international institutions, and the collective identity of state actors do the explanatory work together. But do the findings pertaining to the North Atlantic Alliance hold up with regard to other alliances and cooperative institutions among democracies? Comparisons can he made along two dimensions: the degree of institutionalization of the comn~unityand the extent to which collective identities have developed among its members. The only international institution that appears to score higher than NATO on both dimensions is the Euvopearz Union (EU).""' While it is less integrated than NATO with regard to security and foreign policy making, the EU features ~miquesupranational institutions such as the European C h ~ m i s s i o nand the European Court of Justice. The EU member states also coordinate their economic and monetary policies to an unprecedented degree."" As far as collective identity is concerned, there is a well-documented sense of common Europeanness among the elites of the continental member states that partially extends into mass public opinion. Interaction patterns within the EU closely resemble the transnational and transgovernmental coalitions that have been found typical for decision making in NATO."" Compared with NATO and the EU, the C1.S.-Iapanese security relirtiovrship appears to represent an interesting anomaly, in the sense that it is highly institutionalized, but the collective identity component seems to be weaker.'"' lapanese security was more dependent on the U.S. during the Cold War than were Western Europe and even Germany. Strongly institutionalized transnational and transgovernmental ties developed among the military and the detense establishments of the two countries. Apart from the elite level of the governing party, however, the security relationship remained deeply contested in Japanese domestic politics during the Cold War. As a result, the U.S.-Japanese security cooperation certainly qualifies as a democratic alliance establishing norms of consultation and compromise-oriented decision making similar to those of NATO. But given the lack of collective identity, it is less clear whether this alliance constitutes a "pluralistic security community" in Deutsch's sense. The U.S.-Japanese example, then, shows that there is some variation with regard to both institutionalization and identity components in alliances among democracies. In contrast, identity politics appears to be particularly strong in the U S lsraeli security relationship, as Michael Barnett argues. Again, the variation, compared with NATO and the U.S.-Japanese alliance, seems to pertain to the identity component, while the American alliance with Israel is as highly
194
Widening Security
institutionalized as the other security relationships discussed so far. As Barnett points out, recent "strains in the relationship can be better explained by challenges to the collective sense of democratic community resulting from Israeli policies than by changes in the international environment in which the two states operate. So far, I have looked only at security communities among democracies. What about alliances involving nondemocraciest? If the liberal argument presented here holds true, we should find quite different interaction patterns in such relationships, since the basic ingredients for the "democratic peace" are missing. A thorough analysis is beyond the scope of this essay. But various findings appear to suggest that, indeed, interaction patterns in nondemocratic alliances are different and conform more closely to realist expectations, particularly realist bargaining theory. As to the Middle East, for example, Stephen Walt has argued that common ideology played only a limited role in the formation of alliances among Arab states. While Michael Barnett disagrees, pointing to the significance of pan-Arabism, he also concurs that this collective identity has been weaker than the sense of community among democratic allies such as the U.S. and Israel.lo4 A study comparing U.S. relations with Latin America and interaction patterns within the former Warsaw Pact concludes that these relations can well be analyzed within the framework of public choice and realist bargaining theories.lo5 In sum, these comparisons suggest that NATO is not unique but exemplifies interaction patterns and collective identities that are quite common for security communities among democracies. At the same time, these features appear to distinguish democratic alliances from other security relationships. In this sense, alliances among democracies are indeed special, since they can build upon a strong sense of community pertaining to the domestic structures of liberal states. Nevertheless, the degree of institutionalization as well as the extent to which "pluralistic security communities" have emerged varies among democracies. Author's Note This essay summarizes, builds upon, and expands arguments developed in Thomas RisseKappen, Cooperation Among Democracies: The European Influence on U.S. Foreign Policy (Princeton: Princeton University Press, 1995). Participation in the Social Science Research Council - sponsored project under the directorship of Peter Katzenstein has greatly inspired my thinking o n the subject of norms, identity, and social constructivism. For comments o n the draft of this essay, I am very grateful t o the project participants, in particular Peter Katzenstein. I am also indebted to Mark Laffey, David Latham, Fred H. Lawson, Stephen Walt, Steve Weber, and several anonymous reviewers for their criticism and suggestions.
Notes 1. See, for example, Hans J. Morgenthau, Politics Among Nations: The Struggle for Power and Peace, briefed. (1948;reprint, New York: McGraw Hill, 1993); Kenneth N. Waltz, Theory
1111 (
Collective Identity in a Democratic Community
195
I~rtertz~ztional 1'01h-s (Reading, Mass.: Add~son-Wesley, 1979); George Liska, N~ltionsrn Al11ane.r: T h l ~ r n r t sof Interdcpcntiencc (Kaltiniore: Johns Hopkins Univers~tyPress, 1962); Arnold Wolfers, Disc-ord a n d CdlirOormtron (Baltimore: Johns Hopkins University Press, 1962). Allianc-es (New York: See also Ole R. tiolsti r t a/., Unity a n d Dlsrntegriltion irr I1ztern~7tro~rill Wiley, 1973). 2. On this poltit, see Ron Jepperson, Alexander Wendt, and Peter J. Katzenste~n,"Norms, Jdenrity, :,and Culture in N a t ~ o n a lSrcur~t);"essay 2 in this volume. 3 . Scc, f<,r cxamplc, M ~ c h a c lI)<,yle, .'Lihcralism ,1nd Wotld I'olttics," Arneric-arz P,j/iiicir/ Scre?rc-c Reviczc~ 80, no. 4 (1986): 11.51-69; Robert Keohane. "lnternat~onal Lihcr~lism Reconsidered," in John I h n n , ed., T l ~ eb,conomic l m ~ i t sto Modern Polrtrcs, pp. 165-94 ( C a n b r ~ d g e :Cambridge Un~versity Press, 1990); B r ~ ~ cRu\sett, e Grasping the l l ~ ~ n ~ o c r ~ ~ t r ~ Pcizcc: I'rrtzciplcs f i r a Post-Cold Wirr World (I'rinceton: Princeton Univers~tyPress, 19931. 4. O n this use of the term, see, for example, Joseph M. Grieco. "Anarchy and the 1.1mirs of C:ooperation: A Realist <:r~tiquco f the Newest Liberal Itistiturionalism," lntcrmztional Keohane, lnternatrond Irrsfrt~rtrons Orgnzization 42, no. 3 (Summer 1988): 485-507; Roherr 0. a n d State Pozuer: Essays in Interrratronizl Relations Theory ( B o ~ ~ l d eWestview, r: 1989). See .~lso the discussion ot neoliberal~smin Peter J. Katzenstein, "Introduction: Alternative Perspect~veso n National Security," essay 1 in t h ~ svolume. 5. For the tollow~ng,see Waltz, 7heory of lntrrnntionirl Polltrrs, ch. 6; and <;lrnn H. Snyder, "Al11:incc Theory: A Neorealist First Cut," J o u r n c ~of l lntcrwat~onalAfiirs 44, n o . I (Spring 1990):103-23. 6. See Stephen M . Walt, ' r . 1 ~Origrm ~ of Allraizccs (Irh,~ca:Cornell Un~versityPress, I987), pp. 274-76. For thorough crit~quesof the Waltz~annorion of h~polarity,see, for example, Richard Ned I.ehow, "The Long Peace, the End of the Cold War, m d the Failure of Realism," lntcmatrorzd Organizatlorz 48. n o . 2 (Spring 1994): 249-77; I<. Harrison W'lgner, "What Was Bipolar~ty?"Infernationol Orcyirnit,ztirm 47, n o . 1 ( W ~ n t e r1997): 77-106. 7. See W'iltz, 'Theory of lntmnational l'olitics, pp. 106, 170-73. On "relative g a ~ n s "in particular, see <;rirco, "Anarchy ,ind the Llmits of Cooperation." For an argument char relative gains are particul:irl) Import,int under h~polarit);see Duncan Snicial, "International Cooperation A ~ n o n gRelative ( ; a ~ nMaxim~zers,"I n t c ~ n ~ z t ~ oSt~rifres nal Qt~Lrrtcrly 35, no. 4 (December 199 1 ): 387-402. 8. W:llt, T l ~ cOrlglns o/Allrances. 9. On the o r ~ g i n sof NAT'O, see, tor example. Richard Best, "Coopcr~?tronwit11 I.rkcMmded P P O ~ I C S "Hrit~sl! : I n f / ~ i ~ won~ (Ainerican ~ Securrty I'o/rcy, 1945-1949 (Westport, Conn.: Greenwood, 1986); Don Cook, korgin'y the Alli'r~zcc: NATO, 1945-1 970 ( h e w York: Arbor Hoi~seiWilliamMorrow, 1989); Sir N ~ c h o l a sHenderson, The Rrrth o t NATO (I.ondon: Weidenteld and Nicolson, 1982); Timothy P. Irel,irtd, Creating the E n t ~ z n g i i ~ g Allznnc-e: The, Orrgrns of the North Atlirntlc Trrirty Orgdnization (Westport, C o n n . : Greenwood, 198 l ) . 10. On this point, see W~gner,"Wh,~rWas Bipolarity?" and RolxrtJervis and Jack Snyder, eds., Donzit1oc.s L~ntfRrznrizc~czgotrs:Strutegic Relrrf '2nd G r m t Power Comprtrtion ln thr EurIzsran Rr~nlivrii( N e w YorL: Oxford University Press, 199 I ) . 1 1. John Lewrs <;addis, T i ~ cl.ong Pr~7c.e(Oxford: Oxford University Press, 1987), p. 4 1. See also M'ltthew Ev,ingelista, "Sr,llin'\ Postwar Arrny l<eappr~~iscd," International S~curit)'7, no. 3 (Winter 198218.3): 1 10-68; Jcinies I. Gorrnly, krom Pr~tsdanzto tl!e Cold War ( W i h n g t o n , I M : Scholarly Resources, 199O), pp. 92-93; Melvyn P. I.etfler, "N,~tionalSecurity and U.S. Fore~gn I'olicy," In Melvyn P. Leftlcr and David S. Painter, eds., Origins o f t l ~ rCold War, pp. 15-52, 25-27 (London: Routledge, 1994); Norberr W~ggershaus, "Nordatlmt~sche Kedrohungsperzept~orle~l in1 'Kalten Krieg,' 3948-1956," In Klaus A. Meier et al., eds., L>as Nordiztlirntlsche Riindnis, 1919-19.56, pp. 17-54 (Munich: Oldenbourg, 1993). Perceptions of a Soviet military threat confrontarion was already in full swing. increased only after the s 12. Waltz, Tl7eory of Internatlonnl P o l i t ~ s ,pp. 169, 170. Glenn Snyder ~ i p p l ~ ethis thought t o the tran\atlantic alllance: "It 1s abundantly cleal- t h x the European allies will nor d o the Un~redSr.lte\' bidding when it is not In their own interest. but it is also clear that the) h.iw little posit~vc~nfluenceover U.S. policv - when the l i n ~ r e dStares does nor wish to he of
196
Widening Security
influenced. ... The word that most accurately describes their behavior is not domination or even bargaining, but unilateralism" (Snyder, "Alliance Theory," p. 121). 13. Details in Risse-Kappen, Cooperation Among Democracies. See also Fred Chernoff,After Bipolarity (Ann Arbor: University o f Michigan Press, 1994);Helga Haftendorn, Kemwaffen und die Glaztbwiirdigkeit der Allianz (Baden-Baden: Nomos, 1994); Elizabeth Shenvood, Allies in Crisis: Meeting Global Challenges to Western Security (New Haven: Yale University Press, 1990). 14. For evidence, see Bruce Bueno de Mesquita, The War Trap (New Haven: Yale University Press, 1981); Stuart A. Bremer, "Dangerous Dyads: Conditions Affecting the Likelihood o f Interstate War, 1816-1965," Journal of Conflict Resolution 36, no. 2 (1992):309-41. 15. On these propositions, see, for example, Michael Handel, Weak States in the International System (London:Frank Cass, 1981);Holsti, Unity and Disintegration in International Alliances; Glenn Snyder, "The Security Dilemma in Alliance Politics," World Politics 36, no. 4 (July1984): 461-96; Jan F. Triska, ed., Dominant Powers and Subordinate States (Durham: Duke University Press, 1986). 16. At a U.S. Senate hearing in November 1990. Quoted from Gunther Hellmann and Reinhard W o l f ,"Neorealism, Neoliberal Institutionalism, and the Future o f NATO," Security Studies 3, no. 1 (Autumn 1993):3-43, 17. See also John J .Mearsheimer, "Back t o the Future: Instability in Europe After the Cold War," International Security 15, no. 1 (1990):5-56. 17. See Charles Glaser, " W h y NATO Is Still Best: Future Security Arrangements for Europe," International Security 18, no. 1 (Summer 1993):5-50. 18. As Kenneth Waltz himself put it, "With the aid o f a rationality assumption one still cannot, from national interest alone, predict what the policy o f a country might be" (Waltz, "Reflections on Theory of lnternational Politics: A Response to My Critics," in Robert 0. Keohane, ed., Neorealism and Its Critics, pp. 322-45 [New York: Columbia University Press, 19861, p. 331). On the indeterminate nature o f realism, see also Robert 0. Keohane, "Realism, Neorealism, and the Study o f World Politics," ibid., pp. 1-26; Stephen Haggard, "Structuralism and Its Critics: Recent Progress in International Relations Theory," in Emanuel Adler and Beverly Crawford, eds., Progress in Postwar International Relations, pp. 403-37 (New York: Columbia University Press, 1991). 19. John G. Ruggie, "Multilateralism: The Anatomy o f an Institution," lnternational Organization 46, no. 3 (Summer 1992):561-98, 592. 20. For efforts at systematizing a liberal theory o f international relations, see Ernst-Otto Czempiel, Friedensstrategien (Paderborn: Schoningh, 1986), pp. 110-67; Doyle, "Liberalism and World Politics"; Keohane, "International Liberalism Reconsidered"; Andrew Moravcsik, Liberalism and International Relations Theory, 2d ed., Working Paper Series (Cambridge: Center for lnternational Affairs,Harvard University, 1993);Russett, Grasping the Democratic Peace. My point o f departure is, thus, what Jepperson, Wendt, and Katzenstein call "neoliberalism" in "Norms, Identity, and Culture in National Security," essay 2 in this volume. But drawing on insights from social constructivism, I argue that a liberal theory o f international relations properly understood should be located in the upper-right - "sociological" - corner o f figure 1 in the Jepperson, Wendt, and Katzenstein essay. 21. See Immanuel Kant, " Z u m ewigen Frieden: Ein philosophischer Entwurf" (1795),in Wilhelm Weischedel, ed., lmmanuel Kant: Werke in sechs Banden (Frankfurt am Main: InselVerlag, 1964),6: 193-251. 22. For the state o f the art, see Russett, Grasping the Democratic Peace. Two recent criticisms o f the "democratic peace" finding seem to be empirically flawed. See Christopher Layne, "Kant or Cant: The Myth o f the Democratic Peace," International Security 19, no. 2 (Fall 1994):5 4 9 ; David E. Spiro, "The Insignificance o f the Liberal Peace," International Securrty 19, no. 2 (Fall 1994): 50-86. For the rebuttals, see John M. Owen, "How Liberalism Produces Democratic Peace," International Security 19, no. 2 (Fall 1994):87-125; Bruce M. Russett, "The Democratic Peace: And Yet It Moves," Intertzational Secttrity 19, no. 4 (Spring 1995): 164-75. 23. See Owen, "How Liberalism Promotes Peace"; Thomas Risse-Kappen, "Democratic Peace -Warlike Democracies? A Social Constructivist Interpretation o f the Liberal Argument," European Journal of International Relations 1 , no. 4 (1995):489-515.
I:I
,r
?
pix
11
Collective Identity in a Democratic Community
197
24. See the d~scussionin Russett, Grasping the Denzocratrr- P r ~ r ~ch. e , 2. 25. See Alexander Wendt. "Collective Identity Forniation and the Internarlonal State," Ame~icanPolitical Science Kez~irw88. no. 2 (Sunlmer 1994): 384-96. 26. Doyle, "Liberalism a r d World Politics," p. 1 16 1 . 27. Kant, "Zum ewigen Frieden." p. 201. 28. See John Herz, Po/itrrLrl Keizlisn~ nnd Politrclrl Itlciilrsnr (Chicago: Un~versity of Chicago Press, 19.51); Robert Jerws, "Cooperat~on Under the Security D~lemrna," W r l d I'c>lrtrc> 3 0 . n o . 2 ( 1978): 167-1 14.
29. Karl W. Ikutsch et '11.. Polrtrccrl (~ornrn~inity and tlw North Atluntrc Areu (Princeton: Princeton I J n ~ v e r s ~ I'res.;. t? 19 i;)p,. 129. 30. See. for exaniple, Kenneth A. Oye, ed., Coopenrtron Under Amrch?~(Prmceron: i'rtnceron Umversity Press, 1986). The "democrat~cp e x e " argument docs not suggest that authoritarian s ~ a t e sare constantly in a state of w.ir m w n g themselves. Rather, I~hcraltheory posits that the causes of peace a m m g autocracies at-c difterent from the causes tor the "dernocrxic pe;lcrv and that cooperation ,itilong author~r,~r~,in regimes is likely to remain fragile. 3 1. Norms are "collective eupectntlons of proper behavtor tor a given idcnt~ty."In the tollowing, I mainly use the terrn In the sense of rcgzilatrve n o r m that prescribe or proscribe behavior for alread? constituted tdcntities. The ronstitrltive rri~rnrsof these tdentiries are the values ;ind rules of democratic decision ~n,iking111 the d o m e s t ~ crealm. For these dist~ncrions, see Jepperson, Wendt, and Katzenste~n,"Norms, Ident~ty,and Culture in National Security." 12. See Friedr~ch KrritocIi\v~I,KIIIOS,Norms, irm/ ~ ) L ' C I S ~ oO n~ St :l ~ e~onditrorrs of l'rac-trc.lrl and I.r,qnI Reasonrn~rtr Intrnriltro~r~ilRelatrons irrril Domcstrc Affurrs (Cambrtdge: Camhridgt. IJnivcrsity Press, 1989), p. 6.3. 3 3. See Robert I'utnam, "Lhplorn.icy ci~nd1)ornestic I'olttics: ' l h c Logic of Two-Lxvcl G;lnles," Internntronnl C)rgLirnsrtron4 2 ( 1988): 427-60; Peter 13. Evans, ki,irold K. Jacobson, and Robert 5. Putnarii, ccis., l ~ o ~ ~ O l e - E i ~I)rpl~~rni7c~ yc~t/ (Berkeley: Iln~versiryo f (:,ilifornia Press, 1993). 34. I thank M.lrk Lafie), Stcve Weber, and a n anonymous reviewer for alertlng me to the following points. 35. This even \how\ up In qu,intitative studies. I n s t ~ n c e so t m~lirarizeddisputes ,lliiong democracies have declined owl- t i ~ n e .Moreover, most d ~ s p u t e dcases of alleged war m i o n g democracies occurred during the n~neteenth 'ind early twentieth centuries. For dat'i, see liu5sett, Gr'rsprnq the Dcrnoc-ri7trr l'cLrcc,ch. 4. 16. John Me,irsheirner's d~scusswnof social c0nstr~1ctivis111 - which he mislabels "crit~c,ll theory," therehy lumping together '1 variety of different approaches - suffers from the misunderstanding t h ~ ideational t tnctors in world politics 'ire somehow more subject t o change t h ~ n 1i1ate1-~al ones. Collective ~ d e n t i t ~ cannot es be changed l ~ k eclorhcs. See l o h n J. Mcarsheinicr, "The False Promise of 11iternatton.ll Inst~tutions,"Intern~rtroniil Secrlrity 19, no. 3 ( W ~ n r e r 1994/95): .5-49. 37. As Altreci (;rosser put ~ t .19-15 was "no year zero"; s w Grosser, Thr Western AI1rmi-e: htropcirn-Amerrc-an Relutrons Slrrce 103i (New York: Vmtage Kooks, 19821, pp. 3-.33. See also Rohcrt i.arharn, "I.~hcralis~n's 01-der/l.tbeml~srn'sOther: A Genealogy of Threat," AltcrrrLrtrt~r~s 20, n o . I ( 1995): I I 1 4 6 , o n t h ~ spoint. 38. See, for example, J o h n Baylis, "Britain and the Fornlariotl of NATO" (lnternL1tion~l Politics Research Paper no. 7, Department of Inrern,ltional I'oltt~cs, IJniversity Chllrge ot Wales, Aberystwyth. 1989); Best, "(:ooperirtiorr witb Like-Mrtrtic>tiPeoples ";Henry B. Ky'ln, The Visron of Anglo-Anterica (Cambridge: Crlmhr~dgeUn~versiryPress, 1987). 39. On the origins of the conralnrnent strategy, see, for example, John L. Gaddis, Strritegres of C:ontuinn~ent(Oxford: Oxford Un~versity Press, 1982); (;addis, The Long Peacc, pp. ~ A I'sychologic-Lll Explanatzon (Princeton: 20-47; Deborah I..irson, Orr~rnsI I Containment: Princeton University I'ress, 1985); David Mayers, Gc,orge Kewt~~in m d the Dilenzmas of 1J.S. Foreign Policy (Oxford: Oxtord Unlversiry Press, 1988). 40. Overview In David D~niblehyand David Reynolds, An 01-ean Apart: The Relationship Bettvecw Rrztarn irrrd Americo I I I the 'fiucwtirth Century (New York: Vintage Rooks, 1 98Y), pp. 170-72.
I98
Widening Security
41. Quoted from Gaddis, The Long Peace, p. 30. 42. See Gormly, From Potsdam to the Cold War, pp. 94-111. 43. Quoted from Leffler, "National Security and U.S. Foreign Policy," p. 29. 44. For conflicting interpretations of U.S. strategic interests after World War 11, see Gaddis, The Long Peace; Melvyn P. Leffler, The Preponderance of Power (Stanford: Stanford University Press, 1992); Leffler, "National Security and U.S. Foreign Policy," pp. 23-26; Thomas J. McCormick, America's Half-Century: United States Foreign Policy in the Cold War (Baltimore: Johns Hopkins University Press, 1989). For an excellent overview on U.S. historiography on the origins of the Cold War, see Anders Stephanson, "The United States," in David Reynolds, ed., The Origins of the Cold War in Europe: International Perspectives (New Haven: Yale University Press, 1994), pp. 23-52. 45. See Latham, "Liberalism's Order/Liberalism's Other," on this point. 46. Stephanson, "The United States," p. 50. 47. Quotes from Truman's speeches in March 1947, contained in Gaddis, The Long Peace, p. 36. 48. See Kennan's "long telegram," in U.S. Department of State, Foreign Relations of the United States, 1946 (Washington, D.C.: U.S. Government Printing Office), 6: 696-709; 'X,' "The Sources of Soviet Conduct," Foreign Affairs 25, no. 4 (July 1947). 49. See, for example, Robert Donovan, Tumultuous Years: The Presidency of Harry S. Truman (New York: Norton, 1982); Gaddis, Strategies of Containment, pp. 14-20; Gormley, From Potsdam to the Cold War. 50. On these alternatives, see Steve Weber, "Shaping the Postwar Balance of Power: Multilateralism in NATO," International Organization 46, no. 3 (Summer 1992): 633-80, 635-38. See ibid, for the following. 51. The first two notions are based on Ruggie's definition of multilateralism. See Ruggie, "Multilateralism." 52. See, for example, Cook, Forging the Alliance; Henderson, The Birth of NATO; Ireland, Creating the Entangling Alliance; Lawrence S. Kaplan, The Unrted States and NATO: The Formative Years (Lexington: University of Kentucky Press, 1984); Eilnio Di Nolfo, ed., The Atlantic Pact: Forty Years Later (Berlin: De Gruyter, 1991); Meier et al., Das Nordatlantische Biindnis, Norbert Wiggershaus and Roland G. Foerster, eds., Die westliche Sicherheitsgemeinschaft, 1948-1 950 (Boppard: Harald Boldt Verlag, 1988). 53. See Best, "Cooperation with Like-Minded Peoples. " 54. On the French position, see Bruna Bagnato, "France and the Origins of the Atlantic Pact," in Di Nolfo, The Atlantic Pact, pp. 79-1 10; Norbert Wiggershaus, "The Other 'German Question': The Foundation of the Atlantic Pact and the Problem of Security against Germany," in ibid., pp. 111-26; Pierre Guillen, "Frankreich und die Frage der Verteidigung Westeuropas," in Wiggershaus and Foerster, Die westliche Sicherheitsgemeinschaft, pp. 103-23. 55. For details on the treaty negotiations, see Cook, Forging the Alliance; Henderson, The Birth of NATO; Ireland, Creating the Entangling Alliance; Sherwood, Allies in Crisis, pp. 5-29. 56. For details, see Risse-Kappen, Cooperation Among Democracies, ch. 3. For the following, see ibid., ch.5. 57. See, for example, Haftendorn, Kernwaffen und die Glaubwiirdrgkeit der Allianz; Thomas Risse-Kappen, The Zero Option: INF, West Germany, and Arms Control (Boulder: Westview, 1988). See also Chernoff, After Bipolarity. 58. Transgovernmental relations are defined as interactions among subunits of national governments in the absence of central decisions. See Robert 0. Keohane and Joseph S. Nye, Jr., "Transgovernmental Relations and International Organizations," World Polittcs 27 (1974):39-62. 59. I essentially agree with Richard Neustadt's earlier analysis of the crisis. See his Alliance Politics (New York: Columbia University Press, 1970). For a similar argument, see Sherwood, Allies in Crisis, pp. 58-94. The major studies on the Suez crisis are David Carlton, Britain and the Suez Crisis (Oxford: Blackwell, 1988); Steven Z. Freiberger, Dawn over Suez (Chicago: Iven R. Dee, 1992); Keith Kyle, Suez (New York: St. Martin's, 1991); Diane B. Kunz, The Economic Diplomacy of the Suez Crisis (Chapel Hill: University of North Carolina Press, 1991); Wm. Roger Louis and Roger Owen, eds., Suez 19S6 (Oxford: Clarendon Press, 1989).
I
,
p
t
,
Collective Identity in a Democratic Community
199
60. See Diane K. Kunz, "The Importance of Having Money: The Economic Diplomacy of the Suer Crisiu," in 1.ouis and Owen, Sstcz 1956, pp. 2 15-31. 2 18-19; Kunz, Thc EconomicIlrplortzrrcy of the Suez Crrsrs. 61. Selwyn l.lo>d, Suez 1956: A Personal Acco~tnt(London: lotlathan Cape, 19781, p. 38. 62. See "Menlorandurn ot Conversation at Kritish Foreign Offrce," Septernher 2 1, 19.56, in U.S. Department of State, b o r r i p Kelirtrons of the linitcd Stirtcs, l9.Y.5-19.(7 Ihere~fter FK U S 19.YT-19.571 (Washington, D.(:.: 11.5. Government Pr~ntingOffice, 1990), 16: 548-50. 6 3 . .'EJc.rl to S c l w y n I Ioyd," C)cr<,hcr 8, clucxcJ in Wnl. R<,gcr Imois, ''DulIes, Suer, <xr,J the Br~tish,"in Richard Inlmerrnann, ed., / o l ~ nFostw Dulles a t d t l ~ eDiplomizcy of the C:old W a y (Princeton: Pr~ncetonUn~versitvPress, 19901, pp. 1 3 3 4 8 , IS 1. For the Dulles quotes, cf. [hid., pp. 149, 150; Rohert Bow~e,"Eisenhower, Dulles, and the sue^ Cr~sis,"in 1.ou1s and Owen, Sucz 19.56, pp. 189-2 14, 204-5. 64. "1)~illest o Sclwyn l.loyd," October 19, FRIJS I9.5T-1957, 16: 760. 65. U S . anticolonialism, tor example, does not e x p l a ~ nAmerican behavior. During the Falklands/hlalvinas war in 1982, tor example, the Keagan admin~srrariontacitly backed the Br~tisheffort t o regain the islands even though it remained officially neutral in light o f its alliance ohl~gationst o both A r g e n t ~ n ,(OAS) ~ and Brita~n. 66. See "Memorandum for Secretary of Stare," August 28, FRUS 19.55-19.57, 16: 309; "Secretary of State to U.S. Ernh,lssy UK," August 30, ihid.. pp. 3.39-40; "Dept. o f State to cert a n diploniatic missions," August 31, ihid., pp. 344-45. 67. See "Depr. ot State t o U.S. Embassy UK," October 26, FRLIS 19Y5-19.57, 16: 790; "U.S. Frnt~assyIsr,lrl t o I k p t . of State," October 26, ibid., p. 785; "Dept. of St'ire t o lJ.S. Ernl~assyFrance," Octoher 29, ihid., pp. 815-16. For the following, see "Memorandum of Conversation at I k p t . of State." Ocroher 28, ihid., pp. 803-4; "1I.S. F.mbassy UK t o Ilept. of State," October 29, ihid., pp. X 17-20. 68. "Eisenhower t o Eden," Octoher 10, FRUS 1955-IW7, 16: 848-50. See 3 1 ~ "Memorandum of Conversat~onat the White House," Octoher 29, [hid., pp. 833-39; editorlal note, ibid., pp. 840-42; Bowie, "Eisenhower, Dulle5, and the Sue7 Crisis," pp. 208-9. 69. "Memorandurn of Conversar~ona t the Depr. of Stare," October 30, I-RIJS 19.5i-1c).57, 16:867-68. For d ~ kisenliower c quotes, see "Mernorandunl of (hnference wlth the President," October 30, ihid., p. 873; "hlessage from Eisenhower to Eden," Octoher 30, ibid., p. 866; "Mernoranduni of Conversation with the President," Octoher 30. ihid., pp. 851-5.5. 70. "1,orci ( : ~ c c ~ ,IlJK i ,lnihassador in Waahingtonl t o FOI-e~gn Office," Novemhcr 28, 1956, quoted iron1 Louis, "Dulles, Suez, ,lnd the British," pp. 155-56. 71. "Memorandum of Conversation hetween the President ,lnd Dulles," (my emphasis!), November 12, ER1I.S 1'1.5 5-1057, 16: 1 1 12-14. For the preceding quote, see "Memorandum o f Telephone Con\,er\ation hvtween the President and Sir Eden," November 7, ibid., p. 1040. 72. See Sherwood, Allics Irl (:rrsrs, pp. 88-94. 73. For details, see Rich,lrd N. 1.ehow and Janice G. Ste~n.We All Lost t l ~ c(;old WUV (Princeton: Princeton Un~versityPress, 19941, pp. 19-145. See ~ l s oMichael Beschloqs, 7%c. Crisls Years (New York: Edw,ird Burl~ngameBooks, 199 I), pp. 4 3 1-575; James Blight, T l ~ c Shattered (:rystid R d l (Savage, Md.: Rowman and 1.ittlefield. 1990); James Blight and David Welch, O n I ~ J C Ljr~nk (New York: Hill and Wang, 1989); McGeorge Bundy, Dcrngcr ~ r r l t f Stirvizd (New York: R,indom House, 19881, ch. 9; L.iurence CIi,ing and I'eter Kornbluh, eds., Thr Cuhan Missdc Crisis, 1962 (New York: New Press, 1992); Raymond Garthoff, Reflcrtiotrs o n thr C11hm1MISS~IC Cris~s.rev. ed. (Washington, D.<:.: Krookings Institution, 1989). 74. "Interview with D a v ~ dNunnerly," In Nationd Security Archive, The Gdmz Mrss~l(~ Crisis, 1962 Ihereafter NSA: CMCI, microfiche collect~on(Wclsliington, I>.(:.: ChadwyckHe'iley, 1990), Lhc. 032.5 1 . O n the alleged lack o f consultation, see Richard Kosecrance, Defense of thc Kcwlnr (New York: Columbia Un~versityPress, 19861, p. 13; Sherwood, Allres in Crisis, p. 122; 1. F. Stone, "Wh'it I'rice Prestige?" in Rolwrr A. Divine, ed., Thc Crrhnn M~ssrleCrisrs, pp. 15 7-65 (Chicago: Quadrangle Books, 197 I ] . 7.5. As Koherr McNarnara put it later, "For all kinds of reasons, especiall) t o preserve unity in the alliance, we had t o indicate t o the Soviets that we weren't going to accept the presence o f offensive miss~lesin <:ub,~"(quoted from Blight and Welch, O Hthe Hrink, p. 188). See a l w "Ex(:omm Tr,lnscripts," Octoher 16, 1962, NSA: CMC, Lhc. 00622.
200
Widening Security
76. See Harold Macmillan, At the End of the Day, 1961-1963 (London: Macmillan, 1973), pp. 184-90. For the following quote see "507th NSC Meeting," October 22, NSA: CMC, Doc. 00840. 77. "Foreign Office to Embassy Washington," October 24, in Public Records Office, London, Diplomatic Correspondence Files [hereafter PRO: FO] 3711162378. 78. See Macmillan, At the End of the Day, pp. 198-203,202-4. See also Lebow and Stein, We All Lost the Cold War, p. 121. 79. "White House Tapes and Minutes of the Cuban Missile Crisis," International Security 10, no, 1 (Summer 1985): 164-203, 185. 80. See, for example, the telephone conversation Macmillan-Kennedy, October 26, in Macmillan, At the End of the Day, pp. 209-11. 81. "October 27, 1962: Transcripts of the Meetings of the ExComm," International Security 12, no. 3 (Winter 1987188): 30-92, 55, 58. 82. For details, see "Ambassador Hare, Ankara, to State Dept.," October 23, NSA: CMC, Doc. 01080; "Hare to State Dept.," October 24, ibid., Doc. 01260; "Rusk, Circular Cable," October 24, ibid., Doc. 01140; "Rusk to US Embassies, West Europe," October 25, ibid., Doc. 01294; "Rusk to US Embassy, Ankara," October 25, ibid., Doc. 01298. 83. "Dean Rusk to US Embassies to NATO and to Turkey," October 24, NSA: CMC, Doc. 01138. 84. "Finletter to State Dept.," October 25, NSA: CMC, Doc. 01328. 85. "Hare to State Dept." (Section I ) , October 26, NSA: CMC, Doc. 01470; "Hare to State Dept." (Sections 2 and 3), October 26, NSA, Nuclear History Documents. 86. See "Embassy Ankara to Foreign Office," October 28, PRO: FO 3711162382; "Embassy Ankara to Foreign Office," October 28, ibid. 3711162381, On discussions at NATO's headquarters see "Finletter to State Dept.," October 28, NSA: CMC, Doc. 01602. 87. According to "Embassy Washington t o Foreign Office," October 27, PRO: FO 3711162382. 88. "October 27, 1962: Transcripts," p. 39. 89. Bromley Smith, "Summary Record of ExComm Meeting," October 27, NSA: CMC, Doc. 01541. For the following see "October 27, 1962: Transcripts." 90. See Bundy, Danger and Survival, pp. 432-34;. 91. See Dobrynin's cable to Moscow, October 27, in Lebow and Stein, We All Lost the Cold War, pp. 524-26. 92. If the alliance was disintegrating, one would expect the members to concentrate on the defense of their national territories rather than building light and mobile forces. See Hellmann and Wolf, "Neorealism, Neoliberal Institutionalism, and the Future of NATO," p. 22. 93. For details, see "North Atlantic Cooperation Council Statement," N A T O Press Service, December 20,1991; Stephen Flanagan, "NATO and Central and Eastern Europe," Washington Quarterly 15, no. 2 (Spring 1992): 141-51; "'Partnerschaft fiir den Frieden' mit Osteuropa. Aber keine konkreten Zusagen fiir Mitgliedschaft," Suddeutsche Zeitung, January 11, 1994; "NATO Chiefs Hail New Era, But War Still Casts Clouds," International Herald Tribune [hereafter I H T ] , January 12, 1994; "Clinton Hints NATO Would Defend East from Attack," IHT, January 13, 1994. 94. See, for example, "Report by Ad-hoc Group of the North Atlantic Cooperation Council on Cooperation for Peacekeeping," NATO Press Service, June 11, 1993; Hellmann and Wolf, "Neorealism, Neoliberal Institutionalism, and the Future of NATO," p. 25. 95. See also Steve Weber, "Does NATO Have a Future?," in Beverly Crawford, ed., The Future of European Security (Berkeley: University of California at Berkeley, Center for German and European Studies, 1992), pp. 360-95. Emanuel Adler, "Europe's New Security Order," in ibid., pp. 287-326, shares the assessment but comes to different conclusions regarding the desirability of NATO. 96. On this point, see Daniel Deudney and G. John Ikenberry, "The International Sources of Soviet Change," International Security 16 (Winter 1991192): 74-1 18; Henry Nau, "Rethinking Economics, Politics, and Security in Europe," in Richard N. Perle, ed., Reshaping Western Security, pp. 11-46 (Washington, D.C.: American Enterprise Institute Press, 1991).
i:ii~ i
I\ spl ~
v i
Collective Identity in a Democratic Community
20 1
97. See Thomas Risse-Kllppen, "Ideas D o N o t Float treely: Transnat~onal Coalitions. Domestic S t r u c t ~ ~ r eand s , the t.nd o f the Cold War," lntcrrrotronal Organrzatrrm 48, no. 2 (Spring 1'194): 185-214. 98. O n liberal and institut~onalistvisions of the f u t ~ ~ rofe European security, see Adler, "Europe's New Security Order"; Ernst-Otto Gempiel, Weltpolrtik in1 Umbr~ich(Munich: Beck, 1991); James M. Goldgeier and Michael McF;lul, "A T ~ l of e 'l'wo Worlds: Core and Periphery in the I'ost-Cold N'ar Era," 1?1ternutrorzalOrganization 46, no. 3 (Spring 1992): 467-9 I; Charles Kupchan and C l ; i f d Kupch.111, "Concert.;, Collcct;vc Security, ~ n the d Future c't Furope," lntrrnatronal Sec~trtty16, no. 1 (Summer 199 1 ): 1 14-6 1 ; D~eterSenghaas, Frieeiensprolc4t Eltropiz (Frankfurt a m Mam: Suhrknrnp, 1991); Stephen Van I'~er.1,"Primed for Peace: Europe After the Cold War," Internntronill Secrtrity I S (Wmrer 1990/9 1 ): 7-57, 99. 1 thank Andrew Mornvcsik tor clarifying t h ~ spoint to me. 100. Cooper.it~on pattern\ ;Inlong the N o r d ~ c\taws come to m n d , too. Note that Scandinavian cooper'ltion w ~ the s main example in I>eutsch'\ original stud) o n "plur,ll~st~c security communities." See Ikutsch r t ir/., Political ( ~ o r i ~ r n r r nirnd i t ~ the North Atlnirtrc- Area. 101. See, for e ~ ~ i m p lAnne-hlar~e e, Burley and Walter M,lttli, "Europe Before the Court: A Polltical Theory ot I.egal Integr.ition," Internirtior~i~l Org~~r~rzntiorr 47, n o . I (Winter 1993): 41-76; St'inley Hotfmann ~ n dRobert Keohdne, ecls.. Tl~cz N P I I ~Ertrop~fln (:on~iirrt~rit~~ (lloulder: Westv~ew,1991); (Alhert.1 Shragia, ed., ~ l t r o - P o / ~(Washington, /l~~~ I>.<:.: Rrook~ng\ Institution. 1992). 102. For d c t ~ ~ l ssee , R~chnrd M~inch, D~zs I'rolckt t,rrrol~ir: Zwrschctr Nafrorr~~lst~~at, rrgionaler Aritonortrrc~ tmci WeltRc~~IIs(-/)Llft [Frankfurt 3111 hl.1111:Suhrkamp, 199.3); r\ntlion) Smith, "National Identity .unJ the Ide;l of Europc.ln Unit);" I~rtc~rn~rtional Affizirs 68, n o . 1 (1992): 5i-76; Ole W ~ e v c ret ~ 1 . . "'l'he Struggle for 'Furope': trench and German (:o~lccptsof S t ~ t c ,N,ir~on,and I:uropc.in l l n ~ o n "(unpublished m.lnuscrlpt, 1993). O n transn.it~oti,ll and t r a ~ ~ \ g o v e r ~ ~ relations ~ i ~ e ~ ~ ~t ~v i~l t l the i ~ n EU see, tor example, l ) ~ v ~Canieron, d "'l'ran\11,ltional K e h t ~ o n sand the I)evelopment of the European Econoniic and Monetary Un~on,"in 'I'lionus Bd'-l: 111: .Stilt('Artom, D o m ~ s t .Vtr~t~trrws, r~ Kisse-Kappen, ed., Krr~zgiir,qTrirn~n~rtrotr~~l Kc~l~rtrom irnd I ~ ~ t r r n ~ z t r oI n ds t ~ t r ~ t r opp. ~ r ~37-78 , (C.lrnbridge: (.aml>r~dgcUn~vcrsityI'res,, 199.7). 10.3. See Re~nIi.lrd llritte, /irpirni Forrign I ' o l r ~ (l.ondon: Iioutledjie, 1990); Peter K,lrzenstein and Yutuka Tsul~n,ik.~,"'Uully~ng,' 'Buy~nji.' and 'Binding': U.S.-Jap,~new I'r,ui\tlation,il lielation\ and I)otnc\tic Structures," in K~sse-K.lppen,NYIIIKIII~ Trizi?~n~rtro~rir/ Kc~lizt~ons K'ri-k 112, pp. 79-1 11; Petei- Katzenstein d11d N O ~ L IO!ia\v.11-,1. O /i7/7i1nk Ni7tioni71 S~~~trrt!': Str~tc.trtrrs.Norms, mtl Poliq*lic~sponses111 a CI~mgin,yWorld (lthdc.~:Cornell lJnive~-\~t) I'rw. 1Y93). See ~ l s oThomas Iierjier'.; contrihut~onto thi, \.olurne. 104. See Walt, T/JC Orlgi7rs of Allriznc-(~s;h41ch~elI~:trnctt. i ' l ~ i s t i t ~ ~ t i oRoles, ~ l s , .1n~l Disorder. The <:.ise o f the hr.1h States System," ltrter11~7ti011r7l Strtdrrs C)rt~rrtc~rI~~ 37,no. 3 (September 1993): 271-96; scc also Karnett's contrlhution to t h ~ volume. \ 105. See Tr~\k,i,Domr11i711iPOIOLJYS irnd S~tl~ordrn'r/(' Stizl~s.
Insecurity and State Formation in the Global Military Order: The Middle Eastern Case Keith Krause
Introduction
R
ecent contributions to the debate over 'redefining security' or the 'renaissance of security studies' have called into question how the concept of security should be defined, but have virtually ignored the issue of whether or not the 'redefinition' or 'renaissance' has any analytic utility or relevance to the security policies of the world beyond the advanced industrial states of the 'North' (Booth, 1991; Haftendorn, 1991; Kolodziej, 1992; Walt, 1991b).With only a few exceptions (Ayoob, 1989,1995; Buzan, 1991), most prominent analyses of security in the so-called 'Third World' have been explicit extensions or amendments of concepts and models drawn from the Western experience (Ayoob, 1995; Barnett and Levy, 1991; David 1991; Levy and Barnett, 1992; Walt, 1987). Also with few exceptions (Ball, 1988; Deger and West, 1987; Harkavy and Kolodziej, 1982; Neuman, 1984), little actual research has been done on the external and internal factors that shape security policies in the developing world. Hence the adequacy of Western approaches to the 'quest for security' in the developing world can easily be called into question at the conceptual level, but until the contours of an alternative research agenda are more fully developed, such a critique will remain purely theoretical. This article moves towards such a research agenda by sketching a framework for studying the quest for security in the developing world that goes beyond the confines of mainstream security studies, and by demonstrating its utility via a preliminary examination of the process of state formation and 'military development' in the contemporary Middle East. My central theses can be summarized as follows the struggle to control the institutions and instruments of organized violence has been central to the emergence of the modern state, and its Source: European]ournal of International Relations, 2(3) ( 1 9 9 6 ) :319-54.
j
0
Insecurity and State Formation in the Global Military Order
203
conception of representative political institutions, civil society and civilmilitary relations; within the European state system, the resolution of this struggle produced an externally-oriented conception of security, understood as a particular set of ideas about the role and place of organized violence in political life; this conception of security rested upon the unconditional legitimacy of the state, a societal consensus over basic values and the near-elimination of violence from political life, which permitted a strong identification of the security of the state with the security of its citizens; the basic social and political conditions that underpin this conception of security d o not exist in many (or most) regions of the world; hence, this 'orthodox' conception of security cannot adequately comprehend either the threats to state structures or regimes that d o not emerge from other states, or the threats that states and regimes can pose to their own citizens and societies; the explanatory power of the orthodox conception of security is thus severely limited, even with respect to questions considered central to International Relations.
The language of these propositions does diverge from the 'threat, use and control of military force' formulations central to mainstream conceptions of security studies. My argument does not, however, claim that we should 'redefine' security by somehow transcending or ignoring its intimate connection to conflict, violence and force. In fact my goal is to engage more fully the traditional concerns of security studies with the role of institutions and instruments of organized violence in political life, but to d o so by focusing attention on a wider range of elements of the 'quest for security' than are usually treated in the literature. The goal of this article is not to sketch a deductive model that can generate 'testable hypotheses', but rather to take the prior step of sketching an 'explanatory logic' or framework that can be usefully contrasted with the logic underlying the predominant approach to understanding the quest for security in the developing world. I begin with a brief overview of the existing International Relations literature on security in the developing world. Sections two and three then elaborate the foundations for a broader conception of sccurity, based upon the literature on state fornlation and institutions of organized violence, and the concept of 'military development' as the dynamic and specifically securityoriented aspect of this process. Sections four and tive sketch a preliminary case study of military development in the modern Middle East that demonstrates the utility and scope of this approach for understanding the quest for security along its regional, state and societal dimensions.
Security Studies and the Developing World The orthodox conception of security emerges out of a familiar realist ontology, which takes as its starting point a self-help world of states locked
204
Widening Security
within the security dilemma, and acting as utility maximizers who autonomously define their own interests. Under this rubric 'security studies is defined as the study of the threat, use, and control of military force ... it explores the conditions that make the use of force more likely, the ways that the use of force affects individuals, states and societies, and the specific policies that states adopt in order to prepare for, prevent, or engage in war' (Walt, 1991b: 212, emphasis in original). Non-military phenomena are excluded on the grounds that their inclusion 'would destroy [the] intellectual coherence [of the field] and make it more difficult to devise solutions to any of these important problems', and that 'it would be irresponsible ... to ignore the central questions [of war and peace] that form the heart of the security studies field' (Walt, 1991b: 213). This definition appears broad, for it not only engages questions of the causes of war and conditions of peace, but also seems to make room for studying the consequences of war-making and warpreparation. In this sense, it goes beyond most conceptions of 'strategic studies', which have been usually understood to deal narrowly with the first part of the definition (Buzan, 1991: 23-5). But there is no doubt that it remains constrained within a state-centric conception in which the threat of violence is central: as Joseph Nye and Sean Lynn-Jones point out, 'a subject that is only remotely related to central political problems of threat perception and management among sovereign states would be regarded as peripheral' (Nye and Lynn-Jones, 1988: 7). The practical result of this has been that the most prominent debates on security in the developing world have focused on a narrow range of issues. The central orienting point has been the work of scholars such as Stephen Walt, who has elaborated a structuralist account of interstate alliance formation behaviour that is developed from Kenneth Waltz's balance of power theory. He postulates that states 'balance against the states that pose the greatest threat', whether or not these are the most powerful states in the system (1987: 263), and has applied balance of threat theory to Southwest Asia and the Middle East (Walt, 1987, 1991a). Walt has concluded that balancing behaviour has been more prominent than 'bandwagoning', in these regions throughout the cold war, once one takes his expanded conception of 'threat' into the account of state behaviour. There have been three main lines of challenge to this structuralist account. The work of Steven David, Michael Barnett and Jack Levy has retained the focus on alliance formation, but drawn domestic or internal factors into the analysis. David argues that the central feature of Third World state behaviour is 'omnibalancing', by which state rulers balance against both external and internal threats to their rule, often 'appeasing other states ... in order to counter the more immediate and dangerous domestic threats' (David, 1991: 236). Levy and Barnett go beyond this still narrow focus on political threats, and argue 'that the most frequent threats to the domestic security of Third World elites tend to originate in weaknesses in the domestic political economy', with the goal of state managers being to balance domestic political stability, economic considerations and external security threats (Levy and Barnett, 1992: 23).
L
Insecurity and State Formation in the Global Military Order
205
Another line of challenge that overlaps this argues that the security problematic of most states in the developing world is conditioned by their fundamental institutional and political weaknesses (Ayoob, 1989, 199 1, 1995; Azar and Moon, 1984; Korany, et dl., 1993; Sayigh, 1990). Most developing world states are still weak qua states, and lack a basic societal consensus over the core values that would structure political life: the nature of governing institutions, the legitimacy of the state or the foundations of political order (Ruzan, 199 1: 112-14). Hence threats emerge not only from other states, but from within the state, or from groups that cut across state boundaries. Security from the threat of organized violence remains a central preoccupation, but it is subsumed under the hroader umbrella of vulnerabilities that 'threaten state boundaries, institutions or regime survival' (Ayoob, 1991: 259), which must be understood in the context of the process of state-building and the incorporation of post-colonial states into the contemporary world order. The third challenge, represented by scholars such as Thomas HomerDixon or Jessica Tuchman Mathews, has attempted to broaden the concept of security (in the developing world and elsewhere) by arguing that external threats of organized violence are far less urgent than other potential threats to human well-being and survival, such as environmental degradation, refugee flows, economic deprivation or communal conflicts (see, inter alia, HomerDixon, 1991, 1994; Iaescher, 1992; Thomas, 1987; Tuchnian Mathews, 1989). But insofar as most scholars under this rubric have presented little more than a 'shopping list' of possible threats to security, they have not shown how security from violence, from environmental threats or from economic deprivation (tor example) can be considered analytically similar or can be integrated into a coherent 'model' for comprehending the security problematic of the developing world.' Those who do attempt to construct more robust analytic explanations, such as Homer-Dixon, end up conceding that the central issue for security studies should remain the potential for violent interstate conflict, although they do contribute a richer analysis of the potential causal chains that can lead to it (Gizewski and Homer-Dixon, 1995; Homer-Dixon, 199 1, 1994; Percival and Homer-Dixon, 1995). The work of almost all of these scholars ultimately revolves around, or is oriented towards, questions generated by the neorealist security s t ~ ~ d i e s problematic outlined above. Walt focuses entirely on the systemic dynamic of interstate relations between rational actors, and attempts to test hypotheses concerned with balancing or bandwagoning behaviour. His critics (Lhvid, Ixvy and Barnett) incorporate domestic factors, hut their central analytic goal is still to explain international alliance formation, rather than a hroader range of outcomes or consequences of the quest tor security. Ayoob goes somewhat further, by adding the historical dimension of state formation, but he too remains committed to a state-centric vision that keeps the state and its institutions as the primary referent point for security. Factors such as famine or environmental degradation can become security issues, h u t only if s ~ 'vi~lnernbilities ~ h ... threaten ... to bring down or significantly weaken state structures, both territorial and institutional, as well as the regimes that
206
Widening Security
preside over these structures and profess to represent them internationally' (Ayoob, 1991: 259). Homer-Dixon remains concerned with charting causal pathways to violent interstate ~ o n f l i c t Similarly, .~ although the voluminous work of scholar-practitioners on the security problematic of various states and regions pays little attention to the conceptual debates in the field, these analysts concentrate overwhelmingly on the role of military force in interstate relations, and thus also fit into the broad contours of a neorealist conception of security and security studies (for examples from the Middle East see Cordesman, 1993, 1994; Kemp, 1991; Yorke, 1988).3 The challenges to the spare structuralist vision of Walt contain important insights but, with the partial exception of Ayoob, they ignore the crucial historical context of the traditional conception of security and its intimate connection to the question of controlling the instruments of organized violence. The neorealist conception of security emerged historically as a consequence of political struggles to establish the modern state, but the central concern that drove this development was not the state, but rather the place of violence in political, social and economic life, both between and within communities. As Albert Hirschman argues, this conception gains its power simultaneously by establishing the pursuit of the 'national interest' at the interstate level as a means for creating security and order and harnessing the passions of princes, and by establishing the minimal conditions of loyalty to the state (such as religious tolerance) that facilitate the peaceful pursuit of other values and goods (Hirschman, 1977: 37, 51, 79). Security studies can take for granted the 'outward-directed' nature of security only because of the successful evacuation of organized violence from social and political life in the idealized version of the modern state. Even Ayoob's acknowledgement of the historicity of security ends up projecting an evolutionary path for Third World state formation that is identical to that of Western states, thus also accepting the historical end point that provides the very foundation on which Stephen Walt's structuralist account is constructed. A strict focus on 'the threat, use, and control of military force' also obscures the way in which the idea of security that lies behind this emerged as a shared value or concept within politically self-conscious communities. 'Security' is a potent signifier, and its invocation takes a phenomenon out of the sphere of everyday politics and 'present[s it] as an existential threat requiring emergency measures, and justifying actions outside the normal bounds of political procedure' (Deudney, 1990: 466; Waever, 1995: 1).Behind the modern instruments and institutions of organized violence that are the focus of mainstream security studies lies a set of ideas about which collective endeavours should fall under the sign of security, what the source of threats are, and who the group is that should be secured. In the historical development of the European state, the 'nation-state' emerged as the object of security, other such entities were the source of threat, and military force was the primary means of safeguarding the community. These should not, however, be assumed to be settled issues in the rest of the world, and hence security studies needs to start its analysis at least one or two steps earlier in the process.
I
Insecurity and State Formation in the Global Military Order
207
State Formation and Security To make this argument convincing, I would need to offer an account of how the orthodox conception of security focusing on the threat of interstate violence emerged through the process of European state formation, and how it presented our now-comn~onplaceunderstanding of the role of institutions and iustrumci~tsof orKan;zeJ v;olence. This taLes u s beyond the nfirraw 'study of the threat, use and control of military force' (which presumes that the understanding of security as restricted to external threats of force has already been settled), and examines not only the interstate context, but the matrix of statelsociety relations and the impact of institutions of organized violence on processes of social, political and economic change. Although alien to contemporary security studies, this is not an analytically long stretch: as David Ralston has observed, 'how people prepare for and wage war, and the organizations they create for that purpose, are in fact closely related to the ways in which they deal with the other, more peaceable aspects of life it1 society' (Kalston, 1990: 178). The most suggestive architecture for comprehending this process has been advanced by Charles Till): Tilly's metaphor of war-making and state-making as organized crime is the starting point for an analysis of the dynamic process by which the institutions o f organized violence :ire crucial to the emergence of the modern state, and the different developmental paths the process of state formation could take. His argument is that 'war makes states' - the main impetus for consolidation of national states in Europe was preparation for, and actual fighting of, wars (Rasler and Thompson, 1989; Tilly, 1985, 1990). The early modern 'Military Revolution' (15.50-1650) contributed greatly to the creation and consolidation of the modern state through technological revolutions (the widespread use of cannon and gunpowder), changes in the scale of warfare and concomitant revolutions in tactics and organization that required vast state investments that were beyond the reach of many local rulers (Finer, 1975; Hintze, 197.5; McNeill, 1983; Parker, 1988). Together these changes catalyzed (if they did not almost dictate) the emergence of the modern state, as medieval social and political structures were reshaped and transformed. State-formation was also inextricably linked to regional and global bids for hegemony and status, and was not exclusively an internal process. The impact of war on state-making manifests itself in the political realm through the extension of territorial control and the acquisition of a monopoly of force, the emergence of centralized rule and administrative structures and the erosion of local autonomy or prticularity. In the economic realm, it was manifest through the innovation of public debt, the creation and expansion of taxes and extractive bureaucracies and a 'ratchet effect' on government expenditures that increased progressively the role of the state in economic life. Perhaps most ~niportantly,however, t h ~ sprocess of state-format~oncontamed two open-ended evolutionary dynam~cs.F m t , a s y m b ~ o t ~relat~onsh~p c emerged between nawent state-makers and t h e ~ rwar-mak~ngapparatuses.
208
Widening Security
Because state-makers had to amass ever-increasing amounts of resources to feed their expanding war machines, new political and socio-economic institutions were absolutely essential to mobilize resources to build modern armies. Thus, for example, the development of modern military organizations was contemporaneous with the development of professional bureaucracies, and 'with the rise of the modern corporation and its elaborate system of planning' (Perlmutter, 1977, 10). This symbiotic relationship between war-makers and state-makers tilted over time in favour of the state-makers, who subordinated the military to increasing degrees of control by civilians, and by other institutions within the embryonic 'civil society'. The second dynamic developed between state-makers and other groups and forces within society. State-makers started by extracting- resources for war-making and promising protection and security (against both internal and external threats) in return for a monopoly over the use of force. Over time, however, this required the forging of broader alliances within society, which resulted in another symbiotic and reciprocally beneficial relationship, this time between state-makers and other social groups. As Tilly describes it, 'agents of states bargained with civilian groups that controlled the resources required for effective warmaking, and in bargaining gave the civilian groups enforceable claims on the state'; these claims were ultimately politically enfranchising, and 'led to a civilianization of government and domestic politics' (Tilly, 1990: 206). Of course, Tilly's European 'model' of state-formation had many historical variations (Downing, 1992), and it certainly does not encompass the only possible historical paths for newly-independent or emerging states. A straightforward application of it to the developing world encounters at least three analytic difficulties. First, it seems not to be able to deal well with the phenomenon of weak 'quasi-states' whose empirical sovereignty is extremely weak or nonexistent, but whose juridical sovereignty is sustained by a strong international normative apparatus in the contemporary system (Herbst, 1989; Jackson, 1990). Quasi-states rarely (if ever) succumb to the contradictions of their polities or societies, and Tilly's evolutionary dynamics can hence be frozen, or take pathological turns. Second, it does not easily incorporate the emergence of rentier or predator states (such as Iraq, Saudi Arabia or other resource-rich new states) whose autonomous revenue sources 'have an effect on state power very different from those revenues that need to be extracted from the population and that must consequently be negotiated with rather than imposed on social groups' (Crystal, 1995: 197). Again, the relationship between state-makers and social groups does not unfold along any of the paths outlined by Tilly, since the motor of the process (increasing the resources at the disposal of the state) is not 'connected' to society. Finally, his model does not seem to allow consideration of the radically different international circumstances in which states in different times and places undertake their state-building projects (Herbst, 1990). Particularly important is the extreme subordination, dependence and systemic powerlessness of most post-1945 states, and the general absence of major interstate wars. As Tilly himself points out,
i.,r I
rLi2
Insecurity and State Formation in the Global Military Order
209
... the extension of the Europe-based state-making process to the rest of the world ... did not result in the creation of states in the strict European image ... states that have come into being recently through decolonizatlon have acqulred their military organizatloil from the outside, without the same mternal forgmg of mutual constraints between rulers and ruled. (Tillv, 1985: 185-6) Even given these shortcomings, however, the more general implication of Tilly's emphasis on the role of institutions and instruments of organized violence in the process of state formation is worth preserving and pursuing.-' My use of Tilly is meant to argue that any study of security policies and practices in the developing world must be sensitive to historical processes of state-formation that these are part of, and more importantly, must not a priori reduce the condition of security strictly to the security of states and regimes. Instead, it must tackle more broadly the historical and social context in which security policies are framed and pursued, and, perhaps more importantly, attempt to unpack the dynamic processes by which choices are made over the sources of threats and the appropriate means to respond to them. These choices not only have ramifications for the alliance formation or external orientation of developing world states (and their propensity for violent conflict) but for the ensemble of 'ways that the use of force affects individuals, states and societies'. This latter part of Walt's definition of the appropriate scope of security stud~eshas been almost entirely absent from the securlty 5tudies l ~ t e r ~ t uon r e the developing world.
Security a n d t h e C o n c e p t of 'Military D e v e l o p m e n t '
A concern with historical processes of state-formation and the role of institutions of organized violence remains too broad an ambit for analysing the coilditions of security and insecurity in the developing world, and the institutions and instruments designed to achieve it. We can move from these general issues to the more narrow concerns of security studies by addressing questions that can be grouped along three different dimensions or levels reg~onal/lnterstatesecurlty - what threats do \t,Ite\ pose to each other? st~telregmesecurity - what threats do the Instrtutwns of organized violence pose to the Institutions of the state or reg~me? \ocletal/md~c~dual 5ecurlty - what threats d o those who control the mems of v~olencepose to cltizens and society? Although the Interstate d m e n s ~ o nof conflict in the developmg world renuins an iniportmt factor In t h ~ sapproach, attention must also be p a ~ dto evolving patterns of mternal ~ o n f l l c tand clvll-ndltary relat~ons.More importantly, IS not specifled - I d o not assume the d~rectionof ' c a u ~ a l 'relat~onsh~ps LZ ~ Y I O Y that Z the quest tor securlty IS drlven solely hy the existence of states
2 10
Widening Security
in a self-help system, and that the state-level and societal dimensions of security/insecurity are merely consequences of these developments. The question of which dimension of security is most determinant at any time and place is an empirical one. One should actually expect to find the three dimensions interacting in different ways, with measures taken on one dimension perhaps decreasing security along another. The idea of different 'levels' of security is not novel. The most important innovation, however, is the shift to a different conceptual language that focuses on the process of military development and the insertion of new states into a global security ordex5 The resonance with International Political Economy concepts such as the 'global economic order' and the process of 'economic development' is not accidental. Jill Crystal's (1994) survey of recent scholarship on the emergence and perpetuation of authoritarian rule in the Middle East offers political economy explanations, in which a state's position in the world economy and its path of economic development greatly influence the way in which authoritarian rule evolves. Scholars in this tradition share an understanding of what 'the global economy', and 'economic development' are. This analogy with political economy concepts is not, however, meant to decouple economic and security issues, which can be intertwined in complex ways (such as the link between industrialization and modern weaponry, between economic scarcity and intrastate conflict, or between external alliance choices and the domestic political economy). Instead, my intention is to highlight the lack of similarly well-articulated and consciously applied 'framework' concepts for security studies, within which research on the dynamics of regional, state and societal security could be conducted. The concepts of military development and a global security order are intended to move in that direction. The reasons for this lacunae in the scholarly literature are complex, but one issue in particular should be noted. The literature on 'modernization' of the 1950s and 1960s (Fisher, 1963; Janowitz, 1988; Johnson, 1962) did attempt to analyse the role of the military in the transition from so-called traditional to modern societies by regarding the military as a generally positive force within postcolonial societies: a conduit for modernizing influences, an integrative organization in fractured polities and an instrument of the 'new middle class' that could be the vanguard of modernization (Halpern, 1962: 278-9; Hurewitz, 1969: 419-37; for critical overviews see Ball, 1988: 5-18; Owen, 1978). This literature was, however, crippled by the same flaws that afflicted the broader modernization literature - it misread the evolutionary experience of European states, it mistakenly conceptualized the state and statelsociety relations in Western pluralist terms, it ignored the impact of external forces and relationships on domestic political change, and its concern with military rule or military intervention missed the 'militarization' of politics and society that had occurred in many parts of the developing world. While the theories of economic development proposed by modernization theorists did generate a critique (dependency theory) and
I
Insecurity and State Formation in the Global Military Order
21 1
counter-critique that fuelled research and debate, no such development occurred within the literature on 'military modernization', with the possible exception of the literature o n militarization (Eide and Thee, 1980; Wolpin, 1986). Perhaps the reason for this can be found in the general reluctance of scholars to deal with the organized use of violence, especially in light of the badly flawed analyses of the 'military as modernizer' literature. Rut this strategy of neglect has made much scholarship irrelevant to understa~iding
the consequences of the massive upheavals unleashed by the process of military development in the postcolonial world. The main elements of the global security order are analogous to those of the 'global economic order'. They include such things as: local or regional conflict dynamics, the pursuit of status or hegemony, relations of power between dominant and subordinate actors, governing ideologies that shape state security policies, and forces such as technological innovation. Within this, milit~~ry development is the process that is catalyzed by the diffusion of 'nlodern' military technologies and techniques of organization to post-colonial states. It goes beyond simple measures of the growth and modernization of arnled forces, or of the transfer of technologies of warfare, t o encompass the development of m ~ l ~ t a doctrmes ry (e.g. m a s v. ehte armles, centralz e d v. decentrailzed control, defens~vev. offens~veforce postures); the creatlon of anc~lldryqtate and soc~etal~ n s t ~ t u t ~ and o n s practices (forms o f c ~ v ~ l - m ~ l ~relat~ons, tary patterns and norms of md~taryrecruitment and educat~on,c l a ~ m son economlc and s o c ~ a resources); l the cho~cesbetween d~fferento ~ e r ~ ~ r c h concepts lng of securlty (who or what represents the thre'lt, and how best to counter ~ tthat ) are ~ c c e p t e d the lust~f~catlon for constructby (or 1mpo4ed on) socletles and states Ing modern r n ~ l ~ t a restablishments. y CIS
Insecurity and Military Development in the Modern Middle East Two questions provide good starting points to demonstrate how such an approach can analyse security and insecurity in the contemporary Middle East 0
what have been the most important sources of insecurity driving the development and use of institutions of organized violence in postcolorlid Middle Eastern states/societies? how have patterns of military development within Middle Eastern states had an impact on the three dimensions of s e c ~ ~ r i outlined ty above?
In principle, this approach could examine postcolonial states of Africa, the Middle East or Asia, J S the processes of state-building and regime consolidation have occurred simultaneously with the incorporation of these states
2 12
Widening Security
into the global security order. My analysis, however, will concentrate on the Middle East, since it presents in a stark form many important features. By virtually any indicator one chooses, the Middle East is the most highly militarized region of the globe. Other states may have larger armies, arsenals or defense budgets, but in comparative terms (relative to population or wealth), Middle Eastern states rank at or near the top on many indices. Table 1 summarizes some of these figures. Further, the importance of interstate conflict makes the region a 'hard case' for my argument, since if I can demonstrate (even in a preliminary fashion) that factors other than interstate conflict need to be adduced in order to explain patterns of insecurity and military development in the region, then its utility in other regional contexts will be more securely established. Finally, the degree of state terror and repression in many states of the region is also high and organized violence (covert or overt) has been pervasive in political and social life. The first step towards challenging a structuralist account of state policy is to establish, even provisionally, that the expansion of the military capabilities of Middle Eastern states occurred in response to both internal and interstate imperatives. Until independence, most Middle Eastern states possessed only small 'constabulary' forces, suitable for maintaining internal order and supporting the regime, and dependent upon the external patron for training, materials and leadership. In Iraq, for example, Britain undertook after 1921 to train the Iraqi officer corps (which had inherited most of its personnel from Ottoman service) and to support the army with specific British-led forces (the Assyrian levies) and the Royal Air Force. Table 1: Military Indicators, Selected Middle Eastern States, 1991 Mil. Expend./ CNP
(global rank) Syria Iraq Egypt Jordan Saudi Arabia Algeria Israel Morocco
7 2 63 13 3 104 18 43
Armed Forces/ Popul. (global rank) 3 7 47 4 28 72 2.' 50
Weapons/ personnelb (ratio)
Weapons/ Personnel (global rank) 9 5 3' 64 15 7 25 21 59
"Figures used in column two on Israel's armed forces do not include reserve forces. Actual strength has varied between three and five times the active force level. The ratio (and global rank) assume an Israeli force of 650,000, the number (excluding reserve forces) is about 195,000. "The Weapons/Personnel ratio measures the number of major weapons systems per thousand soldiers. 'This ratio (and the global rank) assume an Iraqi force of 1.6 million soldiers, the real number was probably closer to 800,000. The recalculated figures would be: 7.56 (ratio) and rank of 22. Source: Columns one and two from United States Arms Control and Disarmament Agency (1994). Columns three and four (using 1985 data) from Wendt and Barnett (1993).
I
I
1
Insecurity and State Formation in the Global Military Order
21 3
Although Britain wanted to reduce the costs of maintaining Iraq's defences, it also wanted Iraq to create a small professional (non-conscript) army. Thus at independence in 1932, Iraq's armed forces numbered 11,500 (Hemphill, 1979). The Iraqi story was typical - in Jordan at independence in 1946 the Arab Legion numbered 6000 (and was British led until 1956); in Syria in 1945 the army was 5000 strong (not including the French T r o u p e s Speciales); i n E g y p t it was around 25,000; in Saudi Arabia it was
probably around 10,000 in 1947 (mostly tribal forces) (Be'eri, 1970: 335; Glubb, 19.57: 90; Hurewitz, 1969: 250, 450). These forces were almost exclusively used for maintaining internal order, and were seldom suitable for major war-fighting. Not all states, however, gained independence with small armies. Israel had an army of roughly 50,000 in 1948; Algeria after the war of independence had an armed force of about 130,000 (which was reduced by 1964 to 65,000) (Hurewitz, 1969: 189, 365). Morocco received upon independence in 1956 the transfer of 26,000 soldiers from the French and Spanish armies (some of whom had experience in World War 11), in addition to a few thousand independence fighters w h o were incorporated into the armed forces (Hurewitz, 1969: 340). The growth of armed forces in the region is summarized in Table 2, which charts changes in the number of soldiers of these eight states since World War 11. Although it does not correct for increases in population, the trend towards relatively massive military establishments is clear. These forces appear, however, to have grown in response to both externallsystemic and ~t in detail the more internal threats and insecurities. Even w i t h o ~ discussing involved aspects of military development (recruitment patterns, military doctrines, threat assessment), some suggestive evidence can be assembled. In several states, the experience of interstate war generated an immediate and pressing security conceru that fuelled military cle~dopment.The growth of armed forces in Israel, Egypt, Jordan and Syria was catalyzed by the 1948 and 1956 wars. The Egyptian army rose from 2.5 to 30,000 soldiers in 1948 to 80,000 by 195.5, Jordan's army increased from 6000 to 23,000 in the same period, Syria's army grew from 5000 to 25,000 and Israel's from around 90,000 (including civilian reserves) to 250,000 (Hurewitz, 1969: 4.50). Once new levels were reached, they set benchmarks for further expansion, as the armed forces never shrank (until recently), and their growth tended to outpace population growth in the region. The systemic influence of incorporation into the global security order, and the accompanying projection of the AmericanSoviet rivalry on to the Middle East, also played some role in the process o f military development. American military assistance efforts included the illfated Baghdad Pact, and the development of close military-security relationships with Israel (after 1967), Saudi Arabia (after 1965) and Egypt (after 1979). Soviet relationships with Egypt (after 195.5), Syria (after 1956) and Iraq (after 19.58) were :lnalogo~~s. In both cases, rnassive amounts of arms and military assistance were provided either at low cost, or via privileged access. Although these military assistance relationships did not create durable ties of bargaining influence hetween patrons and clients, and although the
2 14
Widening Security
Table 2: Armed Forces of Selected Middle Eastern States, 1946-90
Syria Iraq Egypt Jordan Saudi Arabia Morocco Algeria Israele
1946/48
1954/55
1960
1970
1980
5,000" 25,000 25,000+ 6,000 10,000 50,000
25,000 40,000 80,000 23,000 10,000' 28,000
45,000 70,000 100,000 36,500 35,000' 30,000 130,000d 65,000
75,000 95,000 255,000 70,000 65,000 65,000 80,000 105,000
250,000 430,000 447,000 65,000 79,000 117,000 101,000 196,000
-
54,000
1990 408,000 500,000+b 434,000 100,000 146,000 195,000 126,000 190,000
"Figures for 194516 from Be'eri (1970: 335). By the end o f the 1948 war Syrian forces had increased to 12,000. "This includes only regular forces. Mobilized reserves bring the total over 1,000,000. Figure from International Institute for Strategic Studies (1990).By 1994 the regular force had shrunk to about 380,000 (Cordesman, 1994: 194).
socialization effect of military assistance appears to be small, links with external powers have shaped the pattern of military development of postcolonial states, and have helped incorporate these states into a global military system (Krause, 1991). As a simple counter-factual, one could ask whether, in the absence of links with external patrons, the Syrians, Saudis, Egyptians or Iraqis would have constructed (or been able to construct) the same military establishments as emerged between 1960 and 1990. But a second set of forces - the pressure to use the army internally as a vehicle to hasten the process of state formation - was also at work. This pressure manifested itself most clearly in states that possessed low levels of legitimacy or weak and fragmented national identities. Iraq was a classic example - in the first four years after independence the army was doubled in size (to around 23,000), conscription was introduced, and nationalist political figures embraced the army as the symbol and defender of the nation. The coup de grace was the crushing of a 'revolt' by the Assyrians, which established the army's position as a critical prop for the central government
Insecurity a n d S t a t e Formation in t h e Global Military Order
2 15
and a force for national integration (Abbas, 1989: 203-7; Hemphill, 1979).h The first military coup occurred only three years later. In Syria, the early rapid expansion o f the armed forces in the mid-19.50s coincided with their use in the crushing of unrest and revolt among the Druzes, and to a lesser extent the Alawis (Ma'oz, 1972: 399). A similar pattern was manifest in Saudi Arahia, albeit somewhat earlier. The lkhuun (religious) and tribal forces of Ibn Saud conquered and unified most of the diverse tribes of the peninsula in the 1920s hefore formal statehood was achieved in 1932. As Nadav Safran (1985: 59) has argued, 'Ibn Saud's basic security concern ... in the period up to World War 11 ... was internal rather than external threats, and the practical problem was money.' He concludes that between 30 and 50% of state revenues were spent on defence and security. The armed forces fell into disuse and disrepair until the 1950s, when the political threat from Nasserist Egypt to the Saudi monarchy (including coup attempts) triggered the establishment of a loyal armed force which was quickly expanded (with American assistance) throughout the late 19.50s (Cordesman, 1984: 92-1 05; Safran, 1985: 103-10). In many cases, armed forces rhetorically patterned on Western models (to defend the state against external threats to its territorial integrity and national interests) evinced a deeper concern with internal security. Their primary mission has tended to be the defence of a particular ruling elite against internal threats to its control that rise from its narrow base o f support, or from a fractured polity. In some cases these internal and external security missions were fused for the entire armed forces; in others, strong 'royal guard' or elite forces were tasked with maintaining regime security, while opposition groups were shunted into 'gendarmerie' or semi-regular forces. For example, in Jordan after the coup attempt of 1957, the regime depended upon loyal Royal Guards brigades, and when the largely Palestinian national guard (which was as large as the regular army) was incorporated into the regular army in 196.5, only 4 0 % of its men were accepted (Hurewitz, 1969: 323; Safran, 1969: 440). The regime still possesses a 10,000-strong para-military force (International Institute for Strategic Studies, 1994). In Saudi Arabia, 'for internal defense the Saudi clan continued placing primary confidence in the tribal forces [the White Army]', which were as large as the regular forces (Hurewitz, 1969: 251). The White Army (renamed the National Guard in 1963) was also an important means of maintaining loyalty to the Saudi regime and funnelling money to tribal and village leaders. It was modernized in the early 1970s, and through the 1970s and 1980s it was more than two-thirds the size of the regular forces. In the 1970s the National Guard had 25,000 men, compared to regular forces of 35-45,000; in 1994, it had 57,000 active members (with 20,000 tribal levies) compared t o a regular force of 104,000 (Cordesman, 1984: 173-8, 218-21, 229; International Institute for Strategic Studies, 1994). In Syria, Hafez Asad's brother controlled (between 1971 and 1983) a 50,000man elite force (savaya al-difa') tasked with protecting the regime; this was later supplemented with a 10,000 strong Presidential Guard (Drysdale, 1985:
2 16
widening Security
248; Middle East Watch, 1991: 38-9). The regime also relies upon various special forces and 'political' military units, although the Defence Brigades have been subsequently reduced in size after they threatened regime stability. In Iraq, the Republican Guard, which was created in 1963 as a sort of 'elite corps of the regime', was supplemented later by the 'People's Army', a 75,000 strong (in 1979) adjunct of the Ba'ath party itself (Farouk-Sluglett and Sluglett, 1990: 93-4, 184). While one cannot specify precisely the balance between internal and systemic pressures, it is clear that both played a role in the process of military development in the Middle East. The most straightforward implication of this (echoing Barnett, Levy and David), is that domestic imperatives need to be incorporated even into explanations that focus strictly on the alliance formation or external orientation of Middle Eastern states. A more subtle implication, however, is that the process of responding to internal and external forces has consequences for the 'quest for security' that go beyond the level of state interactions, but which can only be grasped if one adopts a broader conception of the scope of security studies. It is to this interrelationship between military development and the quest for security that I now turn.
Three Dimensions of the Quest for Security in the Middle East Much more could be said about the specific circumstances that fuelled military development in these Middle Eastern states, but this sketch allows me at least to outline the interrelationships between the process of military development and the quest for security. At this stage, the discussion is more taxonomical than analytic, but since my main purpose is to establish the necessity of studying the different dimensions simultaneously to generate robust explanations, the more analytical task can be deferred. The consequences of this process of military development can be analysed along the three dimensions of security outlined previously - threats states pose to each other, threats posed by the institutions of organized violence to state institutions or regimes, and threats posed by those who control the means of violence to citizens and society. For reasons of presentation, I will start with the state and societal levels, and deal with the regionallinterstate dimension of security last.
State/Regime Security In most Middle East scholarship, the relationship between 'state-makers' and 'war-makers' has been ~ o s e din terms of the military role in ~olitics,and focused on studies of military participation and rule, and/or coup d'etats (Abdel-Malek, 1975; Be'eri, 1970; Haddad, 1965, 1970, 1973; Horowitz, 1982; Rabinovitch, 1972; Tahir, 1989; Tarbush, 1982). As some authors have pointed out, however (Owen, 1978; Picard, 1988), this approach does not help us answer the question of what threats the institutions of organized violence pose to the institutions of the state or to the regime in power. The
is
I i I-t
insecurity a n d S t a t e Formation in t h e Global Military Order
2 17
most effective exercise of military influence would be the complete absence of coup attempts, and hence a decline in the number of coups is hardly evidence that militarization is waning; likewise, a retreat of the military from formal positions of power says little about the way in which the boundaries of political debate may be set, and the constraints under which civilian politicians may operate. Although the direct role of the armed forces in Middle Eastern politics may have waned, with fewer coups and fewer army officers in cabinets (Baram, 1989; Re'eri, 1982; Cooper, 1982), the balance of social and political power between the military and other institutions has not necessarily changed. The armed forces arguably have a larger weight in the political and societal development of Middle Eastern states today than when they were small, faction-ridden and coup-prone. One way to aualyse this is suggested by Tilly's notion of a dynamic relationship between war-makers and state-makers. In the European experi~ a lof war-makers In creatmg the apparatus of the modern ence, the ~ n ~ trole state was ~ n o d ~ f r eover d tlme as a s y m b ~ o t ~r ecl a t ~ o n s h ~between p them 'ind other state-makers emerged. As p o l ~ t ~ c aInstltutlons l and effment modern bureaucracle5 emerged, the balance between the two groups t~ltedIn f,~vour of st~te-maker\who subord~ndtedthe armed forces to greater degree5 of control and reduced t h e ~ rrelat~vew e ~ g h tIn polrt~cal11fe. Borrowmg from T~lly( 1985: 1 75-7), t h ~ sglves ~t least three evolut~onarypatterns of LIVIIr n ~ l ~ t a rrelations ) citlzens coilld ~ncreasmglycontrol the state, w h ~ c hIn turn controlled the means ot organued v~olence; 2 dommant e k e (or self-~nterested'monarch') could control the \tate, and the means of organ~zedv~olence; the 'manager\' of orgdn17ed v~olencethemselbes could control the state.The f ~ r s would t correspond to a representative democracy, the second to an autIior~tari,inreglme (of varvlng degrees of seventy) and the t h ~ r dto a ni111tary junta or d ~ c t a t o r s h ~ pThe . Issue I S not, howeker, whether or not the people occup) lng these role\ wear un~forms,but rather w h ~ c hset of Interests they reprewnt, or cvh~ch~nterestsdoni~nateIn p o l ~ t ~ c and a l allocat~ve struggles. 5ome generals have been to tap c ~ 111,ln b bases of power; some c i v ~ l ~ a nhabe s been lnele puppet4 of the armed force\. The process of ' c ~ v ~ l ~ ~ ~ nthat ~ ~would a t ~ olead ~ l ' to the f m t outcome has 50 far been thwarted In the M ~ d d l eEast ( w ~ t hthe p a r t ~ a lexceptlon of Israel), and the s o c ~ ~and i l p o l ~ t ~ c droles l of m111tar~establ~shmentcIn the post-colon~alM ~ d d l eka\t have evolved along the last two paths, hoth of w h ~ c hhave li~stor~cal precedents. The 'doni~nantel~te'pattern t ~ t swell the late Ottoman experience. ~~~~~~~~y reform w ~ as near-contlnuous o h w s i o n of Ottoman rulers after ~ t sd e f c ~ t sby the R u s \ ~ a n sIn 1768-74, ~ l t h o u g h serlous measure\ could not he taken u n t ~ lthe de\truct~onof the ] a n ~ \ s a r ~ e \ (the a r c h a ~ cformer core o t the reglnie and the armv) In 1836 (Hurewlt7, 1969: 28-40; 5hau, 1965). Yet the proce\s of state-hu~ld~ng proceeded o n
2 18
Widening Security
a wide front, and the Ottoman response to systemic pressures generated farreaching domestic social, economic and political changes in the economy .~ reform and society, conducted under the umbrella of the T a n ~ i r n a tMilitary always occurred in the context of a robust and complex civil society, which has evolved towards more representative political models. The 'military junta' pattern resembles the Egypt of Muhammed Ali, the early 19th-century officer who took power after the Napoleonic invasion of Egypt had opened that area to Westernizing influences. Aside from reorganizing the army, opening an elaborate military training system and importing new weapons, Muhammed Ali also launched his personalistic empire-building effort by wiping out competing claimants for power and transforming social, political and economic relations (Farhi, 1972; Mitchell, 1988: 34-48; Ralston, 1990: 82-8). As Anwar Abdel-Malek (quoted in Ralston, 1990: 80) put it - 'for Muhammed Ali the army ... was everything, the pivot of national life. ... With the army as his starting point, Muhammed Ali constructed a state.' Contemporary cases, although not always clear-cut, also fit these two patterns. Syria, for example, falls in the 'military junta' pattern, in which those who control the instruments of organized violence also control the state, and use it to entrench their rule, or 'loot' it for personal gain. The dominant Asad-Alawi group plays a major role in all aspects of political and economic life, and the armed forces are highly sectarian. In 1980 Alawis commanded half of all army divisions and controlled all the military intelligence services (although they comprise no more than 15% of the population). In the 1980s smuggling, often run by the military itself, accounted for 70% of all non-military trade (Hinnebusch, 1990; Sadowski, 1987). The result was a state in which the armed forces consumed enormous amounts of resources (in relative and absolute terms) and played a heavy role in domestic political and economic life. This could also easily describe the Iraqi situation, and in both cases state managers have constructed extractive apparatuses that are outside of the 'regular economy' and which stall the possible emergence of a more symbiotic relationship between war-makers and other social force^.^ On the other side, one could argue that Jordan, Saudi Arabia and Morocco correspond to the 'dominant elite' model, in which the process of military development was more or less subordinated to the needs of the ruling elite (Cordesman, 1984; Safran, 1985; Vatikiotis, 1967). Of course, neither of these patterns is precisely followed, and one should not expect a long historical struggle to unfold without countervailing currents. Perhaps the two most interesting cases are Egypt and Algeria, which seem at this point to combine elements of both patterns. In Egypt, the existence of strong technocratic and state capitalist economic elites, and a relatively strong (i.e. legitimate) state has meant that post-1952 regimes have drawn support from a range of social forces and groups. Although the military has been a powerful actor, it has not occupied the stage alone. Civilian elites have an interest in keeping the costs of security down, in order to maximize their 'rentseeking' opportunities; as Crystal (1994: 272) has described it - the Egyptian business elite wants 'a state weak enough to loot, but strong enough to be
I
Insecurity and State Formation in the Global Military Order
2 19
worth looting' (see also Hinnebusch, 1988). But when faced with pressure to reduce its role after the 1979 peace with Israel, the armed forces protected its interests not by launching a coup, but by launching agricultural, industrial and infrastructure projects that maintained its role and status (Satloff, 1988; Springborg, 1989). Once 'the role of the army had grown so large and had begun to affect Egyptian life in so many ways ... it could no longer hide itself from public criticism'. The architect of these policics (Field Marshall Abu Ghazzaleh) was dismissed in 1990, and 'President Mubarak [has been] able to reassert greater control over the military budget' (Owen, 1992: 204-5). In Algeria, by contrast, the army was the dominant partner in the army1 party state, until the events of the early 1990s, and had always 'been the kingmaker at each critical j u n c t ~ ~ rin e Algerian politics' (Mortimer, 1996: 20). Especially throughout the 1980s, when the state was led by Chadli Benjedid (the highest ranking military officer a t the death of Houari Boumedienne in 1978), the armed forces managed t o maintain a high degree of institutional autonomy and 'certain of its officers enjoyed lucrative import licenses or access t o tidy commissions on state contracts' (Mortirner, 1996: 20). But the process of political transformation that began in the late 1980s was a response to the economic crisis of the 1980s, which crippled the ability of the army1 party state to continue its sentier status and t o 'buy off' other potentially discontented or disenfranchised social groups. The 1992 coup t o stave off the election victory of the Islamic Salvation Front (FIS) illustrated the inability of the armed forces t o manage the process of change, and testified to the weakness or discrediting of the traditional civilian political elite that had surrounded the FLN (Front de liberation nationale), while simultaneously reinforcing the continued importance of the army as the 'custodian of national values' and its institutional weight vis-a-visother social or political forces."' The reasons behind these two diverging paths of development are doubtless complex, but at least two can be suggested. First, early military intervention in the form of 'revolutionary officers' or reformist coups may have 'fixed' a certain pattern of politics that prevents the emergence of other 'modern' institutions (i.e. by instit~~tionalizing economic corruption and inefficiency tied t o satisfying demands of the armed forces, or by preventing the emergence of an independent capitalist or technocratic elite). As Raymond Hinnebusch notes in the Syrian case, 'from the moment Ba'thi officers brought the party to power ... it was likely that the military would be an equal or senior partner in the new military-party state, and that institution building would have to go on in concert with military leadership, not apart from it' (Hinnebusch, 1990: 157). This contrasts with the Egyptian experience, in which the 1952 Free Officers movement had to forge links with civilian technocrats and bureaucrats, and middle-class nationalists, in order to perpetuate its rule and construct a strong state apparatus (Hinnebusch, 1988: 12-39). Second, oil-rich rentier states such as Iraq and Saudi Arabia, or states with strong patron-client relationships with external powers (such as Syria and Jordan) have been able t o 'purchase' security (directly o r indirectly) without mobilizing societal resources. This has meant that whoever controls the means of violence has
220
Widening Security
been able to avoid the 'guns versus butter' trade-offs that could catalyze the 'civilianization' process, or have been able to enhance their position in this allocative struggle by lining up powerful external supporters. The civil war in Algeria illustrates what happens when this control breaks down. Societal/lndividual Security
The concept of societaVindividual security is concerned with the threats posed to citizens and institutions of civil society by those who control the means of violence, whether they are a dominant 'civilian' elite, or the managers of organized violence themselves. The only situation in which the institutions of organized violence pose no (or little) threat to society or to individuals is the one in which citizens exercise real control, a situation that does not correspond to many states in the Middle East. This captures the second of Tilly's dynamic relationships, in which the state essentially promises other groups and forces in society a certain level of security, in return for the resources it extracts to purchase this security. This relationship ultimately 'led to a civilianization of government and domestic politics', the subordination of institutions of organized violence to civilian control and, as a consequence, the military shed its internal security functions to concentrate on what grew to be considered as 'traditional' external threats to national security (Tilly, 1990: 206). By the late 1860s, most European states 'had decided to place all their emphasis on international war, and to allow their regular forces to slough off their police functions' (Yapp, 1975: 349). This has not been the case in most Middle Eastern states. In Egypt after Sadat's assassination, for example, the army,
... was able to establish its control over the major paramilitary force, the Central Security Police. ... As Field Marshall Abu Ghazzaleh was to define the relationship later the same year: 'the role of the police and the army are complementary and cannot be separated. To both of them falls a unique task: to guarantee the security of Egypt both internally and externally.' (cited in Owen, 1992: 204) The CSP (also known as the Central Security Forces) numbered in 1990 about 300,000 (almost as large as the Egyptian army), and its principal mission was to serve as 'the army of the police, the army of the Ministry of the Interior' (Middle East Watch, 1992: 29). The CSP was founded after the 1967 war, in order to provide Nasser's regime with an instrument of internal security that would enable demonstrations and dissent to be crushed without the direct use of the army. Likewise, in Iraq, 'for six decades the Iraqi army acted as an agent for internal repression'; in Algeria, the armed forces are fighting a civil war; in Saudi Arabia, the royal family tightly controls the upper echelons of the defence ministry (al-Khalil, 1989: 21; Safran, 1985). One consequence of this pattern of military development has been that the emergence of 'pluralist' politics and an autonomous civil society has
Aimit.
Insecurity and State Formation in the Global Military Order
221
been frustrated or suppressed." Although it may be the case that 'there is throughout the region a resilient civil society with a thriving associational life independent of effective state control', what is important is that associational life has developed in spite of great resistance from the state and institutions of organized violence, and that civil society has been effectively cut off from political life (Crystal, 1994: 270). The pattern of military development in most states has obstructed both the fusion of a coherent national identity under which other forms of affiliation are subsumed, and the emergence of overlapping patterns of identity and political participation that would diminish the primary importance of ethnicity or faith. The institutions of organized violence have thwarted such developments not just by their direct role in politics (i.e. as an autonomous political actor), but by the fact that these institutions represent a tremendous reservoir of political power that can be captured by a particular group. In states with weak 'national' identities, Tikritis, Alawis, Bedouins or Hijazis can, by their predominant influence over military institutions, entrench their positions and hence thwart the emergence of more pluralist or representative politics (Hinnebusch, 1990; I'icard, 1979; Sadowski, 1987). This experience directly contradicts the belief that the armed forces would act as an integrative force in a fractured polity divided along religious, ethnic and other lines. It also opens the door to a closely related consequence - repression and state terror as the institutions of organized violence become the enforcement arm of totalitarian politics. Few authors in security studies have attempted to 'analyze the consolidated political power generated by a merging of developed techniques of surveillance and the technology of industrialized war', and the role of these technologies and techniques in creating new methods of surveillance, social control and repression (Dandeker, 1990; Giddens, 198 1 : 295). Nor have scholars related social violence and terror (i.e. by secret police networks or resistance movements) to the broader pattern of military development within postcolonial societies." This goes far beyond the question of 'supplying instruments of repression'; rather, I am interested in the way in which military development has expanded 'the supervisory and information gathering capacities of the organizations of modern society', and has bent and fused other social institutions to the state and regime legitimation process (Dandeker, 1990: 2). Timothy Mitchell's (1988: 4 1-2) description of Muhammed Ali's reforms captures this well - 'it was an attempt to achieve the new order of the barracks and the battlefield, with its hierarchy of signal, movement and supervision, inscribed and enforced in the life of the village and peasant.' In the Middle East, the armed forces' continued role in domestic intelligence and security affairs facilitated the emergence of the 'rrzukhaharat (national security) state' - 'an authoritarianbureaucratic Leviathan whose stability derives more from fear than legitimacy' (Hudson, 199 1 : 408; Picard, 1988). The best documented case of this is Ba'athi Iraq, where no less than eight intelligence gathering agencies operate competing and overlapping networks to keep surveillance on each other (al-Khalil, 1989; Middle East Watch, 1990).
222
Widening Security
Similar, if less brutal, processes can be seen, however, in Syria, Morocco and Saudi Arabia, and in the activities of the armed forces against Islamic fundamentalists in Algeria, Israel and Egypt (Human Rights Watch, 1993: 331-8; Middle East Watch, 1991, 1992). This development goes tar beyond 'militarization' (defined as a prominent political role for the military) or even 'militarism' (defined in terms of pervasive military values and attitudes in society), and touches upon the ability of a small elite to control a state, and to impose upon society a particular definition of politics (and understanding of security) through repression and terror. The most chilling exan~plesof this can be found in the laws concerning political activity in Iraq or Syria, and the way in which the Ba'ath movement in both these states has created a party-army network of spies, informers and torturers. Although the armed forces have not been directly involved in many of these activities, internal and external security functions are still consolidated at decision-making levels (as illustrated by the Egyptian case), and the transformation from small constabularies to modern armies has brought with it the instruments of control (whether technologies or forms of organization) that made possible the mukhabarat state. The rendering insecure of entire populations or groups within a state may have little short-term impact on the external orientation of a state, and in fact the effective application of state terror can provide at least a semblance of stability. But this poses analytic problems for structural explanations of state behaviour - either such considerations are ignored, and hence the model is of limited explanatory utility (especially in dealing with the realignments that can follow regime change, such as in Iran, Ethiopia, Somalia or even Egypt), or they are included, which implies that one must incorporate the dimension of 'societallindividual security' into the analysis. The problem cannot be sidestepped by asserting that such issues fall outside the ambit of security studies, since by Walt's own definition, security studies ought to concern 'the ways that the use of force affects individuals, states and societies' (Walt, 1991b: 212). Even a preliminary reading of the Middle Eastern case shows that societalIindividual security is profoundly affected by the process of military development itself, which is at least in part driven by a response to interstate insecurities. The case for ignoring the domestic consequences of external policies, and the 'feedback' of these policies into external relationships, is thus not strong. RegionaVlnterstate Security
The general nature of the links between the different levels of security can be illustrated by focusing on the regionallinterstate dimension of the quest for security - the threats states pose to each other. Not surprisingly, the bulk of International Relations scholarship on the Middle East has concentrated on this dimension (and on superpower involvement in the region) (Cordesman, 1993, 1994; Kemp, 1991; Walt, 1987; Yorke, 1988). I will not review the details of the various regional conflicts here, but simply point out how systemic influences can affect the process of military development and how
i
r
t - i
Insecurity a n d S t a t e Formation in t h e Global Military Order
223
the regionallinterstate and other dimensions of security might interact in a negative way. The process of state-making and military development in the Middle East has in part been driven by external pressures manifested in preparation for, and actual fighting of, wars. This was evident in the already-noted expansion of armed forces in the aftermath of regional wars, and in the more diffuse pursuit of regional status and hegemony that influenced the policy choices o f states such as Egypt, Syria and Iraq. The creation and crystallization of the regional state system turned traditional rivalries between economic, cultural and historical centres such as Cairo, Teheran, Damascus and Baghdad into rivalries between states that expressed themselves in the quest for status or regional hegemony, often measured by relative war-making capabilities. In addition, military-technological influences, and particular ideas about the 'proper' structure for a modern armed force led to the development of a relatively high-technology 'combined arms capability'. In terms of equipment, forces that earlier possessed a high proportion of relatively low capability weapons (utility aircraft and trainers, armoured cars and personnel carriers) shifted so that they have much higher proportions of high-capability weapons (advanced fighter aircraft and tanks). This reflects a belief about the efficacy of modern military technology that is disconnected from the growth of the capability of the armed forces themselves. The region is rife with cases (Libya and Saudi Arabia among the most egregious) where weapons that could not be used by the existing armed forces were acquired in large quantities, only to rust in storage or be operated by foreigners at low levels of operational effectiveness. The more important issue concerns the way in which the regional1 interstate dimension of security might interact with the regime and societal levels. Negative linkages can be postulated in either direction - insecurities a t the regional level can exacerbate insecurities for the regime or its citizens, and vice-versa. The first is relatively easy to grasp - at the most basic level, war-making activities consumed enormous amounts of resources (as the figures in Table 1 suggest) that could have in principle been devoted to other developmental pursuits. Israel, Syria, Iraq and Jordan, for example, all have more than 20 soldiers per thousand ~ o p u l a t i o n(1993 data), and are among the top ten states in this category.'Wilitary expenditures in the Middle East (including Egypt, excluding North Africa) were well over 1 5 % of GNP throughout the 1980s (although they have dropped in recent years), while the global average was around 5.0% (United States Arms Control and Disarmament Agency, 199.5). Although there may be no direct trade-off hetween defence spending and economic growth (Ball, 19881, the opportunity costs of such expenditures loom large. Perhaps more indirectly, the inability of most Arab regimes to win regional wars has undermined their legitimacy, and forced greater reliance on repression and authoritarianism to maintain regime security. This was certainly the case in Egypt after 1967, in Iraq during and after the Iran-Iraq war, and possibly also in Syria (Hinnebusch, 1993; Ibrahim, 1993).
224
Widening Security
The quest for regionallinterstate security did not always involve huge direct costs. As Middle Eastern states became caught up in the rivalries of the cold war, patron-client relationships with external powers often meant the flow of huge sums in military and economic assistance to states such as Syria, Israel, Egypt and Jordan, and privileged access to modern weapons for those states that could afford to pay for them (Algeria, Iraq, Saudi Arabia). Although regional 'arms racing', fuelled and financed by the United States and the Soviet Union cannot be easily correlated with the outbreak of wars, 'government spending priorities in the Middle East reflected not only the absolute number of local conflicts but also ... the willingness of both the superpowers and local regimes to deal in goods and services that fostered those conflicts to the detriment of domestic development programs' (Anderson, 1992: 169). On a more subtle level, these relationships allowed Middle Eastern regimes to avoid compromises with local rivals, since the possibility always existed that a patron would help bankroll or support a bid for regional hegemony (or cover the losses from such a bid by replacing weapons, for example). Such behaviour was manifest by Syria and Iraq in the 1980s, in their respective conflicts with Israel and Iran (arguably the same could be said of Egypt and Israel). Of course, the yentier states of the region could avoid the gunsbutter trade-off not by depending on external support, but by avoiding any reliance on 'taxation' altogether (Waterbury, 1994).The economic crisis of the late 1980s, however, has somewhat altered this equation (Sadowski, 1992). The second negative interaction, where insecurities at the domestic level have an impact on regional security processes, is more difficult to grasp. In principle, when the institutions of organized violence control the state (or a particular regime depends on their support to control the state) then regional conflict resolution processes (such as arms control or confidence-building measures) that threaten the claim of the armed forces on national resources and priorities will be more costly (to the regime) to entertain. A regime may not be strong enough to withstand the resistance that would accompany initiatives to make peace with its neighbours. The opposition of the Egyptian armed forces to the peace with Israel and their subsequent behaviour (and President Sadat's assassination) is a case in point, as is the difference between the Syrian and Egyptian stances towards the peace process with Israel. More specific conflict resolution proposals such as controls on armaments, basing/ deployment restrictions, transparency measures or restrictions on the size of the armed forces, could impede a regime's ability to counter perceived internal threats to security. This makes Syrian (and to a lesser extent Jordanian) participation in such agreements more difficult to imagine. Thus when Geoffrey Kemp (1991: cover) notes that 'far-reaching arms control agreements ... will remain elusive until the key regional players realize that they have more to gain than to lose from such a process' it must be added that the most important 'players' are not states, but regimes, and their calculations of gains and losses may be different. Finally, and more subtly, there remains the issue of who defines security are the strategies that are adopted for managing regional conflicts and external
t
i
t
Insecurity and State Formation in the Global Military Order
225
threats based on the idea of a relentless military struggle, o r a defensive but military-based concept of how t o achieve security, or d o they include possihle transformations in the security environment (cooperative as well as conflictive solutions). The weakness of those social forces that would benefit the most from a transformation of the Middle Eastern conflict environment has meant the dominance of particular ideas concerning how regional security can be achieved. The difference between the Egyptian and Syrian approaches to peace with Israel, when compared to the economic policies both pursued in the late 1970s and 1980s (the Egyptian infitah, or economic opening to the West, versus a continued Syrian commitment to a tightly controlled command economy), again suggests that the different processes of military development might play a role in such decisions (Hinnebusch, 1988; Seale, 1988).
Conclusion The principal thesis of this article is that the quest for security in the developing world cannot be understood without reference to the process of military development, the insertion of states into the global security order and the state-building projects that new regimes have embarked upon. Thinking of 'security' in the developing world within the framework of states locked in a security dilemma has led scholars to ignore the broader forces that influence security policies and practices in the process of military development, and their complex interaction across the 'internal/external divide.'14 Such a narrow focus cannot even adequately explain the most concrete manifestation of the security dilemma (changes in military capabilities and the threats these pose) without reference to internal political and social processes. The most common response to this charge is that the orthodox concept of interstate security is adequate for the analytical task at hand, and that the other issues 1 have outlined (societaVindividual and regimehate dimensions of security) are important, but not relevant. At a deeper level, however, this too can be called into question, for what is at stake here is not only the appropriateness of the analytic tools of security studies scholars, but the definition o f the discipline itself. The definition promoted by Walt and others (Haftendorn, 1991; Nye and Lynn-Jones, 1988; Walt, 1991b) is historically myopic and Western-centric. The reason security studies scholars can unproblematically state that 'a subject that is only remotely related t o central political problems of threat perception and management among sovereign states would be regarded as peripheral' (Nye and Lynn-Jones, 1988: 7) is precisely because this rests upon a historically-specific resolution to the problem of evacuating the threat of organized violence from political life. With this achieved, 'security' became confined t o other things - in the international arena, to interstate threats; domestically, to 'social security' and the pursuit of welfare goals in advanced industrial societies. But transplanting this vision of security to the rest of the world ignores precisely what is distinctive, interesting and important about its security problematic.
226
Widening Security
Similarly, I argue that the occluded aspects of the orthodox definition are more important for understanding security policies and practices in the developing world. The 'ways that the use of force affects individuals, states and societies' (Walt, 1991b: 212) are especially important in states and societies where the institutions of organized violence are the only remotely modern ones, and where 'insecurities' have as much to do with the internal process of state consolidation and regime legitimation, or with relations between states and their citizens, as with interstate conflicts and rivalries. The consequences of 'military development' are not simply manifest in regional arms races and conflicts, but are felt directly by citizens in their often difficult relationships with institutions of organized violence. Interstate rivalries may actually arise from the process of state and regime legitimation (Herbst, 1990), or may be exacerbated by it, and the weakness of most states in the developing world (qua states) presents serious obstacles to regional conflict management projects that often depend on a high degree of internal cohesion and legitimacy to sustain the difficult political compromises and choices that must be made. The final argument for supporting the expanded conception of security studies outlined above is a normative one. While the equation of 'security' with the creation and maintenance of stable conflict relations between states might have been defensible during the East-West confrontation, it rests upon a ~roblematicsevering of security studies from broader currents of International Relations and political science, and ignores the consequences that the quest for security has had on political, social and economic life in developing and advanced industrialized states. Contemporary projects for security building cannot afford to reproduce this narrow focus. The research agenda that this redefinition of security studies implies is, however, a difficult one. It requires not only an integration into security studies of insights from other currents of International Relations (Baldwin, 1995), but a greater reliance on comparative politics, regional expertise and area studies. The intellectual 'costs' of this move are high, and while it is unlikely that many scholars will or could take up the challenge, it is crucial that the discipline of security studies at least make room for such work, rather than dismissing it as irrelevant to its central concerns. Similarly, insofar as the methodological tools of rationalist social science have become part of the baggage of conventional security studies (Haftendorn, 1991: 12; Walt, 1991b: 222), and are inappropriate to a broader approach, then room must also be made for alternative methodologies that are not judged by their ability to generate testable, generalizable, neo-positivist, hypotheses.15 With respect to the Middle East, the incorporation of the region into the global security order, the concomitant massive supplying of sophisticated military technologies, and the 'halo of prestige' that surrounds the region's modern military organizations, has driven the process of political change in Middle Eastern states and societies down particular historical paths, with often dramatically negative consequences for the security and well-being of
1
, i I.(
Insecurity a n d S t a t e Formation in t h e Global Military Order
227
their citizens. Not only has this been neglected by security studies analysts, but scholars concerned with the prospects for democratization and civil society in the Middle East have also neglected the systemic influences of interstate rivalries, and the itnpact of attempts to achieve interstate security on the prospects for political, economic and social change." Until both groups better understand the logic behind Middle Eastern states' military development choices, and the way i n which these may he shaped by systemic and internal forces, efforts to chart paths away from the pathological relationships that have characterized the region's political life will remain futile.
Notes I have henefited from input from a variety of people o n this project, in particuLlr Mich,lel Barnett, Jennifer Milliken, lkivid Mutinier, Michael Williams .lnd the anonymous referees for this journal. Earlier ( a n d partial) versions were presented a t C o l u m b ~ a University, York University, the [Jn~tersity of Wisconsin-Madison, Konstanz Un~versitya n d the Gr,ldu.lte I n s t ~ t u t eof International Studies (Geneva). T h e Social Science a n d Humanities Research C o u n c ~ l( C a n a d a ) has f ~ n m c i a l l ysupported this r e s e ~ r c h . I . A, Daniel Ileudney put it ( 1990: 463-4). 'if everything that c'iuses a decline in Iium,in well-heing is labelled a "secur~ty"threat, the term ... lwcomrs a loose synonym of "had"'. 2. Although I'ercival ad Homer-Dixon ( 1 9 9 5 ) d o focus o n the civil w a r in RwanJ.1, rather r h ~ nexclus~velyo n its interstate dimension. 3. M o r e soph~sricated:lrea s t u J ~ e sanalysts re nor, howevcr, necessarily as state-centric '1s the x h o l a r s cited above, and they d o often i~icorporatesuch issues as the use of force hy non-st,lte actors, o r the complex of state-society relations (for example, see Ken-Dor, 1983; Migdal, 1988). T h e target here, however, are the more conceptu,ll attempts t o dr'iw the h o u n d a r ~ e sof thc f~eld, w h ~ c htend t o exclude such people from security stud~es. 4. A fully worked-our study could a l w , a t least in princ~ple,incorporate these iswcs into Tilly's framework. 5. T h e term 'military development' has also been used by Kruce Arlinghaus ( 1984) t o rne,ln 'the growth and modernuation o f .irnied forces'. M y dcfinit~onIS consider:~bly broader. 6. T h e army w a s greatly reduced after 1 9 4 I, but it re-emerged after World War I1 w ~ t hthe same role a n d nilsslon. O n the e.lrlicr role of army officers in the emergence of modern Iraq after World War I, see Tauher (1993). 7. Tilly's account in turn leans o n trccleric L.ant., and ,tlthough I have replicated I.ane's three c,ltegories, T ~ l l ysuggests that 'monarchic control' 31id control by a d o r n ~ n a n class' r {nay not he the \Arne thing. 8. As Hurewirz (1969: 37) notes concernmg the C)ttorn,ln c.lse, what began a s rnilit'lry modern17arion in the early 19th century evolved in t w o directions, a n d 13)- the 1860s 'the modernization program / T t l t ~ z ~ t m... t / h~furcated,w ~ t hthe m i l ~ t ~ l rayn d civilians going t h c ~ r s e p ~ r a t eways'. 9. As l'ahir (IYX9: 1 6 ) notes: 'to ~ ~ n d e r s t a nthe d nature o f the [current Iraq11 systcn~,o n e must return t o its structur.ll origins in the c o u p d'etat of 19.58 ( m y t r a n s l a t ~ o n ) 10. For a n overmew o n A l g e r i ~see the contributions t o 'Algerie: la descentc a u x enfrrs', LC Cahicrs de l'Orient, 36-7 ( 1994-5); Mortirner ( 1996). I I. O n the debate o n c i v ~ lsoclety in the Middle East, see Norton ( 1 994,1995) and the journal of the Ibn Khaldoun Center tor 1)evelopment Studies ((:am)), Gild Society. 12. Andrew Ross ( 19871, tor example, lists 'military regimes' a5 his only domestic p o l ~ r ~ c a l
228
Widening Security
13. The world average is 4.4 soldiers per thousand population. The figures are - Israel, 36.8; Syria, 28.5; Jordan, 26.2; Iraq, 21.2 (United States Arms Control and Disarmament Agency, 1995). 14. For a recent example o f the persistence o f thinking about military development in interstate terms, see Cordesman (1993),which discusses internal civil conflicts, but does not analyse in any way how the pattern o f military development he exhaustively traces might be connected with them. 15. This raises an issue much greater than can be treated here. For an extended discussion, see Krause and Williams (1996). 16. This general neglect is reflected in most o f the contributions t o Norton (1994, 1995) and SalamC (1994).
References Abbas, A. (1989) 'The Iraqi Armed Forces, Past and Present', in Committee Against Repression and for Democratic Rights in Iraq (CARDRI),Saddam's Iraq: Revolution or Reaction?, pp. 203-28. London: Zed Books. Abdel-Malek, Anouar (1975)L'Armee duns la Nation. Alger: SNED. 'Algerie: La descente aux enfers' (1994-5) Special issue of Le Cahiers de L'Orient, nos. 36-7. Anderson, Lisa (1992) 'Remaking the Middle East: The Prospects for Democracy and Stability', Ethics and International Affairs 6: 163-78. Arlinghaus, Bruce (1984)Military Development in Africa. Boulder: Westview Press. Ayoob, Mohammed (1989)'The Third World in the System o f States: Acute Schizophrenia or Growing Pains?' International Studies Quarterly 33(1):67-79. Ayoob, Mohammed (1991) 'The Security Problematic o f the Third World', World Politics 43(2):257-83. Ayoob, Mohammed (1995) The Third World Security Predicament: State Making, Regional Conflict, and the International System. Boulder: Lynne Rienner. Azar, Edward and Chung-in Moon (1984) 'Third World National Security: Toward a New Conceptual Framework', International Interactions l l ( 2 ) :103-35. Baldwin, David (1995)'Security Studies and the End o f the Cold War', World Politics 48(1): 117-41. Ball, Nicole (1988)Security and Economy in the Third World. Princeton: Princeton University Press. Baram, Amazia (1989) 'The Ruling Political Elite in Ba'athi Iraqi, 1968-86', International Journal of Middle Eastern Studies 21(4):447-93. Barnett, Michael N. and Jack S. Levy (1991)'Domestic Sources o f Alliances and Alignments: The Case o f Egypt, 1962-73', International Organization 45(3):369-95. Be'eri, Eliezer (1970)Army Officers in Arab Politics and Society. New York: Praeger. Be'eri, Eliezer (1982) 'The Waning o f the Military Coup in Arab Politics', Middle Eastern Studies 18(1):69-8 1. Ben-dor, Gabriel (1983)State and Conflict in the Middle East. New York: Praeger. Booth, Ken (1991)'Security in Anarchy: Utopian Realism in Theory and Practice', International Affairs 67(3):527-45. Buzan, Barry (1991)People, States and Fear, 2nd edn. London: Harvester Wheatsheaf. Cooper, Mark (1982)'The Demilitarization o f the Egyptian Cabinet', International Journal of Middle Eastern Studies 14(2):203-25. Cordesman, Anthony (1984)The Gulf and the Search for Strategic Stability. London: Mansell. Cordesman, Anthony (1993)After the Storm: The Changing Military Balance in the Middle East. Boulder: Westview. Cordesman, Anthony (1994) Iran and Iraq: The Threat from the Northern Gulf. Boulder: Westview.
ik
I,ILI-L.
Insecurity and State Formation in the Global Military Order
229
Crystal, sill ( 1 994) 'Authoritar~anisn~ and its Adversartes in the Arab World', World Politics 46(2): 262-89. Crystal, Jill (199.7) O d and I'olitrcs in tbe Gulf: Rulers '2nd M P ~ C / J L in ~ Mk'urcwrt ~S nnd Qatirr. ~rpdatededn. Cambridge: Camhridge linlversity I'ress. Ilandeker, Christopher ( I 990) S u r ~ ~ c ~ l l a m I'olcw e , and Modernity. London: Polity. D a v ~ d Steven , ( 1 99 I ) 'Explaining T h ~ r dWorld Alignment', World Polrtics 4312): 233-56. Deger, Saadet and Kobert West (ed\) (1987) l>afensr, Sec-urity m i i I>evelopment. New York: St M d r r i n ' h I't-r\\.
Deudney, Dan~el( 1990) 'The ( h s e Aga~nstlinking Environrnettt,il Ikgradation and National Security', Millcnr~iumI9(.3): 46 1-76. Downing, Brian ( 1992) 7%e Mrlrtary Rel~~/lrtron m d Polttrcal (,'I~~ztzge:Origms of I l r n z ~ ~ ~ ~ r i z c y and Autocrilcy Early Modern Errrope. Princeton: I'rinccton University I'ress. Drysdale, Alasdn~r(1985) 'The Succes5ion Question in Syri.i', Mrddle Edzst /ourrrill, 39(2): 246-57. Eide, Ashjorn and hlarek Thcc (eds) ( 1 980) Problems of C:ontrmpornry Mrlrtarism. I ondon: Croom Helm. Farhi, David ( 1972) 'Nizan-i-cedid: M~litaryReform in Egypt under Mehmed hli', Asrilrr 'lnd African Strrtftc,~8: 15 1-83. Farouk-Sluglett, hlarlon and I'eter Sluglett (1990) l r q slrrc-e 19.58: From ~ e l ~ o / l l t l t~ ~t? Dictntorshlp. l.ondon: 1.13. T;iur~<. Finer, Samuel (1975) 'State- and Nation-Building In Europe: The Kole of the Mil~t~lry',in Charles l ' i l l y (ed.) T / J ~tr~rrnalionof Nutronal Stdtes r t r W'wtern t:rfrop~,pp. 84-163. I'riticeton: I'rinceton liniverhity Prcsb. Fisher, S~dney N. (cd.) (1963) '1'17~MilltL7ry in the Middle h s t . Columbus: Ohio StLite Ilniversity h e \ \ . Giddens, Anrhon) (198 1 ) T/JCN i ~ t r ~ ~ i r - Snird t d c Vlolcrz<-c.Camhridgc: Cambr~dgeIlntversit) I'ress. Gizewski, Peter a n d 'l'homas Homer-L)ixon (1995) Urbmz Growth m r i Violenrr: Wtll thc hrtlrrc, Rpsen~hlet h I'izst? ~ Prolect o n E'nvtron~nent,I'opulat~on and Security, Univers~tyof Toronto. Gluhh, John ( 19.57) A Soldier u~rththr Ara/~s.l.ondon: Elodder ,lnd Stoughton. tiaddad, <;eorge M. ( 1965, 1970, 1973) K ( W ~ / l f t l rrrrd o ~ ~M r l r t q lirrle m the Middle East, 3 vols. New York: Robert Spellel-,ind Sons. Haftendom, tlelp+~( 1991 ) 'The Security I'urxle: l'heory-I%i~tlit~g . ~ n dDisupline-Building in international Security', Itzt~rnat~(11~~11 Strrdies Qr~arterly3 i( I): 3-1 7. Halpern, Manfred (1962) 'The Middle Eastern Armies 2nd the New Middle C:lass3, 111 John lohnson (ed.) T / J ~Role of f/ie Milrtury irr U~zdcr(ic,ltelopi~cf( h n t r i e s , pp. 277-.1 15. J'rinceron: Princeton Un~\w-sityI're\s. Harkavy, Robert ,ind Edw.lrd Kolodr~el (eds) ( 1982) Sc,(-rcrrty Polr&s of l l e ~ ~ r l o p i r ~ l : (:oitntrrcs. L.exlngton: I.ruington books. Hernphill, Paul (1979) 'The Format~onof the Iraq1 Army, 1921-33', In hbhas Keltdar (ed.) T1~cIrztcgrution of M o c i ~ IYLIY, r ~ pp. 88-1 10. 1,ondotl: <:room Helm. Herlxt, Jeffrey (1989) 'The C.rear~onand M:~lntenance ot Natioml Koundartes in A f r ~ a ' , Interm7tio11al Organizatlott 4314): 673-91. Herhst, Jeffrey (1990) 'War ,lnd the State in Africa', Iriternczt~on~zl Sec-urity 1434): 1 17-39. ?n Undrr Sizdrt. updated edn. boulder: l.ynne Hinnebusch, Raymond ( 1988) ~ ~ p t l i Politzcs Reinner. Hinnehusch, Raytnond (1990) Authoritilriatr Power m d Stiztr lwrmation in Bn'athist Syrm. Army. Party '7nd Peasilnt. Boulder: Westview. Hinneb~tsch,Ray~iiond(199.3) 'State and CIWISocrery in S!.rt,l', Mrddlr Enst Journirl 47iL): 243-57. H i n t ~ e ,Otto (197.5) 'Mtlit;1rY Organi~~ttjon and the O r g a n t ~ ~ ~ t iofo nthe State', in Felix Gilbert (ed.) The Historrcd Essilys of Otto Hrntze, pp. 178-2 15. New York: Oxford Un~versityPress. Hirschrnan, Alhcrr 0. ( 1 977) The I'i~sstorrsa n d t l ~ eIntcrests. Princeton: Pr~nceronUn~t,ersity Press.
230
Widening Security
Homer-Dixon, Thomas F. (1991) 'On the Threshold: Environmental Changes as Causes of Acute Conflict', International Security 16(2): 76-116. Homer-Dixon, Thomas F. (1994) 'Environmental Scarcities and Violent Conflict: Evidence from Cases', International Security 19(1):5-40. Horowitz, Dan (1982) 'The Israeli Defence Forces: A Civilianized Military in a Partially Militarized Society', in Roman Kolkowicz and Andrei Korbonski (eds) Soldiers, Peasants and Bureaucrats, pp. 77-106. London: Allen and Unwin. Hudson, Michael (1991) 'After the Gulf War: Prospects for Democratization in the Arab World', Middle East Journal 45. Human Rights Watch (1993) World Report 1993. New York: Human Rights Watch. Hurewitz, J.C. (1969) Middle East Politics: The Military Dimension. New York: Praeger. Ibrahim, Saad Eddin (1993) 'Crisis, Elites, and Democratization in the Arab World', Middle East Journal 47(2): 292-306. International Institute for Strategic Studies (various years) The Military Balance. London: IISS. Jackson, Robert (1990) Quasi-States: Sovereignty, International Relations and the Third World. Cambridge: Cambridge University Press. Janowitz, Morris (1988) Military Institutions and Coercion in the Developing Nations, expanded edn. Chicago: University of Chicago Press. Johnson, John (ed.) (1962) The Role of the Military in Underdeveloped Countries. Princeton: Princeton University Press. Kemp, Geoffrey (1991) The Control of the Middle East Arms Race. Washington: Carnegie Endowment for International Peace. al-Khalil, Samir (1989) Republic of Fear. Los Angeles: University of California Press. Kolodziej, Edward (1992) 'What is Security and Security Studies?: Lessons from the Cold War', Arms Control 13(1): 1-31. Korany, Bahgat, Rex Brynen and Paul Noble (1993) 'The Analysis of National Security in the Arab Context: Restating the State of the Art', in Bahgat Korany, et al. (eds) The Many Faces of National Security in the Arab World, pp. 1-23. New York: St Martin's Press. Krause, Keith (1991) 'Military Statecraft: Power and Influence in Soviet and American Arms Transfer Relationships', International Studies Quarterly 35(3) 313-36. Krause, Keith and Michael C. Williams (1996) 'Politics and Method in Contemporary Security Studies', unpublished paper. Levy, Jack S. and Michael M. Barnett (1992) 'Alliance Formation, Domestic Political Economy and Third World Security,' The Jerusalem Journal of International Relations 14(4):19-40. Loescher, Gil (2992) 'Refugee Movements and International Security', Adelphi Paper 268. London: International Institute for Strategic Studies. McNeill, William (1983) The Pursuit of Power. Oxford: Basil Blackwell. Ma'oz, Moshe (1972) 'Attempts at Creating a Political Community in Modern Syria', Middle East Journal 26(4), 3 8 9 4 0 4 . Middle East Watch (1990) Human Rights tn Iraq. New Haven: Yale University Press. Middle East Watch (1991) Syria Unmasked. New Haven: Yale University Press. Middle East Watch (1992) Behind Closed Doors: Torture and Detention in Egypt. New York: Human Rights Watch. Migdal, Joel (1988) Strong Societies and Weak States. Princeton: Princeton University Press. Mitchell, Timothy (1988) Colonising Egypt. Cambridge: Cambridge University Press. Mortimer, Robert (1996) 'Islamists, Soldiers and Democrats: The Second Algerian War', Middle East Journal 20 ( I ) : 18-39. Neuman, Stephanie (ed.) (1984) Defense Planning in Less-Industrialized States. Lexington: Lexington Books. Norton, Augustus Richard (ed.) (1994, 1995) Civil Society in the Middle East, 2 vols. Leiden: E.J. Brill. Nye, Joseph and Sean Lynn-Jones (1988) 'International Security Studies: A Report of a Conference on the State of the Field', International Security 12(4):5-27. Owen, Roger (1978) 'The Role of the Army in Middle Eastern Politics - A Critique of Existing Analyses', Review of Middle East Studies 3: 63-81.
I
,,
insecurity and State Formation in the Global Military Order
231
O w e n , Roger ( 1 9 9 2 ) State, Pori~rrand Polrtrcs In the M~lkrrrg of the Modern Middle t.ast. London: Routledge. Parker, Geoffrey ( 1988) T / J Militdry ~ Rcvolntion: Milrtrrry Innotwtion iznd the Kisc of the West, 1 100-1 X 0 0 . Cambridge: Cambridge U n ~ v e r s ~ rPre\\. y Perc~val,VCllerleand T h o m c ~ tsl o ~ n e r - l h o n( I 99.5) E~zvrro~17tr~r1t~71 S~arcrtyand V ~ o k n C:ontl~(-t: t ' [ b eCirsc of IZr~~~ztr(in. I'rojecr o n tnviroti~nent,Populat~on, ~ n dSecur~ry,U n ~ v c r s ~ of t y Toronto. Perl~nutter, Amos ( 1977) Thcj Militizry m t i Politic-s in Moticrr~ Tirnes. New Haven: Y ~ l e LJnivcr-sity P r r \ \ .
I'lcard, Elizabeth ( 1 9 7 9 ) 'Clans r n ~ l ~ t a i r eets pouvoir ba'thistc en Syrie', Orirnt: 49-62. P ~ c a r d ,1:llzaheth ( 1988) 'Arab h11lit.lry in Politics: From R e v ~ ~ l u t ~ o nPlot , ~ r yto A u t h o r ~ t ' ~ r ~ , l n State', In Adeed D a w ~ s h a~ t i dW ~ l l i a mZartrnan (eds) Keyiinti (:ocrcron: T h e llurnhrlrty of t l ~ cArah St~ztc,.pp. 11 6-46. Imndon: Croorn Helm. ~ Symhrosrs. Rabinovitch, Ir,~mnr ( 1972) Syrio rrnder the Bn'ath, 146 3-66: T / J ( Army-Party N e w York: H,~lstrdPress. Ralsron, I I a v ~ d( 1990) Importrng the E L W O P CArtny: L Z ~ TIJCI n t r i h ~ t r ~(ifnt;14riip~an Mrlitizr)~ 'lcchnrqtr~s 'rnd Institritr~ns I ~ I ~ Othe t . x t r a - t , r i r o p ~ ~Vl/orld, ~~ 1600-1 91 4 , < : h i a g o : IJniversity of C:hicago Pre\a. Raslcl; Karen a n d William 'Iliompwn ( 1989) Wrzr ilnd State M~rkrng.R ~ s t o n Utiwin : H!I~JII. Ross, Andrew ( 1 9 8 7 ) ' D i m e n s ~ o n sof M~litariznrionin the Third World', Arwzeti torcrs ma' Sorrrtlj 1.3(4): 5 6 1-78. Sadowski, Yayha ( 1 9 8 7 ) 'I'atrorl,~ge and the Ba'th: C o r r ~ ~ p t and i o ~ Control ~ 111 Contemporary Syria', Arnlj Striifres Quirrterly 9 ( 4 ) : 442-6 I. Sadowski, Yayha ( 1 9 9 2 ) S~ricisor Rrittcr! T h e Polrtrci71 I;c-orrotny of Arnzs Control 111 rhc Mrddlr Lrst. Washington: T h e Brookings Instiruriorl. Safr,ln, Nadav ( 1969) From \Y;w to LVm New York: P e g ~ \ u \ . Safran, Naddv ( 198.5) Sarid~ArLrhiir:T h r ( : P O S ~ C S S Q r m t for .Sri-rlrrty.Harvard: Relknap h e \ \ . Sal,~rne,G h x s a n (etl.) ( 1994) I)c~noi-racyz~,rtho~lt I ~ C I I I O C 1~ 011c1on: ~ ~ S ~ I.B. Tauris. Satloff. Koherr ( 1988) Army m d I'i~litr(.s in M ~ l h i ~ r i l ktk, ~ y [ i tW . ~ s h ~ t l g t o nT:h e W , ~ s h ~ n g r o n Institute for N e , ~ rEast Policy. Sayigh, Y c z ~ d( I 9 9 0 ) ' C o n f r o n r ~ n gthe 1990s: Security in the lkvcloping C:ountriec', Adelphi I'L7pcr 2 5 1. London: IISS. Scale, Patrick ( 1 9 8 8 ) Asad of S~,rril:T h e Strrrgslc fijr tl!c, Mrdcil(' Fdst. London: I.K. Tz~uris. Shnw, Stanford ( 1 9 6 5 ) 'The O r ~ g ~ of n \ O t t o m a n M ~ l i t a r yReform\: T h e Nizam-i-Ced~dArmy of Sult,in Selim Ill', /ourrlol of Modtwi Hrstory 37(1):2 9 1-306. k ' ~ t.rirgtnrnti~timof the Political Orrfcr. Boulcicr: S p r ~ n g h o r g ,Ilobert ( 1989) M ~ i l ~ r a 1.fiypt: Wesrview Pi-?\\. : 'Ihhir, A h (198')) Ir'rk: Arrx 0r1grrrc.s ( ~ L IR6glrne M11rt~irr.c.l ' ~ r ~ \l.'H,~rrnatran. Tarlrhsh, M o l i a m ~ i ~ e(d1 9 8 2 1 7 ' 1 Kolc ~ c ~ the f Militizry rrr I'ijlitrcs: A Cimv Strrdy of lrcrq t o 1941. 1.ondon: Keg311 l'.1u1 Internat~onal. Tauher, Eliezcr ( 1993) The Eortnirt~ottof Modcrn S y ' r m d lr.,i~/.I.otldon: Frank C:as\. Till lor, Alan ( I 9 9 1 ) The S r i p r ~ p o u ~ r in r s thr M ~ d d l et;crst. S! r.lcu\e, Syracuse Univers~ryPress. T h o ~ n a s ,C a r o l ~ n e( 1987) In Srizrch of Scr~tuityHemel Hempste.ld: Harvester W h e a t s h e ~ t . T~lly,Charles (198.5) 'War-Making , ~ n dS t a r e - h l a k ~ n g,I\ O r g , ~ n i ~ cCrime', d In I'cter- E v ~ t l s , L>irtrich Rue\chemeyer, Theda Skocpol (eds) Rringrng i l ~ eSti~teBack 117, pp. 169-9 1 . C,~rnhridge:L ~ ~ n b r ~ dIln~verlity ge 1'1-es\. Till!, C:harles ( 1 9 9 0 ) Coc~rimirr. ( h p ~ t ~ rm l . d t;nropcnrr StLites, A.D. ')L,O-I090. O x f o r d : Blackwell. T'uchman M a t h e w , Jessicfi ( 1 9 8 9 ) 'Kedetining Secur~ty',F O ~ C IAffizrrs ~ I I 6 8 ( 2 ) : 162-77. l i n ~ r e d Sratcs Arms Control a n d D ~ s a r m a m e n t Agency ( \ ~ r i o u syears) World Mrllt'7ry Expenditnres iznti Arrm Tr~71rsfCrs.Washington: A(:L)A. Vatlkiotis, l!J. ( 1 9 6 7 ) Po11tri.s arrii the Military I I I / o r d m : A Study of the Arnh I.egion 192 1-.$7. 1.ondon: Frank <:,IS\. W ~ e v e r , Ole (199.5) 'IntroJuction', In Barry B L I Z J ~Ole , 'X'xver and J a a p d e W~ltie, 'Enwl-onrnent,il, Economic ,lnd Soc~etal Secur~ty', W r k ~ n gl'd[~rrs 10. <:openhagen: (:entre fol- I'e~ce a n d C o n t l ~ c tKesc,~rch.
232
Widening Security
Walt, Steven (1987) The Origins of Alliances. Ithaca: Cornell University Press, 1987. Walt, Stephen (1991a) 'Alliance Formation in Southwestern Asia: Balancing and Bandwagoning in Cold War Competition', in Robert Jervis and Jack Snyder (eds) Dominoes and Bandwagons: Strategic Beliefs and Great Power Competition in the Eurasian Rimland, pp. 51-84. New York: Oxford University Press. Walt, Stephen (1991b) 'The Renaissance of Security Studies', International Studies Quarterly 35(2):211-39. Waterbury, John (1994) 'Democracy without Democrats?: The Potential for Political Liberalization in the Middle East', in Ghassan SalamC (ed.) Democracy without Democrats?, pp. 23-47. London: I.B. Tauris. Wendt, Alexander and Michael Barnett (1993) 'Dependent State Formation and Third World Militarization', Review of International Studies 19: 321-47. Wolpin, Miles (1986) Militarization, Internal Repression and Social Welfare in the Third World. London: Croorn Helm. Yapp, Malcolm (1975) 'The Modernization of Middle Eastern Armies in the Nineteenth Century: A Comparative View', in V.J. Parry and Malcolm Yapp (eds) War, Technology and Society in the Middle East, pp. 330-66. London: Oxford University Press. Yorke, Valerie (1988) Domestic Politics and Regional Security: Jordan, Syria and Israel: The End of An Era ? Aldershot: Gower.
Constructing National Interests JuttaWeldes
T
he concept of 'the national interest' has long been central to theories of international politics because of its role in the explanation of state action.' Nonetheless, its analytical usefulness has been as often contested as defended. O n one side of this dispute stand critics who argue that the notion of the national interest, while seductive, also has grave flaws. According to Steve Smith, for exan~ple,the popularity of the concept is due not to its analytical power, which is suspect, but to the fact that 'it can be used to mean whatever the user wishes' and to its 'commonsensical appeal' (1986: 23-6). Others have pronounced the concept to be 'oversimplified and wrongheadedly dogmatic' (Hoffniann, 1978: 133) and denounced it as 'a weapon that saps democratic processes' because it is often used to stifle debate over foreign policy decisions and state actions (in Clinton, 1986: 49.5). For a variety of reasons, in short, some scholars have dismissed 'the national interest' as a moribund analytical concept with 'little future' (Rosenau, 1968: 39).' On the other side of this dispute are those who insist that the notion of 'the national interest' should ren~aincentral to explanations of state action and thus of international politics. Most prominent among this latter group of scholars are realists, who follow Hans Morgenthau in his assertion that 'the national interest' is explicitly 'the main signpost that helps political realism to find its way through the landscape of international politics' (1978: 5). In this article, I side with those who have argued for the continued salience of 'the national interest' to accounts of state action, and hence to theories of international politics. The national interest is important to explanations of international politics, and so requires adequate theorization, quite simply because it is the language of state action - in the making of foreign policy, the 'internal language of decision is the language of national interest' (Hollis and Smith, 1990: 166). As even one rather strong critic of 'the national interest' has admitted, ... [pol~t~call actors have found ... the concept useful both as a way of thrnkmg about t h e ~ goals r and as a means of rnobd~ztngsupport for them.
234
Widening Security
That is, not only do political actors tend to perceive and discuss their goals in terms of the national interest, but they are also inclined to claim that their goals are the national interest, a claim that often arouses the support necessary to move toward a realization of the goals. Consequently, even though it has lost some of its early appeal as an analytical tool, the national interest enjoys considerable favor as a basis for action and has won a prominent place in the dialogue of public affairs. (Rosenau, 1968: 34, emphasis in the original) In other words, 'the national interest' is important to international politics in two ways. First, it is through the concept of the national interest that policymakers understand the goals to be pursued by a state's foreign policy. It thus in practice forms the basis for state action. Second, it functions as a rhetorical device through which the legitimacy of and political support for state action are generated. 'The national interest' thus has considerable power in that it helps to constitute as important and to legitimize the actions taken by states. As Henry Kissinger recently put it - 'When you're asking Americans to die, you have to be able to explain it in terms of the national interest' (quoted in Kelly, 1995: 12). Because 'the national interest' in practice plays these vital roles in the making of foreign policy, and so in determining state actions, it clearly should occupy a prominent place in accounts of international politics. But how should 'the national interest' be conceptualized? In this article I argue that it should be understood as a social construction. Drawing on constructivist assumptions, I argue that before state officials can act for the state, they need to engage in a process of interpretation in order to understand both what situation the state faces and how they should respond to it. This process of interpretation, in turn, presupposes a language shared, at least, by those state officials involved in determining state action and by the audience for whom state action must be legitimate. This shared language is that of 'the national interest'. The content of 'the national interest', I then argue, is produced in, or emerges out of, a process of representation through which state officials (among others) make sense of their international context. The 'national interest', that is, is constructed, is created as a meaningful object, out of shared meanings through which the world, particularly the international system and the place of the state in it, is understood. In the next section I briefly discuss the conventional realist conception of the national interest, lodging two criticisms against it. The bulk of the paper then offers a constructivist retheorization of the national interest that overcomes the problems that plague this conventional understanding. In the third section I illustrate this reconceptualization of the national interest with a brief case study of the construction of US national interests in the Cuban missile crisis. I conclude the argument by discussing three important implications of this constructivist retheorization of 'the national interest'.
I
t i
Constructing National Interests
235
Problems with Realism With realists, I agree that 'the national interest' is crucial to our understanding of international politics. In both the classic and the structural or 'neo-' varieties of realism, the national interest - or what is sometimes called 'state interest' or 'state preference' - carries a considerable explanatory burden. IHowever, the way in which realists have conceptualized the national interest is inadequate. In this section I briefly discuss the realist conception and then point to two of its shortcomings in order to provide the starting point for a constructivist rethinking of the national interest. O n realist accounts, international politics differ from domestic politics primarily in their anarchic character. The absence of a supra-state 'Leviathan' places states in inevitable and perpetual competition - the so-called 'security dilemma' (e.g. Herz, 1951 ). As a result, states must necessarily be concerned with their survival. The general content of the national interest is thus determined deductively; it is inferred from the anarchic, self-help character of the international system.' For Morgenthau this meant that the fundamental national interest of any state was to 'protect [its] physical, political, and cultural identity against encroachments by other nations' ( 195 1: 972). More specific threats to states are determined by their relative power in the international system. That is, the particular threats facing a state or challenging its national interest are (or should be) 'calculated according to the situation in which the state finds itself', specifically with reference to the structure of the system -the distribution of capabilities or the number of great powers. 'To say that a country acts in its national interest', Waltz argued, 'means that, having examined its security requirements, it tries to meet them' ( 1979: 134).Power and wealth supply the means necessary for states to survive, to meet their security requirements, and thus to continue to compete in a system i n which other states are necessarily either actual or potential threats. Decisior1-makers and policy analysts are therefore advised realistically to assess the distribution of power; they should overcome their 'aversion to seeing problems of international politics as they are' (Morgenthau, 195 1: 7) in order objectively to assess their national interests in light of the distribution of power. Every state, that is, must pursue its national interest 'defined in terms of power' (Morgenthau, 19.52: 964) because this is the surest road to security and survival. O n this realist argument, then, the 'national interest' clearly plays a pivotal role in accounts of international politics. Through the need for security, it connects the nature of the international system, specifically anarchy and the distribution of power, with the policies and actions of states. There are, however, two problems with this realist notion of the national interest that are important for m y argument. First, its content - defined as the security and survival of the state - is so general as to be indeterminate. Second and more importantly for niy argument, this notion of the national interest rests on a questionable empiricist epistemology which ignores the centrality of processes of interpretation.
236
Widening Security
As many critics have noted, the deductive determination of national interests prevalent in realism has led to a conception of those interests which is 'too broad, too general, too vague, too all-inclusive' to explain state action (Sonderman, 1987: 60). The reason is simple -political realism 'deals with the perennial conditions that attend the conduct of statecraft, not with the specific conditions that confront the statesman' (Tucker, 1961: 463).4 It tells us that states pursue, or should pursue, security and, as a means to that end, power and wealth, but it does not tell us what exactly that means that states will, or should, do because 'the dictates of power are never clearly manifest' (Rosenau, 1968: 3 7 ) . As a result, realist analyses of the international system cannot 'convincingly' be related 'to specific choices in the world of action' (Rothstein, 1972: 353). The traditional realist conception of the national interest therefore cannot help us to explain the adoption by a state of particular policies over alternative means for achieving security. That is, it cannot tell us about the historically contingent content of the national interest as identified and pursued by state official^.^ 'The injunction to "pursue the national interest"', it seems, 'has no substantive content' (Rosenberg, 1990: 291)6and so is not very helpful for understanding the concrete actions of states in the international system. More importantly, the realist 'national interest' rests upon the assumption that an independent reality is directly accessible both to statesmen and to analysts. It is assumed that the distribution of power in the system can 'realistically' or objectively be assessed and, more importantly, that threats to a state's national interests can accurately be recognized. Morgenthau could therefore urge statesmen to overcome their 'aversion to seeing problems of international politics as they are' (1951: 7, emphasis added).7 The difficulty, of course, is that objects and events do not present themselves unproblematically to the observer, however 'realistic' he or she may be. Determining what the particular situation faced by a state is, what if any threat a state faces, and what the 'correct' national interest with respect to that situation or threat is, always requires interpretation. Rather than being self-evident, that is, threats, and states' national interests in the face of threats, are fundamentally matters of interpretation. For example, US decision-makers' statements to the contrary notwithstanding, the Soviet deployment of nuclear missiles in Cuba in 1962 was not self-evidently a threat to the US. To see it as a threat to US national interests - instead of, say, as the defense of Cuba - required significant interpretative labor. (I return to this example later.) The realist approach to international politics, with its assumption that threats are self-evident, cannot explain why particular situations are understood to constitute threats to the state. It therefore also cannot explain why certain actions, ostensibly taken in response to these threats, are 'in the national interest' in the first place.
T h e Construction of National Interests
Alexander Wendt's recent constructivist interventions suggest a way to begin to overcome the difficulties that plague the conventional, realist conception of
\\ i*iriil-, Constructing National Interests
237
the national interest. Wendt has convincingly argued, against realist orthodoxy, that 'self-interested', security-oriented conceptions of state interest are not produced by or deducible from the systemic condition of anarchy: instead, 'anarchy is what states make of it' (1992: 395)."his is the case because both the interests of states and the identities on which those interests depend rest not solely upon the structure o f the system but also upon the 'collective meanings that constitute thc structures which organire' state action. What is needed to explain state interests and thus state action, Wendt reasons, is a theory that accounts for the 'intersubjectively constituted structure of identities and interests' of states (1992: 401). Constructivisnl provides an approach within which to generate such a theory. It does so, specifically, on the basis of the fundamental principle 'that people act towards objects, including other actors, on the basis of the meanings that the objects have for them' (1992: 396-7), meanings that are intersubjectively constituted. Adopting a constructivist approach, that is, allows us to examine the intersubjectively constituted identities and interests of states and the intersuhjective meanings out of which they are produced. Wendt's constructivist argument goes some way towards reconceptualizing the national interest as the product of intersubjective processes of meaning creation. However, his analysis does not itself provide an adequate account of national interests for at least one important reason. Wendt's anthropomorphized understanding of the state continues to treat states, in typical realist fashion, as unitary actors with a single identity and a single set o f interests ( 1 992: 397, note 21)." The state itself is treated as a 'black box', the internal workings of which are irrelevant to the construction of state identities and interests. In Wendt's argument, the meanings which objects and actions have for these unitary states, and the identities and interests of states themselves, are therefore understood to be formed through intcr-state interaction ( 1992: 401 ). But the political and historical context in which national interests are fashioned, the intersubjective meanings which define state identities and interests, cannot arbitrarily be restricted to those meanings produced only in inter-state relations. After all, states are only analytically, but not in fact, ~lnitaryactors. The meanings which objects, events and actions have for 'states' are necessarily the rneanings they have for those individuals who act in the name of the state."' And these state officials do not approach international politics with a blank slate on to which meanings are written only as 3 result of interactions among states. Instead, they approach international politics with an already quite comprehensive and elaborate appreciation of the world, of the international system and of the place of their state within it. This appreciation, in turn, is necessarily rooted in .. meanings already produced, at least in part, in domestic political and cultural contexts. After all, as Gramsci argued, 'civil society is the sphere in which the struggle to define the categories of common sense takes place' ( 1 9 7 l a : 112)." In contrast to the realist conception of 'national interests' as objects that have merely to be observed or discovered, then, my argument is that national
238
Widening Security
interests are social constructions created as meaningful objects out of the intersubjective and culturally established meanings with which the world, particularly the international system and the place of the state in it, is understood. More specifically, national interests emerge out of the representations - or, to use more customary terminology, out of situation descriptions and problem definitions - through which state officials and others make sense of the world around them.12 This claim immediately raises three questions - constructed by whom? why? and how? As to the first - the pre-eminent site for the construction of the national interest is, not surprisingly, the institution or bundle of practices that we know as the state. Because identifying and securing the national interest is, in the modern international system, considered to be quintessentially the business of the state, those individuals who inhabit offices in the state play a special role in constructing the meaning of 'the national interest'. As Morgenthau argued, statesmen are the representatives of the state who 'speak for it, negotiate treaties in its name, define its objectives, choose the means of achieving them, and try to maintain, increase, and demonstrate power' (1978: 108). Exactly which state institutions and offices are involved in national interest construction will of course vary across states, but it is perhaps safe to say that the national interest is produced primarily, although not exclusively, by foreign policy decision-makers.13 As to the 'why?' - the answer is quite simply that for 'the state' to act, 'it' must have some understanding of its surroundings and some specification of its goals. In order to make sense of international relations, state officials necessarily create broad representations, both for themselves and for others, of the nature of the international system and the place of their state in that system. And to enable 'the state' to make a decision or to act in a particular situation, state officials must describe to themselves the nature of the specific situation they face. After all, people 'act in terms of their interpretation of, and intentions towards, their external conditions, rather than being governed directly by them' (Fay, 1975: 85). In the case of the Cuban missile crisis discussed below, for instance, US officials functioned with a broad representation of the international system as one of 'Cold War'. Within it, a narrower situation description, 'the Cuban problem', defined the particular relations that obtained between the US and Cuba and thus the narrower context of the missile crisis.14 Even more specifically, the problem faced by the US in October 1962 had then to be interpreted as the Cuban missile crisis, specifically, rather than, say, as a Cuban missile nuisance which, while annoying, demanded no US action. Finally, and most importantly, as to the 'how?' - the construction of national interests, I contend, works as follows. Drawing on a wide array of already available cultural and linguistic resources, state officials create representations which serve, first, to populate the world with a variety of objects, including both the self (i.e. the state in question) and others. These others include, prominently, other states, but may encompass as well the decisionmakers of other states, non-state actors, social movements, domestic publics,
I
Constructing National Interests
239
and the like. Each of these objects is simultaneously given an identity; it is endowed with characteristics which are sometimes precise and certain, at other times vague and unsettled. It might be endowed with leadership; it might he aggressive and hostile or peaceful and non-threatening; it might be potentially but not actually dangerous; it might be weak, strong or simply annoying. In the orthodox post-war US representation of international politics, for example, the world was pop~ilatedby a very particular United States, one understood to have a special 'global leadership'" role, as well as, among others, by aggressive totalitarians, duplicitous communists, puppets of the Kremlin, unstable underdeveloped states, friendly dictators, freedom-loving allies and uncivilized terrorists. Second, such representations posit well-defined relations among these diverse objects. These relations often appear in the form of quasi-causal arguments such as the 'Munich analogy' and the 'domino theory'.'" I call them quasi-causal rather than causal arguments because the relations and causal chains they posit may or may not be empirically valid on their own terms. Their importance lies not in their accuracy, but in their provision of 'warranting conditions' which 'make a particular action or belief more "reasonable", "justified", or "appropriate", given the desires, beliefs, and expectations of the actors' (Fay, 1975: 85).17 In providing warranting conditions, they help to specify, among other things, which objects are to he protected and which constitute threats. The domino theory, for example, establishes that 'when a small state falls victim to communism, surrounding small states will follow'. Throughout the 1960s, the nature of 'dominos' and the (putative) progressive logic of this 'theory' were invoked to provide warrants for the US to become, and then to remain, involved in the anti-colonial and civil war in Vietnam. The situation was understood to be such that, had the (constructed, not to say mythical) object 'South Vietnam' succumbed to 'Communist aggression' from (the equally constructed) 'North Vietnam', the surrounding dominos - Burma, Thailand, Indonesia, Formosa, the Philippines, New Zealand, Australia and finally Japan - would ultimately and necessarily have tumbled as well.'Vt was therefore reasonable and appropriate for the US, with its identity as the 'leader' in the global battle with 'Communism', to commit its troops to prevent the 'Communist take-over' of the 'independent' state of 'South Vietnam'. And third, in ~ r o v i d i na ~vision of the world o f international relations in populating that world with objects and in supplying quasi-causal or warranting arguments - these representations have alvendy defined the ~lational interest. Because 'identities are the basis of interests' (Wendt, 1992: 398), the interests of the state are already entailed within the representations in which the identities of and relations among the relevant actors or objects are established. Interests are entailed in these representations because they (seem to) follow from the specific identities of the objects represented and the relations posited to obtain among them. Once a situation has been described, that is, the national interest has already been determined - it emerges out of the representations of identities and relationships constructed by state officials.
240
Widening Security
To continue the example begun above, during the Cold War, once a situation had successfully been represented as one in which one or more aggressive totalitarian states were threatening the collapse of a domino, US national interests had already been determined. The US, with its identity as the leader of the free world, had an obligation - to itself, to its allies and to its moral convictions - to act to forestall the toppling of that domino. In short, the representations created by state officials make clear both to those officials themselves and to others who and what 'we' are, who and what 'our enemies' are, in what ways 'we' are threatened by 'them', and how 'we' might best deal with those 'threats'. In the case of post-war US foreign policy, for example, the Cold War representation of international politics constructed a reality in which 'we' (the US) were the 'winners' of World War 11, in which the United States therefore 'bore the burden of leadership' in the 'free world' and was obliged to 'defend' both 'democracy' and 'freedom'. It was a reality in which the US was threatened -psychologically, politically and militarily - by the 'expansion' of and 'aggression' from, among others, a 'totalitarian' Soviet Union and the 'international Communist movement' it sponsored. As a result, it was a reality in which the US had a national interest in 'maintaining a position of strength' in order that it fulfill its national interest in 'containing' this deadly threat to its very 'way of life'. In this way, the orthodox US representation of international politics, the prevailing description of the Cold War situation in which the US found itself, fleshed out the skeletal, abstract conception of the national interest in survival and power posited by realists by providing a rather more detailed picture of who was to be protected, from what threat, and by what means. National interests, then, are social constructions that emerge out of a ubiquitous and unavoidable process of representation through which meaning is created. In representing for themselves and others the situation in which the state finds itself, state officials have already constructed the national interest. l 9 In order to clarify the type of argument being made here, it is worth mentioning that, in examining the representations through which national interests are constructed, one is asking a particular type of question. Specifically, one is addressing a 'how-possible question' which asks 'how meanings are produced and attached to various social subjects/objects, thus constituting particular interpretive dispositions which create certain possibilities and preclude others' (Doty, 1993: 298). 'How-possible' questions are different from the conventional questions of international relations and foreign policy analysis since these ask 'why particular decisions resulting in specific courses of action were made'. These 'why questions', as Doty explains, are incomplete. In particular, they,
... generally take as unproblematic the possibility that a particular decision or course of action could happen. They presuppose a particular subjectivity (i.e. a mode of being), a background of social/discursive
\:
L 4 t ! ~ Constructing National lnterests
24 1
practices and meanings which make possible the practices as well as the social actors themselves. (1993: 298, emphasis in the original; see also Wendt, 1987: 362-5) In examining the social construction of the national interest of a state, one is thus asking not why a particular course of action was chosen but how it was possiblc, and indeed cornmo11-sensible, for the officials of the state to undcl-stand its national interest in one particular way, rather than in some other way.
R e p r e s e n t a t i o n s a n d t h e Construction o f National l n t e r e s t s
To understand just how nat~onalInterests are constructed requlres that we exnmine In more d e t a ~ the l representatlolls out ot w h ~ c hn a t ~ o n a lInterests l emerge. These represent,ltlons ,Ire themselves constructed In '1 s o c ~ aprocess w ~ t htwo a n ~ l p t ~ c a l ld~stinct y d ~ m e n s ~ o nusefullv s I ~ b e l e da r t ~ c u l a t ~ omn d interpellation. I discuss each of these dimensions in turn and then illustrate how they work by examining some salient aspects of the construction of the US national interest in the so-called 'Cuban missile crisis'. The term 'articulation'"' refers to the process through which meaning is produced out of extant cultural raw materials or linguistic resources." Meaning is created and temporarily fixed by establishing chains of connotations among different linguistic elements. In this way, different terms and ideas come to connote one another and thereby to be welded into associative chains (Hall, 198.5: 104). Most of these terms and ideas - what I am calling linguistic elements or linguistic resources - are ones already extant within a culture. That is, they already make sense within a particular society." In the post-war US, for example, these linguistic elements included nouns such as 'terrorist' and 'puppets", adjectives like 'totalitarian', 'expansionary' and 'defensive', metaphors like 'the market' or 'dominos' and analogies to 'Munich' or 'Pearl Harbor'. The process of articulation is one in which such extant linguistic resources are combined to produce contingent and contextually specific representations of the world. The language of the national interest furnishes the rules according to which these articulations are forged. In representations of Cold War US foreign policy, for instance, the object 'totalitarianism' was persistently articulated to, and thus came to connote, 'expansion' and 'aggression'. As a result, when 'totalitarianism' was invoked, it si~nultaneouslycarried with it (among other characteristics) the meanings of 'expansion' and 'aggression'. And when these linguistic elements were further articulated to notions such as 'puppets of the Kremlin' and 'international Communism', they came to constitute a partial representation of the international system. In the process of articulation, then, particular phenomena, whether objects, events or social relations, are represented in specific ways and given particular meanings on which action is then based. With their successful repeated articulation, these linguistic elements come to seem as though they
242
Widening Security
are inherently or necessarily connected and the meanings they produce come to seem natural, to be an accurate description of reality. Despite this apparent naturalness, however, the connections or chains of association established between such linguistic elements are in fact conventional - they are socially constructed and historically contingent rather than logically or structurally necessary. The contingent character of such associations is captured well in the term 'articulation' itself. As Stuart Hall has said,
... the term has a nice double meaning because 'articulate' means to utter, to speak forth, to be articulate. It carries that sense of language-ing, of expressing, etc. But we also speak of an 'articulated' lorry (truck): a lorry where the front (cab) and back (trailer) can, but need not necessarily, be connected to one another. The two parts are connected to each other, but through a specific linkage, that can be broken. (1986b: 5 3 ) The non-necessary character of any particular articulation means, of course, that these connections can be contested. This contestability has two important consequences. First, it means that specific articulations are never simply produced once and for all. Instead, to prevent them from coming unglued, or from being forcibly pried apart, they have always to be reproduced and sometimes quite vigorously. Second, it means that any articulation can be uncoupled and the resulting component parts rearticulated in different, and perhaps even novel, ways. Put simply, alternative representations of objects and social relations are always possible. US Cold War representations have been the target of such attempts at rearticulation. For instance, dissenters from US orthodoxy, both within and outside of the US, have persistently sought to disarticulate 'the US' from 'freedom' and instead to couple 'the US' To the extent that such a rearticulation with 'imperialism' and 'aggre~sion'.~~ is successful (i.e. persuasive), the result is a very different description of the international system, one in which the US does not exercise leadership in the global defense of freedom but instead exercises its self-interest in the imperial or neo-imperial expansion of its influence. In short, then, articulations are contingent and can be forged in different ways. The actual meanings that objects like 'the US' and 'the Soviet Union' have for people, the actual articulations or chains of connotation which define them, are rooted in part in the linguistic practices of particular historical and social contexts. They are the conventional product of continuous and contested social processes of meaning creation.24 The reason that articulations must continuously be reproduced and that linguistic elements can be disarticulated and then rearticulated in different ways is that objects, events, actions or social relations 'can be differently represented and construed'. This is so 'because language by its nature is not fixed in a one-to-one relation to its referent but is "multi-referential": it can construct different meanings around what is apparently the same social relation or phenomenon' (Hall, 1986a: 36). Objects, actions, events and relations, that is, do not simply present themselves to us in an unmediated
I
t
Constructing National Interests
243
or self-evident fashion. Instead, their meaning for us is created; it is produced by articulating different linguistic elements so as t o create and render persuasive one particular description or set of associations and not another. This, of course, raiscs an important question often asked of constructivist analyses; namely, what 'degree of freedom' exists in the forging of articulations and, more concretely, what 'degree of freedom' d o state officials enjoy in constructing narratives about international relations and thus in constructing the national interest. Unfortunately, there is n o simple o r abstract answer t o this question because it is an empirical one that requires a response grounded in extensive empirical analyses. Such analyses would demand an elaborate investigation of, among other things, the range of interpretive possibilities permitted by the interacting discourses or intersubjective structures of meaning alrailable within a particular situation a t a particular historical juncture.lF The larger question, of course, concerns the 'reality constraints' that face both state officials and analysts in the construction of their representations of international politics and the national interest. Recognizing the social construction of national interests does not deny that such constraints exist. Criticizing the orthodox US construction of its national interest in the so-called 'Cuban missile crisis', for example, does not mean that one has to deny that missiles were indeed placed by the Soviets in Cuba. Indeed, any interpretation of 'the missile crisis', t o be plausible, must recognize and account for these missiles. In this sense, the missiles function as a 'reality constraint' on the construction of plausible narratives. But this constraint is quite loose and may allow a wide range of quite dramatically different representations, as I show helow. Clearly, then, a constructivist argument does not entail the more radical assertion that there is n o 'external reality' outside of human consciousness if by 'external reality' is meant physical reality. What is at issue in the claim that national interests are socially constructed is meaning and its social effects, not physical existence. As Purvis and Hunt have put it, 'Of course earthquakes occur, and their occurrence is independent of consciousness; but it is their construction in discourse that determines whether they are "movenients of tectonic plates" or manifestations of "the wrath of the gods"' (199.3: 492). The articulation of linguistic elements into connotative chains is one part of the process of fixing intersubjective meaning and so is one part of the process of constructing national interests. The other part of this constructive process involves the interpellation of subjects.'" Interpellation refers to a dual process whereby identities o r subject-positions are created and concrete individuals are 'hailed' into (Althusser, 1971: 174) or interpellated by them. That is, interpellation means, first, that specific identities are created when social relations are depicted. Different representations of the world entail different identities, which in turn carry with them different ways of functioning in the world, are located within different power relations and make possible different interests. Second, concrete individuals come t o identify with these subject-positions and so with the representations in which they
244
Widening Security
appear. Once they identify with these subject-positions, the representations make sense to them and the power relations and interests entailed in them are naturalized. As a result, the representations appear to be common sense, to reflect 'the way the world really is'.27 In discussions of a state's national interest, a variety of subject-positions are created, including those of various states - both 'our state' and 'their state', or 'us' and 'them' (in fact, typically a variety of 'thems') - and of nonstate actors. The central subject-position created in any representation of international relations or any discussion of 'the national interest' is, of course, that of the relevant state itself. Within US discussions of the national interest, for example, it is the 'United States' that occupies the central subject-position. Most fundamentally, such representations establish the existence of 'the United States' as a subject. Out of a political and legal abstraction designating a territory, a population and a set of governing principles and apparatuses is created an anthropomorphization, an apparently acting subject with motives and interests.28Moreover, these representations establish that the US is a particular kind of subject, with a specific identity and with the interests attendant on that identity.29 As a result of the interpellation of this subjectposition, 'the US' becomes the central object of discussions of US foreign policy and national interests - it, rather than, say, individual American citizens, is the primary object which the national interest is to secure. At the same time, 'the US' becomes the central subject of such discussions; it is not only the object to be protected but the subject charged with doing the protecting. The interests articulated in discussions of US 'national interests' are the interests of the subject 'the United States'; the warrants for action generated through these representations justify and legitimize actions taken by that subject in defense of its own interests.j0 In addition to highlighting the creation of subject-positions, the notion of interpellation simultaneously points to the fact that concrete individuals recognize themselves in these representations of the world (e.g. Eagleton, 1991). In the language of the national interest, the task of interpellation, of generating recognition and identification, is in part accomplished by representing the relevant state, 'the US' for instance, not only as a subject, but as a subject which represents an 'imagined' national community (Anderson, 1991). Representations of 'the US' and its national interest, that is, draw on a 'representation of belonging' (Tomlinson, 1991: 81), For most Americans, the subject-position 'the US' at the center of orthodox US representations of international politics brings with it a sense of belonging to an American national community. Through this representation, aided by state officials' use of 'we' in describing the policies and actions of the US state, individuals are interpellated into the language of the national interest as members of the imagined American community. The success of the interpellations forged is clear, in the case of the US, from the ubiquitous use of the term 'we' by Americans in discussing actions taken by the US state. It is striking how often Americans identify with the foreign policies and actions of 'the US', asserting quite unselfconsciously that 'We had to show the Communists that
\tv
t)lcic
i
Constructing National lnterests
245
they couldn't interfere in Vietnam', that ' W e should retaliate against the Japanese for their unfair trade practices' and that 'Wc kicked Saddam's butt'." Part of the common-sense status a n d hence the legitimacy of postwar US national interests has resulted precisely from the often unquestioned identification of individual Americans with 'the US', the imagined subject of the US national interest. This process of interpellation thus helps t o explain why pronouncenients by US state officials are often unhesitatingly accepted by much of the American public. T h e process of interpellation is facilitated hy the fact that representations of international affairs generally contain multiple subject-positions into which concrete individuals can be interpellated. Claims about the US national interest, for exarnple, make sense t o most Americans because they are interpellated into a variety of already familiar subject-positions. As noted above, they are hailed into the position of 'the US', into the imagined national community of Americanness. In addition, they are sinlultaneously hailed into other familiar subject-positions, including such comfortable identities as the 'freedom-loving democrat' w h o opposes communism, the 'concerned American patriot' w h o believes that 'we' should protect Americans abroad, and the 'civilized Westerner' w h o is appalled by the excesses of Middle Eastern terrorism. These identities help t o make sense of the claims entailed in discussions of US national interests. For example, since 'we' Americans are 'freedonl-loving democrats' and 'civilized Westerners', it makes sense that 'our' US interventions abroad are designed to advance liberty and freedom, not t o promote self-interest o r tyranny. As this discussion begins to indicate, the dual processes of articulation and interpellation are of central irnporta~lcein the c o ~ ~ s t r u c t i oofn 'the national interest'. Through these processes, visions of the international system - including descriptions of one's own state, of other states and of threats - are created. These representations, in turn, already entail national interests. An exarnple will hopefully make this rather abstract argument more concrete. To illustrate the way in which articulations create conventional representations that simultaneously interpellate subject-positions and bring with them particular national interests, I examine the US construction of its national interest during the so-called 'Cuban missile crisis'.
Constructing U S National lnterests in t h e 'Cuban Missile Crisis'32
W ~ t h ~the n US, the nature of the so-called 'Cuban m~ssdec r ~ s ~ISs ' treated as self-ev~dent- the sltuatlon faced by the US In October o t 1962 was, and st111 IS, unproblemat~callyunderstood to have been the threat created by the Sowet deployment of offenswe, nuclear-capable mlss~lesIn Cuba. T h ~ sdeployment was seen as a clear threat t o the US because ~twas an Instance o f secretive, dupllc~tousand dangerous aggression by a t o t a l ~ t a r ~ aSowet n Unmn agalnst
246
Widening Security
the US in particular and, more generally, against the Western h e m i ~ p h e r e ~ ~ over which the US, through the Monroe Doctrine, had long ago established protective custody. The US national interest was just as clear - the Soviet missiles had to be removed from Cuba. As Douglas Dillon, then Secretary of the Treasury, has since explained, 'we had agreed at the very first [ExComm] meeting' on October 1 5 'that the one thing we were all committed to was that the missiles must be removed'. Furthermore, he has, commented While everyone at our first ExComm meeting, specifically including the President, agreed that the emplacement of Soviet MRBMs and IRBMs in Cuba was totally unacceptable and that they had to be gotten out one way or another, I do not recall any specific discussion then or at later meetings of the ExComm as to just why they were unacceptable. It just seemed obvious to all of us. (quoted in Blight and Welch, 1989: 49, emphasis added) As obvious as this understanding was to US state officials, however, both this representation of the situation and the accompanying US national interest were in fact social constructions; as I argue below in more detail, they could have been, and actually have been, constructed quite differently. In the US, nonetheless, the 'Cuban missile crisis' was clearly represented, and continues typically to be ~ n d e r s t o o d as , ~ a~ case of aggression perpetrated by the Soviet Union against the US and the Western hemisphere under its protection. Despite the modifier 'Cuban', the central threatening object in this 'crisis' was, of course, the Soviet Union, defined, as seemed natural and 'obvious' both to US state officials and to much of the US public, as aggressive, secretive and duplicitous. Soviet aggression featured prominently in official US representations of the 'crisis' of October 1962. In his briefing of the Mexican Foreign Minister on 22 October, Douglas Dillon characterized the Soviet missile deployment as an 'invasion of the hemisphere by a foreign power' (quoted in Abel, 1966: 117). In his speech to the Organization of American States (OAS), Dean Rusk called it 'aggressive intervention' into the Western hemisphere (1962: 721). Similarly, in the United Nations, Adlai Stevenson insisted that Cuba was an 'issue' because Castro 'has aided and abetted an invasion of this hemisphere' (1962: 730). And in the secret ExComm meeting of 2 7 October, Rusk maintained that 'The Cuban thing is ... an intrusion into the Western Hemisphere' (in Blight, 1987188: 38). That the Soviet missile deployment was aggression (rather than, say, the defense of Cuba) was, on this representation, not in doubt. But the problem faced by the US in October 1962 was even worse. Not only was the Soviet Union acting 'aggressively' by 'invading' the Western hemisphere with its missile deployment, but it had done so in a manner that betrayed the secretiveness characteristic of 'totalitarianism'. In fact, the secrecy of the Soviet weapons deployment, rather than simply the installation of the
I
Constructing National Interests
247
ni~ss~les, w m e t ~ m e sappears to have been the malor cause for the crlsls. In 111s speech on 22 October, for Instance, Kennedy tns~stedthat ' t h ~ ssecret, s w ~ f t ,and e x t r ~ o r d ~ n a rhyu d d ~ ~ofp Commun~stm~sstles... t h ~ ssudden, clandestine d e c ~ s ~ oton statton strategic weapons for the f m t tune o u t s d e of Sovlet s o ~ l wa\ ' 'A deltherately provocative and unjust~ftedchange in the status quo' ( 1 962: 5-6, emphas~sadded). H~ghlightmgthe 'cloak of secrecy' (Kennedy, 1962. 5 ; R u s k , 1962: 720) under which the Soviet rnrssrle deployment proceeded was an tntentlonal strategy adopted by US state offic~als. As Sorenson has stnce explamed, Kennedy
... worried that the world would say, 'What's the difference between Soviet missiles ninety miles away from Florida and American missiles right next door to the Soviet Union in Turkey?' It was precisely for that reason that there was SO much emphasis on the sudden and deceptive deployment. Look at that speech [of 22 October] very carefully; we relied very heavily on words such as those to make sure the world didn't focus on the question of symmetry. We felt that helped to justify the American response. (quoted in Blight and Welch, 1989: 246, emphasis in the original) The outrage produced by the secrecy with which the Soviet missiles were being deployed was rivaled only by the affront of Soviet duplicity. In his missile crisis speech, Kennedy stressed this duplicity, arguing that the Soviet deployment 'contradicts the repeated assurances of Soviet spokesmen, both publicly and privately delivered, that the arms buildup would retain its original defensive character and that the Soviet Union had no need or desire to station strategic missiles on the territory of any other nation' (1962: 3 ) . In his speech to the OAS, Rusk emphasized Soviet deception as well, charging that the Cubans and the Soviet Union were engaged in a 'partnership in deceit'. 'The Communist regime in Cuba', he asserted, with the complicity of its Soviet mentors hus deceived the hemisphere, under the cloak of secrecy and with loud protestations of arming in selfdefense, in allowing an extracontinental power, bent on destruction of the national independence and democratic aspirations of all our peoples, to establish an offensive military foothold in the heart of the hemisphere. ( 1962: 720, emphasis added) O n the US view, clearly, the missiles were 'offensive' in nature" and any claims to the contrary were Soviet 'deception'.'" According to this representation, then, the Soviet missiles in Cuba were offensive weapons, deployed secretively and with duplicity by an aggressive totalitarian state for the purpose of threatening the US and the Western hemisphere. The US national interest entailed in this representation was unambiguous and quite obvious to US state officials. As General Maxwell Taylor later explained, 'the President announced his objective within the hour of
248
Widening Security
seeing the photographs of the missiles: it was to get the missiles out of Cuba' (quoted in Blight and Welch, 1989: 77). The Puzzle
The question I want to ask is, how was this 'obvious' understanding of the situation, and the equally 'obvious' US national interest, arrived at?" After all, the situation could have been represented quite differently. The official Soviet account of the 'Caribbean Crisis' (e.g. Gromyko, 1971; Khrushchev, 1970) and the official Cuban story of the 'October crisis' (e.g. Dorticbs, 1962; Castro, 1992), for example, provide alternatives to the orthodox US representation. In both cases the Soviet missile deployment was understood as a defensive measure designed to protect Cuba from anticipated US aggression. Moreover, one can imagine other narratives that would present these events, and the attendant US national interest, in ways quite different from the official narratives of any of the participating states. Yet in the US, a single representation - that of the 'Cuban missile crisis' - has 'assumed genuinely mythic significance' (Blight et al., 1987: 170). To highlight the constructed character of the 'Cuban missile crisis' and thus to make it clear that the US representation of that crisis does not simply reflect 'the facts', I briefly present two alternative accounts of the events of October 1962. The first alternative, which I will call the 'defensive' narrative, is an amalgam of some of the salient aspects of the stories of the 'Caribbean' and 'October' crises; the second, which I will call the 'strategic' narrative, is a partially hypothetical account constructed to illustrate the possibility of yet other representations of these events. The stories of the 'Caribbean' and 'October' crises depict an altogether different crisis than does the US account of the 'Cuban missile crisis'.38 This 'defensive' narrative highlights the defense of Cuba against US aggression. In this alternative account, the crisis has its genesis in a long history of US hostility toward and aggression against Cuba. The 'neocolonialist methods of imperialism' (Castro, 1981: 87) pursued by the US in the Western hemisphere and towards Cuba in particular were challenged by the Cuban Revolution of 1959 and the model of a socialist system that it presented to the other states of Latin America. As a result, the US began almost immediately to pursue aggressive policies against Cuba that were 'organized with a view to forcibly changing its internal system' (Khrushchev, 1961: 9). In 1960, for example, the US effectively cut off Cuba's supply of oil, its main source of energy, by refusing to allow American-owned refineries to process Soviet crude oil. In January of 1961 Kennedy severed diplomatic relations with Cuba. In March he eliminated the Cuban sugar quota, threatening the highly specialized and dependent Cuban economy with complete collapse. Then, in April of 1961, the US orchestrated the infamous counter-revolutionary invasion of Cuba at the Bay of Pigs. This attack was designed to trigger an antiCastro revolt which, the US hoped, would lead to the overthrow of the legitimate revolutionary government of Cuba. Both the Soviet and the Cuban governments were well aware of the clandestine plans and activities
\\
I t h 3 i
Constructing National Interests
249
of the US government, pursued under the label 'Operation Mongoose'," to overthrow the Castro government and so were convinced that 'the Americans would never reconcile themselves to Castro's Cuba' (Khrushchev, 1970: 545). As both Soviet and Cuban representatives pointed out in October of 1962 and have continued to emphasize ever since, the Soviet missile deployment was straightforwardly an attempt by the Soviet Union to protect its ally, Cuba, from this anticipated US aggression. As Khrushchev explained it later, 'We had to think of some way of confronting America with more than words. We had to establish a tangible and effective deterrent to American interference in the Caribbean. But what exactly? The logical answer was missiles.' The missiles were installed secretly because 'if the United States discovered the missiles were there after they were already poised and ready to strike, the Americans would think twice before trying to liquidate our installations by military means' (1970: 546-7). Contrary to US propaganda, this secrecy did not indicate that the Soviet Union intended to use the missiles aggressive1y. Indeed, Only a fool would t h ~ n kwe wanted to ~ n v a d ethe Amer~cancontinent from Cuba. Our goal wa\ prec~selythe oppo51te: we wanted to keep the Amer~cansfrom mvading Cuba, and, to that end, we wanted to make them thmk twlce by confrontmg them w ~ t hour miss~les.(Khrushchev, 1970: 549) As Castro explained, the missiles were a logical solution because they could protect Cuba; their presence in Cuba would have 'insured us against the danger of a local war, of something similar to what the United States is doing in North Vietnam, a war that, for a small country, can mean almost as much destruction and death as that of a nuclear war' (quoted in Lockwood, 1967: 201). O n this view, then, the 'crisis' of October 1962 was caused by US rather than Soviet aggression. The Soviet rnissile deployment in Cuba was designed to protect Cuba, and especially the sovereignty and territorial integrity of the revolutionary Cuban state, from imminent US a t t a ~ k . ~As" Castro explained, Cuba 'flatly' rejected ... the presumption by the Un~tedSt'ites to determine what actlons we 'Ire entitled to take with~nour country, what kinds of arm\ we cons~der appropridte for our defenw, what relatrons we are to have w ~ t hthe USSR, and what ~ n t e r n a t ~ o n apol~cy l steps we are ent~tledto take, w ~ t h mthe rules and laws governmg relations between peoples of the world m d the prmclple5 governmg the Un~tedN a t ~ o n s ,In order t o guarantee our own \ecunty and sovereignty. ('Text of UN-Oubcin notes', 1962)
From wlthln t h ~ srepresentanon, of course, the national mtere\t that emcrges for the US I \ quite d~fferentfrom the one constructed 111 the story of the 'Cuban r n ~ s s ~cl er ~ s ~ sO' .n t h ~ smew, the LJS had ne~therthe r ~ g h nor t m y reawn to seek the rernmal o f the Cov~ctnit\\~lesfrom Cuba.
250
Widening Security
A third, partially hypothetical, representation might provide yet another picture of the events of October 1962. One can imagine a 'strategic' narrative which focuses on the strategic balance of power between the US and the Soviet Union and interprets it, in 1961 and 1962, as tipped strongly in favor of the United States. In fact, in February of 1961 it had become public knowledge that the much touted 'missile gap' was a fraud. Defense studies conducted by the Kennedy administration had concluded that 'there is no evidence that Russia has embarked upon a "crash" program of building intercontinental ballistic missiles or that any "missile gap" exists today' (Norris, 1961). Instead of lagging behind the Soviet Union, the US enjoyed unrivaled nuclear superiority. In exposing the 'missile gap' as a myth and thus deflating Soviet nuclear strategic pretensions, the US administration had in effect issued a direct challenge to Soviet cold war credibility (Kahn and Long, 1972). On this view, then, the Soviet Union suddenly found itself in a very public position of strategic insecurity which, in turn, created a global situation that was both humiliating for the Soviet Union and unstable and potentially dangerous for both of the superpowers. In this context, the stationing of Soviet missiles in Cuba could have been understood in one of at least two ways, neither of which implicated US national interests and neither of which therefore required a US response, let alone a response which took the world to the nuclear brink. First, the Soviet missile deployment might have been understood as reestablishing greater strategic parity, at least psychologically, between the two superpowers and so as producing a balance of power which was more stable and more likely to be conducive to systemic peace. As Dean Rusk argued at the October 16 ExComm meeting,
... one thing Khrushchev might have in mind is that ... he knows that we have a substantial nuclear superiority, but he also knows that we don't really live in fear of his nuclear weapons to the extent that ... he has to live under fear of ours. ... [W]e have nuclear weapons nearby, in Turkey and places like that. (Trachtenberg, 1985: 177) Khrushchev later put it in similar terms, arguing that the missiles were to,
... have equalized what the West likes to call 'the balance of power'. The Americans had surrounded our country with military bases and threatened us with nuclear weapons, now they would learn just what it feels like to have enemy missiles pointing at you; we'd be doing nothing more than giving them a little of their own medicine. (1970: 547) What some analysts have dismissed as a 'superficial symmetry' (Welch and Blight, 1987188: 13) between US extra-territorial missile deployments and the Soviet missiles in Cuba might, that is, have been viewed as the creation of a real, if primarily psychological, symmetry between the two nuclear states and a partial rectification of the strategic imbalance signaled by US superiority.
I
it
-
Constructing National Interests
251
O n this view, lJS national interests were not threatened because the outcome was a more stable strategic relationship. Second, one might have argued, as did then-US Secretary of Defense Robert McNamara, that the Soviet missiles did not change the strategic balance in any significant way at all." At one point during the ExComm discussions of 16 October 1962, for example, McGeorge Bundy asked, 'What is the strategic impact on the position of the United States of MRBMs in Cuba? H o w gravely does this change the strategic balance?' McNamara responded - 'Mac, I asked the chiefs that this afternoon. And they said substantially. My own personal view is, not at all' (Trachtenberg, 1985: 184). More recently, McNamara has forcefully reiterated this point of view, arguing that 'As far as I am concerned, it made no difference.' In fact, he argued, 'What difference would the extra 4 0 [Soviet missiles] have made to the overall balance? If my memory serves me correctly, we had some five thousand strategic nuclear warheads as against their three hundred. Can anyone seriously tell me that their having 340 would have made any difference? The military balance wasn't changed. 1 didn't believe it then, and I don't believe it now' (quoted in Blight and Welch, 1989: 23). According to McGeorge Bundy, 'most of us [the members of ExComml agreed with McNamara's summary judgement at the outset, that the Cuban missiles did not change the strategic balance' (1988: 452). O n this view, the Soviet missile deployment might have been understood, strategically, as irrelevant to US national interests since US nuclear and strategic superiority remained intact. As a result, according to this representation, the US had no reason to seek the removal of the missiles from Cuba. Its national interests simply were not at stake in these events of October 1962. Thc orthodox US representation of the 'Cuban missile crisis' was not, then, self-evident. What has come to be understood as quite obviously the 'facts of the matter' is, instead, a particular, and an interested, construction. The story of the 'Cuban missile crisis' and the existence but marginalization of possible alternative narratives thus bring to the forefront an important puzzle - How was it possible for the events of October 1962 to he represented in the US in this one, and not another, way? It is my contention that creating the representation of what became known as 'the Cuban missile crisis' required significant constructive labor. What follows is a brief description of a few of the salient aspects of that labor.
The orthodox US understanding of the 'Cuban missile crisis' and the attendant US national interest hinged on the invocation and articulation of a variety of objects and quasi-causal arguments and on the attendant interpellation of many individuals, Americans and others, into the resulting representation. In particular, the 'missile crisis' was constructed out of articulations that defined the Soviet Union, the US, Latin America, the 'Western hemisphere', Cuba, the Castro government and 'the Cuban people' as particular kinds of objects.
252
Widening Security
It depended as well on various quasi-causal arguments, including the pervasive invocation of the 'Munich' syndrome and the dangers of appeasement, of falling dominos and of Trojan horses. Although all of these, and other, linguistic resources were important to the construction of the 'Cuban missile crisis', three examples will have to suffice by way of illustration. The first example demonstrates the articulation of the Soviet Union as a particular kind of object - a hostile and expansionary totalitarian state. The second demonstrates the articulation of the United States as a defensive state that does not pursue aggression. And the third demonstrates the role played by the quasi-causal argument entailed in the Munich analogy. All of these building blocks of the 'Cuban missile crisis' and the attendant US national interest draw on a set of linguistic resources already pervasive within American culture and, especially, within the orthodox US narrative of the cold war.42 One of the many ways in which the Soviet Union came to be understood as aggressive, secretive and duplicitous was through the notion of 'Red Fascism', the characteristics of which were well known and widely accepted in the US long before October 1962. As Thomas Paterson has argued, what was important in this construction was 'that many Americans took the unhistorical and illogical view that Russia in the 1940s would behave as Germany had in the previous decade because of the supposedly immutable characteristics of totalitarians' (1988: 5). In this construction, the linguistic element 'Red', which had already come to designate 'Communism', was articulated to the element 'Fascism', thus defining the Soviet Union as a 'Communist' version of fascist 'totalitarianism'. That all totalitarian regimes, whether fascist or communist, were secretive, duplicitous and aggressive was considered to have been amply demonstrated by the Nazi-Soviet Non-aggression Pact of 1939. This agreement was invoked to demonstrate that the Soviet leadership, like its Nazi counterpart, would do anything to further its aggressive and expansionist aims, including entering into a treacherous treaty with its putative mortal enemy and secretly conspiring, with that enemy, to dismember a hapless victim. As Kennan explained in his memoirs, Stalin had concluded the Nonaggression Pact in order to pursue the traditional Russian program of 'territorial and political expansion' (1967: 519-20). Through the construction 'Red Fascism', then, the Soviet Union was already endowed with the characteristics of secrecy, duplicity and aggression. In 1961 Kennedy drew on this familiar understanding, arguing that 'totalitarian states' typically pursue their aggressive goals through secrecy and duplicity. 'Our adversaries', he asserted, use the secrecy of the totalitarian state and the discipline to mask the effective use of guerilla forces secretly undermining independent states, and t o hide a wide international network of agents and activities which threaten the fabric of democratic government everywhere in the world. And their single-minded effort to destroy freedom is strengthened by the discipline, the secrecy, and the swiftness with which an efficient despotism can move. (1961a: 367, emphasis added)
l:c 4 t i t > i Constructing National Interests
253
Long before the events of October 1962, the Soviet Union had already been constructed as a state which would use, and in fact relied extensively on, secrecy and duplicity in the pursuit of expansion. In a 1 9 8 7 interview, Paul Nitze indicated the importance of this understanding to the construction of the 'Cuban missile crisis': I was frankly annoyed at Gromyko having outrageously lied about this. It was a question of the character of the opposition, so typical of the way in which the Soviets handle themselves; I thought that to knuckle ~ ~ n d e r to this kind of thing was unacceptable, (quoted in Blight and Welch, 1989: 141, emphasis added) In the construction of the 'Cuban missile crisis', invoking this understanding foregrounded Soviet aggression. Since the character of totalitarian states was already well established, it seemed plausible, and indeed quite obvious, to assume that the Soviet deployment of missiles in Cuba was evidence of these same characteristics. At the same time, this understanding rendered it ~ ~ n t h i n k a b lthat e the Soviet Union, 'hy nature' an aggressive, secretive and duplicitous totalitarian state, could he acting to defend Cuba, a small and vulnerahle state. 'Totalitarians', after all, d o not protect the weak; rather, they enslave and exploit them. This particular representation, that is, marginalized the alternative representation of the events of October 1962 depicted in the 'defensive' narrative and embedded in the stories of the 'C:arihbean' and the 'October' crises. This construction of the Soviet Union helped not only to define the character of the Soviet threat but, by emphasizing the vast difference between 'totalitarian' states and 'democracies', simultaneously helped to define the US and to marginalize the possibility, highlighted in the 'defensive' narrative, that the Soviet Union was acting to protect Cuba from imminent US aggression. The not-so-subtle contrast constituted the US, already understood within US Cold War culture t o be the 'democratic' opposite of its 'totalitarian' adversary, in more detail as a subject that was neither secretive nor treacherous, and certainly not in the pursuit of aggressive, expansionary goals. The distinction between the two types of objects involved was explicit in Adlai Stevenson's 2 3 October speech to the UN. In that speech, Stevenson drew on a series of oppositions that defined the basic character of the adversaries: the 'piuralistic world' was contrasted to the 'monolithic world', the 'world of the UN Charter' to the 'world of Communist conformity', and 'moderation and peaceful competition' to 'aggression' (1962: 729). The characteristics of pluralism, moderation and peaceful competition were naturally articulated to the 'democratic' states, exemplified by the US, while the 'world of Communism', exemplified by the Soviet Union, was defined as aggressive, as n~onolithicand as attempting to promote global conformity. O n this view, as Theodore Sorenson has said, the 'history of Soviet intentions toward smaller nations was r w v different from our own'
254
Widening Security
(1965: 683, emphasis added). In this representation, then, the Soviet Union was understood necessarily to be aggressive while the US, in contrast, was necessarily peaceful. During the 'missile crisis', the US was further distinguished from the treacherous and secretive Soviet totalitarians through descriptions of the US as a state that would only pursue 'open covenants of peace, openly arrived at' (Wilson, 1918: 333). As Kennedy said in his speech of 22 October:
O u r o w n strategic missiles have never been transferred t o any other nation under a cloak of secrecy and deception; and our history, unlike that of the Soviets since the end of World War 11, demonstrates that we have no desire to dominate or conquer any other nation or impose our system upon its people. (1962: 5, emphasis added) Stevenson reiterated this point, arguing that 'the North Atlantic Treaty Organization, without concealment or deceit, as a consequence of agreements freely negotiated and publicly declared, placed intermediate-range ballistic missiles in the NATO area' in response to the threat posed to NATO by Soviet missiles (1962: 729, emphasis added). This emphasis on the 'secrecy' surrounding the Soviet missile deployment in Cuba and the contrasting 'openness' of US extraterritorial missile deployments helped to obscure the symmetry between the two. It was part of an attempt to generate support for US policy in the US, among US allies and in world opinion in general by preempting the thorny issue of the 'superficial symmetry' between the Soviet missiles in Cuba and US missile deployments abroad, particularly those in Turkey. As the US State Department explained, 'the distinction between Soviet missiles in Cuba and US missiles in NATO countries' hinged on the fact that,
... our missiles abroad were established under open and announced agreements with sovereign states. They serve to strengthen the independence of those countries. Soviet missiles were placed in Cuba in secret, without any public statements and without an alliance. Soviet bases in Cuba symbolize that country's subjection to alien control and domination; they were established without the knowledge of the Cuban people and were manned by Soviet personnel. (US Department of State, 1962: 7-8, emphasis added) The Soviet missiles in Cuba, because they both belonged to and had been secretly and treacherously installed in 'totalitarian' states, were necessarily understood as 'offensive'. This image helped to preclude an understanding either of the missiles themselves as 'defensive' weapons and of the Soviet missile deployment as a 'defensive' act or of the deployment as an attempt by the Soviet Union to rectify the severe strategic imbalance under which they suffered. Since the Soviet Union was an 'aggressive totalitarian' state and the US was a state which acts 'openly', an understanding of the Soviet missile deployment either as the defense of Cuba against US aggression, such as was provided in the 'defensive' narrative of the 'Caribbean' and 'October'
I
4
i
Constructing National Interests
255
crises, or as an attempt to rectify the strategic balance, such as might have been provided in a 'strategic' narrative, were pushed beyond the realm of the intelligible. This construction of the US drew as well on the self-styled image of the US as the 'leader' of the Western hemisphere and the 'free world' and as the global champion of 'freedom' and 'democracy'. The pivotal position occupied by the US in the international system, and its attendant 'responsibilities' and 'obligations' - in short, its national interests - were taken for granted within US orthodoxy. They were encapsulated in the notion of 'US world leadership' in which the object 'the US' was successfully and firmly articulated to the characteristic 'world leadership'. This representation of the US place in the postwar world had already been forcefully expounded by Henry R. Luce in 1941. In T h e American Century, 1.uce promoted a global US role both during and after World War 11, insisting that Americans should 'accept wholeheartedly our [US] duty and our [US] opportunity as the most powerful and vital nation in the world and in consequence ... exert upon the world the full impact of our [US] influence, for such purposes as we [the US] see fit and by such means as we [the US] see fit' (1941: 22-3). Shortly after the conclusion of World War 11, Truman asserted privately that 'the Russians would soon be put into their places' and that 'the United States would then take the lead in running the world in the way that the world ought to be run' (quoted in W.A. Williams, 1962: 240). Publicly Truman declared in late 194.5 that 'Whether we like it or not, we must all recognize that the victory which we have won has placed upon the American people the continuing burden of responsibility for world leadership' ( 1 945: 549). The authors of NSC 68 claimed similarly that in the aftermath of World War I1 'the absence of order among nations' had become 'less and less tolerable', from which they concluded that 'this fact imposes upon us [the US], in our own interests, the responsibility of world leadership' (US National Security Council, 1950: 390). Although these were 'obligations which no one asked us [the 1JSI to assume' (Steel, 1970: 7), such leadership responsibilities were persistently ~ o r t r a y e das thrust u p o n the United States by its victory in the Second World War." The leadership role of the US was understood to rest, in part, upon its achievements in defeating the Axis powers in World War 11. For example, in defending the US presence in Southeast Asia in the 1960s, President Johnson argried that,
... there ,Ire those who wonder why we lthe US] have a r e s p o n s ~ b ~ l ~ t y there. Well, we [the US] have ~tthere for the same reason that we [the US] have a responslbil~tyfor the defense of Europe. World War I1 was fought In both Europe and Asla, and when ~t ended we [the US] found ourselves w ~ t hcontmued r e s p o n s ~ b ~ l for ~ t ythe defense ot freedom. (1965: 395) The assumption of US vlctory has been promment in Amer~cananalyses of World War 11 and of the post-war era. For example, G a d d ~ asserts s that 'collaboration w t h the Sowet Meph~stopheleshelped the Unzted States and Great Brltaln achlcve zmtory over their enernzes In a remarkably short tlme
256
Widening Security
and with surprisingly few casualties, given the extent of the fighting involved' (1982: 3, emphasis added). That World War I1 was a US victory has typically been taken for granted, although sometimes, as in Gaddis's case, Soviet 'Mephistophelean' assistance is grudgingly acknowledged. A central assumption of post-war representations of the United States was therefore that the US had 'won' World War I1 and this assumption carried part of the weight of claims to legitimacy for US 'world leadership'. This view can, however, be contested and its contestability highlights its constructed nature. The notion that the US 'won' World War 11 has been disputed, in particular by Soviet writers (e.g. Marushkin, 1970; Sivachev and Yakovlev, 1979). In their view, not only was the Soviet role in World War I1 decisive, but the United States suffered the 'surprisingly few casualties' mentioned by Gaddis precisely due to the enormous effort of, and the enormous casualties suffered by, the Soviet population. As is well known but generally ignored, the brunt of allied fighting and the overwhelming bulk of allied casualties in World War I1 were borne not by the US, nor by the soon-to-be 'free world', but by the Soviet Union. As one scholar has suggested, we would do well to recall the 'strategic arithmetic of 1944-5' -there were 80 German divisions along the eastern front where the Red Army was fighting, and only 20 on the western front where the American army was fighting (Hallida~,1990: 9). O n this interpretation, the Soviet Union might well be credited with victory in World War 11. Should the Soviet Union thus have claimed 'world leadership'? For most Americans, of course, certainly not. Yet, within the US, the articulation of 'world leadership' to 'the US' has been justified as the natural consequence of its having emerged victorious from the battle with fascism. This representation of US 'world leadership' formed a leitmotif for postwar US national interests. The US responsibility for world leadership provided a warrant for the claim that the US had the legitimate duty to defend and promote freedom and to establish a stable world order. This particular construction of the US also had at least three important consequences for the US national interest, and thus for US actions, in the 'Cuban missile crisis'. First, it legitimized, and indeed mandated, an activist US response to the missile deployment - pursuing the removal of the missiles through whatever means were deemed necessary - because it was part of the 'leadership' role of the US to protect the free world, and especially the Western hemisphere, from totalitarian aggression. Second, it marginalized other understandings of this 'crisis', for example as an overreaction by the US either to a Soviet attempt to protect Cuba from further US aggression or to a Soviet attempt to begin to redress their embarrassing strategic inferiority. After all, 'we' who are democratic and open, who 'stand for freedom' and for 'the independence and equality of all nations' (Kennedy, 1961b: 396, 397), do not engage in aggression against our smaller, weaker neighbors. The orthodox US representation of the 'missile crisis' thus precluded any understanding of that crisis as brought on either by US aggression against Cuba or by the US attempt to maintain its already immense strategic superiority.
!I
l-lt
/is-.
Constructing National Interests
257
Third, the construction of US 'world leadersh~p'made sense of and leg~t~ m ~ z ea dper~lousp o k y of nuclear confrontat~on.Through the construct~onof world leadersh~pas a task thrust upon a US that was democrat~c,moderate and peaceful, and that had 'intentwns towards smaller nat~ons'that were very n a part~cularUS ~ d e n t ~ was ty d~fferentfrom those of ~ t tso t a l ~ t a r ~ aadversary, created and individuals were interpellated into it. On this representation, it seemed sensible to view the situation in October 1962 as one in which 'we' (peaceful, democratic and moderate Americans) were risking all to defend the Cuban people, and ultimately the rest of the Western hemisphere, from totalitarian aggression. The brinkmanship engaged in by the US was therefore neither nuclear aggression, as the defensive narrative might have it, nor an attempt to maintain US strategic superiority, as the strategic narrative might insist. Rather, this brinkmanship was forced upon 'us', who are otherwise peaceful and moderate, by the aggressive actions of an ever-expanding totalitarian foe. The construction of a particular 'we', then, helped to make common sense of the national interest and the particular policies pursued by US state officials in the 'missile crisis'. The representation of the 'Cuban missile crisis' and of US national interests hinged on more than these articulations of the Soviet Union and the US. They were also constructed and made sensible with the aid of the seemingly ever-present 'Munich analogy'. Like the notion of Red Fascism, the Munich analogy drew on the putative similarities among all totalitarian states. O n this particular quasi-causal argument, the missiles could not be tolerated, quite simply, because a policy of inaction by the US would constitute 'appeasement' of an aggressive totalitarian adversary. In the postwar US, the Munich analogy came to provide a prominent quasi-causal argument warranting immediate and decisive measures to oppose totalitarian aggression. This analogy entails the argument that any aggressive step, however small, taken by a totalitarian enemy will, in the absence of resistance, be followed by further aggression. This subsequent aggression will thus undermine the credibility of the US, which is pledged to stop rather than appease such aggression. This decreased credibility, in turn, will lead to the inevitable escalation of aggressive actions by the adversary. As Sorenson argued in his discussion of the 'missile crisis', 'Such a step linstalling Soviet missiles in Cuba], if accepted, would be followed by more' (196.5: 68S).44 When the aggression escalates, the danger to the US and the free world will eventually become so great that they will be forced, in the interest of their own preservation, to respond. By then, however, the magnitude of the threat will have increased significantly and the resulting war will be all the more ferocious. Better, therefore, to respond with force rather than weakness, and sooner rather than later. Better, that is, to fight than to appease. Not unexpectedly, the Munich analogy was repeatedly invoked during the 'missile crisis'. For example, Kennedy argued in his speech on 22 October that the Soviet deployment 'cannot be accepted by this country' because 'the 1930s taught us [the US] a clear lesson: Aggressive conduct, if allowed to go unchecked and unchallenged, ultimately leads to war' (1962: 5-6).
258
Widening Security
On this argument, it was not possible for the US to tolerate the Soviet missile deployment in Cuba. Such a policy would have been interpreted by the adversary as weakness. It would therefore have undermined US credibility, which in turn would have prompted further Soviet aggression in the Western hemisphere, creating an even more dangerous situation to which the US would be forced to respond in the future. As a result of this logic of escalation, the US was compelled to act promptly and forcefully. In part through the articulation of 'Munich' and the dangers of 'appeasement' to any US decision to ignore or tolerate the missiles in Cuba, any such alternative understanding, whether based on the defensive narrative, a strategic narrative or some other representation of these events, was rendered infeasible and the US national interest in forcing the removal of the missiles from Cuba was both constructed and legitimized.
Conclusion: Common Sense a n d 'the Real' In conclusion, I want briefly to discuss three implications of a constructivist retheorization of the national interest. First, standard discussions of legitimation in analyses of international politics treat legitimation as a process separate and distinct from the determination of national interests. Perhaps the classic argument to this effect was made by E.H. Carr. In his realist critique of 'utopianism', he asserts that 'politics are not (as the Utopian pretends) a function of ethics, but ethics of politics' (1964: 64). By this he meant, as he later explained, that the realist is,
... enabled to demonstrate that the intellectual theories and ethical standards of utopianism, far from being the expression of absolute and a priori principles, are historically conditioned, being both products of circumstances and interests and weapons framed for the furtherance of interests. 'Thought', he went on to argue, is relative to 'the interests and circumstances of the thinker' (1964: 68, 69; see also Morgenthau, 1978: 92). In other words, 'thought' - or ethics, theories or rhetoric - is both produced by interests and used to justify the pursuit of those interests. Whether such 'thought' is produced cynically, with state officials aware of the difference between their rhetoric and the interests underlying their actions, or sincerely, with state officials believing in their own rhetoric, the argument remains one in which rhetoric mediates between 'real' state interests, already given by the structure of the international system, and the actions taken by states. In contrast, on the argument that I am making here, the construction of legitimacy is, from the outset, an inextricable part of the process of national interest construction. National interests are not formulated, or deduced from the structure of the international system, and then endowed with legitimacy; instead, their legitimacy is conferred in the process of their construction. Creating
\,
It
-
Constructing National Interests
259
representations of particular situations, which entail particular national interests, involves the articulation of linguistic elements and the interpellation of individuals into subject-positions that already make sense. The production of national interests is thus simultaneously the creation of ~ o n s e n t . ~ ' Second, in this process of construction, a particular understanding of the national interest comes to be common sense. By common sense I mean what Antonio Gramsci called the 'diffuse and unco-ordinated features o f a generic mode of thought' (1971h: 33, note) or what Stuart Hall has referred to as 'categories of practical consciousness' (1986a: 30). Social constructions become common sense when they have successfully defined the relationship of particular representations t o reality as one of correspondence. That is, they are successful and become common sense to the extent that they are treated as if they neutrally or transparently reflected reality. In this way, social constructions are reified or naturalized and both their constructed nature and their particular social origins are obscured. The creation of conlmon sense is thus 'the moment of extreme ideological closure' (Hall, 1985: 105) which sets limits on the possible and 'becomes the horizon of the takenfor-granted: What the world is and how it works, for all practical purposes' (Hall, 1988: 44). It is in part through the dual process of articulation and interpellation that the naturalness, the common sense character, of particular representations, and the exclusion of other representations, is effected. Articulations provide the raw material of common sense by linking together diverse linguistic elements into representations of the world. The process of interpellation contributes to the creation of common sense because it hails individuals into subject-positions from which those representations make sense. Third, the empiricist character of realist conceptions of the national interest is not accidental but is in fact integral to the production of 'common sense'. The creation of common sense occurs, that is, because representations of the world that are constructed are treated as if they were directly observable and natural. In essence, the creation of common sense depends upon the explicit invocation of an empiricist epistemology - and in particular of a correspondence theory of language and meaning in which words and concepts point unproblematically to their ostensible empirical referents. By authoritatively defining the 'real', dominant constructions of the national interest remove from critical analysis and political debate what are in fact particular, interested interpretations, thus endowing those particular representations with 'common sense' and 'reality'. During a considerable part of the post-war era, the equation of the common sense understanding of the US national interest with 'the real', a rhetorical strategy duplicated by realism and its assumption of given national interests, was nightly endorsed b y Walter Cronkite in his famous signature line at the end of the CBS Evening News. He concluded each program with the words 'And that's the way it is' - what he should have said was 'And that's the way it's been constructed.'
260
Widening Security
Notes 1. An earlier version of this article was delivered at the 1993 Annual Meeting of the American Political Science Association, The Washington Hilton, 2-5 September 1993. I would like t o thank Sanjoy Banerjee, Jean-Marc Blanchard, Bud Duvall, Jim Mahoney, Nicholas Onuf, Dan Reiter, Diana Saco, Martin Sampson, Ann Tickner, Alex Wendt, the members of the International Relations Colloquium at the University of Minnesota, the anonymous reviewers at the European Journal of International Relations and especially Mark Laffey for comments on various earlier versions of this argument. 2. For a recent survey of criticisms of the concept, see Clinton (1994: Chapters 2 and 4). 3. More recently it has been argued that there are 'two faces of state action', one international and one domestic, and that additional state interests should be deduced from the location of the state in domestic society (Mastanduno et al., 1989: 461). While this analysis adds state interests related to the 'second image' to the traditional realist model, these interests are still treated as given and as deducible from structures external to the state, rather than as socially constructed. 4. This limitation was, of course, touted as an advantage by Waltz, who argued that an 'elegant' systemic theory of international politics will explain 'what pressures are exerted and what possibilities are posed by systems of different structure', but cannot, and should not strive to, explain 'just how, and how effectively, the units of a system [i.e. states] will respond to those pressures and possibilities' (1979: 71). 5. At least two recent literatures might be thought to provide a more substantive account of national interests. The first addresses the role of 'ideas' (e.g. Goldstein, 1993; Goldstein and Keohane, 1993) and the second addresses the role of 'epistemic communities' (e.g. Haas, 1992) in the making of foreign policy. While both of these literatures provide a progressive problem shift within realist theory by tackling the problem of policy indeterminacy, they d o not themselves address the question of the national interest. Instead, they consider the question of policy alternatives within the confines of a single national interest without providing any information on the origins of those interests themselves. 6. To see that two realists can come to quite dramatically opposed conclusions about the national interest, one needs only to examine Hans Morgenthau's (1969: 129) and Henry Kissinger's (1969: 130) conflicting prescriptions concerning US involvement in Vietnam. 7. A variation on this problem also undermines the otherwise useful discussion of the national interest by Clinton (1994). Despite his welcome emphasis on argumentation and 'good reasons', Clinton grounds his analysis in an objective notion of the 'common good' which particular national interests approximate more or less well (Chapter 3, especially pp. 51-5). 8. Another useful demonstration of the inability t o deduce state interests and actions from system structure can be found in Haggard (1991: 406-10). 9. It is to avoid the pervasive anthropomorphization of the state that I use the more traditional term 'national interest' rather than the currentlv fashionable 'state interest'. Anthropomorphizing 'the state' helps t o obscure, for example, the importance of processes located primarily within domestic society in the construction of national interests, of state action and thus of outcomes of international politics. Of course, the term 'national interest' also brings with it unwanted baggage, specifically the ideas that what is in the interests of 'the state' is also in the interests of some 'nation' and that there is a single " interest which can be attributed t o all members of a national community. By using the term 'national interest', I d o not mean to endorse either of these connotations. 10. Furthermore, once one recognizes that interests and identities are constructed, as Wendt does, there is n o theoretical reason to assume that the process of construction occurs only, or even most importantly, at the interstate level. Unless one makes a prior, substantive commitment to a state-centric analvsis. , , it makes more sense t o assume that this constructive process occurs in many places, including in the domestic context from which the linguistic and cultural resources of most state officials are drawn. 11. These claims are not meant to reproduce the traditional distinction between 'unit-level' or 'domestic politics' and 'system-level' or 'international politics' as alternative sources o r loci of explanation. I would want, with others (e.g. Walker, 1993), to reject these as distinct 'levels
I:
d d i i Constructing National Interests
261
of analysis' and instead t o understand the disttncr~onitself as a discursive strategy that allocates power a n d helps t o construct a particular (realist) world. M y crltlque of Wendt therefore does not imply that the national interest i\ 'really' t o be explained with reference t o 'domestic' rather than t o 'systemic' factors. 12. And it 1s not just the content of interests, national o r otherwise, that are constructed. 'The very notion t h ~ 'interest' t motivates action a n d s o should h e referred t o in e x p l a n a t ~ o n sof b e h a v ~ o ra n d social outcomes is itself a relative novelty. It is with liberalism and the rise of capitali5m t h ~ 'inrereit' r first camc t o
bc u n d c r m m d '1s the ~ n o t i v ~ ~forcr t i n ~driving the actions ot
individuals. T h a t '~nterest'as J general c'ltegory, regardless of its content, should be of central importance t o social analysis IS thus ~tselfa social construction rather than a natural fact. T h e laborious ideologic.il process of e ~ t ~ ~ b l ~ s lthe i i n gprimacy of 'interests' is described by Albert H ~ r s c h m a n(19 7 7 ) in his description of the vlctory, ,~cconipanyingthe 'triumph' of cap~t,ilism, of the 'interests' over the 'pass~ons''15 the motivation for hum.un ,icrlon. 13. For a more elaborate discussion of the specific agents tnvolved in the construction of post-war US national interests in p;lrticular, see Welcles ( 1993). 14. For a det'uled analysis of the US construction of 'the (:uhan problem', see Weldes and Saco ( 1 9 9 6 ) . 15. Whtle 111s ,~drnittedlysomewhat , ~ n n o y i n gt o the reader, I often use inverted c o m m a s t o highlight I~ngut\ticelements that 'Ire typically treated ,is o b \ ~ o u r l yreferential h ~ t h~ . ~t t'Ire In tact contestable \oclal construction\. 16. For extensive discussion\ of the l o g ~ cof these argument\ w e W'eldes (199.3). <:rit~c,ll311~1Iyses of the ' h l u n ~ c hanalogy' m d the danger, o f appeasement c.ln he found in I.anyt (196;), Kysrad (198 1-2), Rich.lrdsot1 ( 19881, and Beck ( 1989). The so-c,llled 'domino theory' is discussed in Ross ( 1Y78), Sl,lrer ( 1 9 8 7 ) ,ind Jervis , I ~Snyder J ( 19 9 I ) . 17. Clcliniing that these qux,-causal .lrguments mLlynot he 'empirically valid' o r 'accur,ite' does nor undermine o r contradict niy o w n constructtclst posttion. R'ither, I a m arguing t h ~ t these empirical clatnis may he t,llse o n their o w n terms - t h ~ IS, t even if o n e treats such c o w strucrtons a s given. t o r example, even if we clccept the construction o f some st,ltes a \ donlinos, the cioniino theory turns o u t t o I x t'llse. As Jerome Slater ( 1987) has argued, In n o case has the logic o t the theor!, r h ~ ot n e small states' 'coll,lpse' W O L I I ~ precipitate the coll,~pseof others, been fulfilled. 18. This IS r o ~ t g t i lthe ~ sequencc ot collapse envisioned by Eisenhower in h ~ famous s artlculatlon of the ' "fall~ngdomino" p r ~ n c ~ p l (19.54). e' Other U S o f h c ~ a l ssaw the sequence of trilling dominos ( o r rotting apples and the I ~ k e\omewh,lt ) d~fferently,hut always with the same net effect: the US must step in t o stop the coll,lpse ( o r rot o r wh,lrever). See, for example, Kull~tt( 1948), Acheson ( 1969h) and US Sen,~te( 1947). 19. While n a t ~ o n a linterests, l ~ k eall \ o c d f ~ c t s are , s o c ~ a lconstructions, they belong t o 1' spec~ficclass of social facts - that o t Interest\ - that are of p C ~ r t i c ~ ~importance ldr t o the modern explanation of s o c ~ a lphcnomena hecause the notion of interect, ,IS Connolly h ~ .lrgued, s 'is o n e of those concepts t h ~ connects r descriptive ~ n explan.ltory d statements t o n o r n u t i v e judgements'. T h ~ sis so t w x u s e reterence t o Interests 'c,irr~e\ ... into polltical discourw' the presumption 'that people lor states] ought t o he able t o d o w h ~ they t choose o r want to d o unless o v e r r t d ~ n gcons~derations~ n t e r v e ~ i since e' 'the sort of wants' designated by the term 'are exactly those deemed t o he somehow important, perslsrent, h.lsic o r fundamental t o politics' (198.3: 4 6 ) . It is tor this reason, a s 1 argued earlier, that the ' l a n g ~ ~ a gofe the national inrere\[' I S the 'internal I : u ~ ~ u o, f~d~ e ce~ s i o nin ' the making of foreign p o l ~ 111 c ~that it both refers t o the goals pursued hy \tare o f t i c ~ ~ i111 l s f o r e ~ g npolicy a n d functions t o generrite the legitimacy of a n d \ u p p o r t for t h . ~ tforeign pol~cy.( F o r a brief description of the c o n ~ p l e xhistory of the term 'interest', see Hirschman, 1977: 3 1-42.) 20. The tern1 'arttculat~on'is d ~ s c ~ i s s eind Hall ( 1985, 19 8 6 h ) , Grossherg (19 9 2 ) and Eagleton (19 9 1 ). For a brief suggestion that the notion of ' a r t ~ c u l , ~ t ~ onnl ~' g h the useful in studies of international relations, see Jacohsen ( 1995). 21. M y chin1 that national Interests are social conrtructlons o h v ~ o u s l yrests o n a n understanding of lang~lage,IS constitutive o r productive of meaning. This model of language 1s c o n nion. in o n e form o r another, t o ,I wide r m g e of 20th-century philosophy a n d theories o t socir~l
262
Widening Security
inquiry. As Laclau and Mouffe have argued, if perhaps a bit strongly, 'the entire development of contemporary epistemology has established that there is no fact which allows its meaning to be read transparently' (1987: 84). Although often associated with so-called 'post- structuralists' like Michel Foucault or 'deconstructionists' like Jacques Derrida, this conception of language as constitutive is by no means limited t o them. See Shapiro (1981) for a useful overview of some contemporary developments in theories of language and meaning of particular use to analysts of politics. See also Gibbons (1987). 22. It is because the raw materials out of which representations, and thus national interests, are constructed are cultural and linguistic that it is not possible to explain state identities and interests purely in terms of interactions among states, as Wendt attempts to do. Such cultural and linguistic resources, after all, are found, prominently, within states. 23. This rearticulation occurs, for instance, in the work of some revisionist historians such as W.A. Williams (1962) and Kolko (1980). 24. This notion of 'articulation' - defined as a continuous and contested process of meaning creation - refuses the assumption that dominant representations are determined, whether in the first or the last instance, by 'the economic', by any other specific structure of social relations, such as patriarchy, or by putative physical or material 'facts'. At the same time it also refuses the complete arbitrariness of the connection between linguistic elements. As Raymond Williams has cogently argued, The notion [of arbitrariness] was introduced in opposition to the idea that the sign was an icon, and it is certainly true that there is in general no necessary relation of an abstract kind between word and thing in language. But to describe the sign as arbitrary or unmotivated prejudges the whole theoretical issue. I say it is not arbitrary but conventional, and that the convention is the result of a social process. If it hits a history, then it is not arbitrary - it is the specific product of the people who have developed the language in question. (1981: 330, emphasis added)
I am grateful t o Mark Laffey for drawing my attention to this passage. 25. For an example of such an investigation, in which a formal analysis is provided of the range of interpretive possibilities available for US state officials in their construction of the Korean war, see Milliken (1994). 26. The notion of 'interpellation' was introduced by Lacan (1977) and then explicitly connected t o ideology by Althusser (1971). For other useful discussions of interpellation, see Hall (1985), Laclau (1979) and Laclau and Mouffe (1985). 27. I am not implying that all individuals are successfully interpellated into the dominant representations. For a fascinating account of individuals who came to refuse what were once firm interpellations into the US nuclear strategic discourse, see Everett (1989). However, for a variety of reasons, many or even most individuals are in fact successfully interpellated into the dominant discourse. Why particular individuals resist interpellation while others d o not may have a variety of explanations, from peculiarities of individual socialization and education, to individual psychology, to the presence of alternative discourses which these individuals find more persuasive. While this is an interesting question for further research, addressing it is beyond the scope of this article. For one interesting take on this issue, see P. Smith (1989). 28. The anthropomorphization of the state in much current US international relations theorizing is thus n o accident, nor is it peculiar to international relations theory. Instead, it reflects the anthropomorphization of the state which animates the language of US national interest used by US state officials (and others) in the practice of US foreign policy. The habit of anthropomorphizing 'the state' in US international relations theory thus reproduces US state officials' views of the world, thereby both legitimizing US state policy and helping to fix attention on to the issues of problem-solving rather than of critical theory (see Cox, 1981). 29. The importance of state identity and processes of state identity construction, especially for the US, are discussed in detail by David Campbell (e.g. 1992 and 1994). 30. From a realist perspective, of course, this seems obvious. But it is not. The central object of the national interest, even within the US, does not have to be 'the US'. As many critics of the concept 'national security' have pointed out, the object to be protected by policies 'in the
r
Constructing National lnterests
263
national interest' can he both I'lrger a n d smaller than 'the state'. Larger objects niight be global, such as human rights o r the environment. Smaller objects might he individuals, in particular their economic, ecological a n d personal security interests. See, for example, Barnet (1988), R u z ~ n( 1 9 8 3 ) and Matthew\ ( 1 9 8 9 ) . 31. T h e use of 'we' t o mean 'the US' and, specifically, actions taken by the US state is pervasive In Amencan culture. It c,ln he observed in public fora such a s newspaper editorials a n d t e l e v ~ s ~ o~ntervicwc n in which journ.llists, politicians a n d 'ordinary' folk routinely refer t o 'the U S ' as 'we'. I n discussion with c o l l r ~ i g u t~. ~h o u this t plicnorncno~iit has become apparenr t h ~ t university students are also widely prone t o use this locution. An ~nrerestingresearch question COIICC~II~ the extent t o which this ~ n t i n ~ a tidentification e of ~ndiviciualc i t ~ z e n swith the stllte a n d state policy is unique t o the US. On the basis of anecdot'll evidence p r o v ~ d e dby friends a n d colleagues from diverse cultural hackgrounds, ~ n c l u d ~ ning p ~ r t i c u l a rCanada, India and New Z e a h n d , this Intlmacy looks t o he a peculiarly Americ'in phenomenon or, a t least, t o he more prevalent rn the US than elsewhere. If this is true, then the interpellat~onof i n d i v ~ d u ~ l s Into the language of national Interecrs in other states either 1s ,iccompl~shedo n other grounds o r is not accomplished a s successfully as ~r is In the US. 32. W h a t follows is J very abbrev~atedexamnle of the kind o t analysis reauired t o demonm a t e the construction of national Interests. t o r a much more cl.lborate analysis of the construction of the 'Cuban m i s d e crisi\' and thus of US n,irional interest5 in that crisis, see Weldes ( 199 1). 3 3 . T h e notion of the 'Western hemisphere', especially one thar IS protected hy the US under the ,luspices of the Monroe Doctrine. is dlso a social construction, hut o n e that 1 d o not have the s p c e t o d ~ s c u s shere. See, for example, van Alstyne ( 1 9 7 1 ) . ~ n dWeldes (1993: 453-66). 34. Academic representarlolls typ~callcreproduce the orthodox US narrative of the '(:uhan missile crisis'. See, a m o n g others, Ahcl ( 1966), Alliwn ( 1 9 7 1 1, Blight a n d Welch ( 1 9 8 9 ) a n d C;arrhoff( 1 9 8 8 ) . 3 5 . Even the putative 'oftensive' character of the S o v ~ e rm ~ s s ~ l ewas s in fact J US construction rather thcln a self-el d e n t tact. T h e lJS defined the Soviet missiles a s 'offensive' hy using the rtzpa0ilitrcs of the weapons, which could s t r ~ k edeep Into the US a n d Latin Anier~c,l, '1s the c r i r e r ~ o no t offensivenesc. For the Soviet Union. in contr'lst. the character of the m~esile\ was definrd in term\ of their projected ~ i s e .Since the missiles had been deployed t o defend Cuba from US a t t ~ c k ,the missiles were c o n s ~ d e r e dt o he detensive rather than offensive ( K h r ~ ~ s h c h e 1962: v, 186). 36. This 'decept~on theme' was highlighted by Rrockricdc ~ n Scott d in their a n a l y s ~ sof Cold War rhetoric. They argue that in Kennedy's speech 'the d e t a ~ l e daccount of S o v ~ e Jupllt city ... put the mildne\s of Anier~canresponse in brighter rehet land1 probably gave the 'idmini s t r a t ~ o nthe adcantage in communicating with f r ~ e n d l ynations ,ind neutrals' (1970: 8 4 ) . Tlns analysis mlsscs an important point. It represents the US response '1s mild in fact and neglects the possibility thar the US response was constructed '1s niiltll hy the rhetoric ~tself.After ~ l l , from a perspective e r n p h a s i ~ i n gCuban sovereignty a n d the history of US aggression agalnst Cuha, the US ' q ~ ~ a r ~ ~ n tofi nCe u' h ~ for , from being 'mild', was ,In act of war. Furthermore, the course chosen hy the US ,ldministr,ltion could be, and has heen, interpreted J S quite aggrescively setting the Soviet Union u p for humiliation. As J'lrnec N ~ t h a nput it:
... instead of t x i n g Soviet F o r e ~ g nM ~ n i s t e rG r o m y k o with the evidence lot the r n ~ s s ~ l e d e p l o y ~ n e n r while l the liu\\i,in w.1~glvlng the President t'llse assurances that the missiles were not b u n g installed, the President blandly listened w ~ t h o u comment. t Whether o r not the Russians helieved that Kennedy must have known, the effect of the charade was a n ,~bsenceof serlouc negoti'ltions. Instead of using private ch,lnnels t o w a r n the R u s s ~ a n s t h a t he knew a n d ~ n t e n d e dt o act, Kennedy chose t o give nonce t o the Russians In a narionw~dT e V address. After t h ~ t a, Soviet withdrawal had t o he made in public a n d almost had t o he 1' h u m ~ l i n t i o ~(i 1. 975: 268; see also Steel, 1969: 1 8 ) 37. This is not t o deny that differences of opinion a m o n g US state officials exlsted. In fact, US officials disagreed over both the extent a n d the exact nature of the cris~s.As the p u h l ~ s h e d ExConim transcripts ~ndicate,some US officials, notably the so-called 'hawks', certa~nlyt h o ~ ~ g h r the problem more devastating than did those w h o came t o he labeled 'doves'. These same offic~,lls
264
Widening Security
also disagreed vehemently over the most appropriate policy response t o the missile deployment, ranging in their views from the dovish 'negotiate with Khrushchev' to the hawkish 'invade Cuba' (see, for example, Trachtenberg, 1985; Blight, 1987188; Blight and Welch, 1989; Garthoff, 1962). Nor is it to deny that one might interpret Kennedy's public pronouncements during the 'missile crisis' as significantly more hawkish than the statements he made in private at the ExComm meetings. But these differences, which have been amply analyzed elsewhere (in addition t o the sources just mentioned, see, among others, Abel, 1966; Acheson, 1969a; Allison, 1971; Bundy, 1988; Schlesinger, 1965; Sorenson, 1965), are not the subject of this analysis. What I am interested in is an issue which has received virtually n o attention - the surprising unanimity, among a diverse set of state officials encompassing both 'doves' and 'hawks', on the existence of a crisis for US national interests understood 'obviously' to require a response from the US. Put another way, I am interested not in US policy choices but in the prior definition of the problem to which these policy choices were to be a response. 38. The stories of the 'Caribbean' and 'October' crises can be told together because their conception of the crisis itself, specifically its causes and its character, are the same. It is these similarities that are highlighted in my brief rendition of this alternative account. Nonetheless, the Cuban 'October crisis' also demonstrates at least one important difference from the Soviet 'Caribbean crisis'; specifically, it provides a significantly different portrait of the resolution of these events. The story of the 'Caribbean crisis' typically ends on a positive note, albeit a different one than in the US narrative. O n this view, the crisis was resolved peacefully because the US agreed, as the result of the Soviet missile deployment, not t o invade Cuba. The outcome was thus not only a victory for peace, but a vindication of Soviet foreign policy and a triumph both for socialism and for the Cuban revolution (e.g. Major General I.D. Statsenko, quoted in Pope, 1982: 248). The 'October crisis', in contrast, ends on an ambiguous and at least partially sour note. On this view, while the crisis did preserve Cuba and the Cuban revolution from an imminent US invasion, it also highlighted the pawn-like status of Cuba in Cold War international politics (e.g. Castro, 1992: 339). 39. Operation Mongoose is described in various US government documents recently published by Chang and Kornbluh (1992). That the Cuban government was aware of these plans was evident in the speech made by Cuban President Dorticos (1962) during the 'missile crisis' and reasserted by Cuban representatives to the 1989 Moscow Conference on the crisis (Allyn et al., 1992). 40. At least two US state officials ~ r o m i n e n in t constructing the orthodox 'Cuban missile crisis' have in recent years acknowledged that there might be something to the 'defense of Cuba' argument. In 1989, Robert McNamara announced that 'if I were a Cuban and read the evidence of covert American action against their government, I would be quite ready to believe that the US intended to mount an invasion' (quoted in Blight and Welch, 1989: 329). Similarly, McGeorge Bundy has since acknowledged that 'Khrushchev certainly knew of our program of covert action against Cuba, and he could hardly be expected t o understand that to us this program was not a prelude to stronger action but a substitute for it' (1988: 416). Bundy is therefore now willing to admit that,
-
In retrospect it seems likely that Khrushchev was also trying, although clumsily, to take account of our warnings [against an offensive weapons deployment] by offering assurances that all his deployments, of whatever sort, were defensive. Since we found it impossible to accept this reading, we assumed too easily that his assurances reflected only a vicious deception. (414) 41. McNamara, who offered this analysis of the strategic situation in October 1962, nonetheless saw the 'Cuban missile crisis' as a significant threat to the US. Rather than interpreting the threat as an upsetting of the existing strategic balance, as did some of his colleagues on the ExComm, McNamara understood the threat to be largely a matter of the credibility of the Kennedy administration with the American public (e.g. Trachtenberg, 1985: 186 ff) 42. By now, many critical analyses of the orthodox US 'Cold War narrative' exist. Particularly intriguing examples are Carmichael (1993), Campbell (1992) and Dalby (1988, 1990). 43. The claim to US global leadership also has its roots in the allegedly unique character of the United States as a nation. The exceptional character of the American nation has persistently
\\t.idc
. Constructing National Interests
265
been understood to confer upon the United States certain rights and responsib~lities;in fact, it has legitimized a global US missmn. According to Kennedy, tor example, the US had the 'right to the moral leadership of this planet' (quoted in L.undest,td, 1989: 527). This vlew was, of course, not specific to Kennedy. As Geir L.undestad has recently wrltten, 'Americans traditionally have seen themselves as a unique people with a s p e c d mission in the world.' 4 s a result, 'While other states had interests, the Unxed States had responsihilrtirs' (Lundestad, 1989: 527, emplias~sadded). 44. Prohlrni\ with thc logic <~uidthr empirical adt.qu.icy <,f this qunsi-causnl urgumcnt
~
References Abcl, E. (1966) 7 % Missilr ~ (:risis. Ph~ladelph~a: J.P. Lippincott. Acheson, I). (1969a) 'Homage to Plain I h m b I.uik: De,ln Acheson's Version of Robert t Kennedy's Version of the Cuh31i I\lli\sile A f f ~ ~ rF,sqctii.~ ', (February): 44, 46, 76-7. Acheson, Ll. ( 1969h) Prcwnt ~zttl~c'(:reation: My Yeus in the State Ilcpartrtzent. New Yorh: W.W. Norton. All~son,<;.T.( 197 1 ) Essc~111.cof lli~c~isron: F.xpl~~inrn,q thc CrtO~rnMiss11~Crisis. Boston: 1.1ttle. Rro~vn. A1Iyn, 13.1.. J.G. Kl~ghta n d I).A. Welch (cris) (1992) 13iz(.k to t l ~ cBrink: I1roccwfin,ys of thc M o s m u ~(:onf&wzc-e ow t l ~ c(;II/J~II Missrlcr Crisrs, /ariiriri-y 27-28. /')89. l.anh,im, 1\11): Umver\ity I'rcs\ of Amer~c,i. Alth~i\w~;I.. (1971) 'Ideology and the ideolog~cal state appll-ntuses', 111 h ~ sL.ivirn Lrrid P b i / o s o / ~ hL7riti ~ Othrr t.ssdys, translated h! B. Bre\v\rer, pp. 127-86. I.ondon: N e w I.ctt Books. Anderson, K. ( 199 1 ) /1121~~11it'd (~ollnnitnrti~s:R~f/i'itiolis 011 t i ~ e~ r l g i l l sillid . ~ / l r ~ , of ~l~i Ni~tionalisrn.London: Vcrw. Barnet, R. (1988) 'Rethinki~~g National Strategy', N c u ~Yorkcr 2 March: 104-14. Beck, K.J. ( 1989 1 'Munich's 1.cssons Reconsidered'. InternLrtri~ri~rl Scrrrrity l 4 ( 2 ) : l h 1-9 1 . Blight, ,I.(;. (cd.) (1987/88) 'Octoher 27, 1962: T r a n s r ~ p t sof the hleeting of the ExConim', M . Bundy tr,uisiriber, Iritcrnatro~i~~I Security 12(.3):.30-92. - ~ : .SOL'IC~S : RCCTIIIIIIII~, ~/JC Bl~ght,1.G. and I>.A. Wlelcli (1989) O n thr Brink: A I ~ c Y I ~dnd Crtbnn Missilc (;rrsis. Ncw York: H ~ l l, ~ n dWang. Blight, J.G., 1.5. Nyr and 1l.A. Welch ( 1 987) 'The (:uhan hli\\ilc Crls~sRev~~ited'. I~~rc~rgti 4ffiiirs 6 h ( l ) : 170-88. Krockriedc, W. m d R.1.. Scott ( 1970) Moments I W the Kl~etorrc-of t l ~ r<:old War. New York: Random H O L I W . B l i l l ~ r r ,W.<:. ( 1 948) 'How We Won the W'ir :ind 1.05~the Pe,~cc',l.ifi.. P ~ r 1, t 30 Augu\t 1948: 8.3-97 and Part 11, 6 Septernhcr 1948: 86-103. Choires a h i t thc Koirrb in the First Fifty Ycwrs. Bundy, M . (1988) L)mific,r 11mi Si~rl~icwl: New York: R.lndon1 Houw. Buzm, B. (1983) People, Stiztes, ~ t z dFmr: Tile Niitional Sec-rtrity Prohiem in Itrtrr~i~itionr~/ Kelrrtiotzs. (:hapel Hill: Ilnivcrsity of North carol in:^ h e \ \ . Camphell, D. ( 1992) Writing Sei-crrity: iinitcd Stiltcs F o r r i p I'oliry a n d t / ~ e/'o/itic-s of ldcpntrty Minneapolis: Lln~vers~ty of Minnesota Press. (:aniphell, D. ( I 994) 'Foreign Pollcy and Identity: Iapanr\r "Other"/Amer~can "Selt"', in 5.1. Rostow, N. Inayatullah and M. Rupert (eds) 7%c ( ; / o h / tkonoiny as Po/itic.a/ S/m~-c~, pp. 147-69. Boulder: I.ynnc R~enner.
266
Widening Security
Carmichael, V. (1993)Framing History: The Rosenberg Story and the Cold War. Minneapolis: University of Minnesota Press. Carr, E.H. (1964 [1946]) The Twenty Years' Crisis, 1919-1939: An Introduction to the Study of International Relations. New York: Harper and Row. Castro, F. (1981) 'Angola: African Giron', Speech at Havana's Karl Marx Theater, 19 April 1976, reprinted in M. Taber (ed.) Fidel Castro Speeches: Cuba's Internationalist Foreign Policy, 1975-1980, pp. 86-97. New York: Pathfinder Press. Castro, F. (1992) 'Transcripts of Fidel Castro's Remarks at the Havana Conference on the Cuban Missile Crisis', 11 January 1992, reprinted in L. Chang and P.A. Kornbluh (eds) The Cuban Missile Crisis, 1962: A National Security Archive Documents Reader, pp. 3 3 0 4 5 . New York: The New Press. Chang, L. and P.A. Kornbluh (eds) (1992) The Cuban Missile Crzsis, 1962: A National Security Archive Documents Reader. New York: The New Press. Clinton, W.D. (1986) 'The National Interest: Normative Foundations', Review of Politics 48(4): 495-519. Clinton, W.D. (1994) The Two Faces of National Interest. Baton Rouge: Louisiana State University Press. Connolly, W.E. (1983) The Terms of Political Discourse, 2nd edn. Princeton: Princeton University Press. Cox, R. (1981) 'Social Forces, States, and World Order: Beyond International Relations Theory', Millennium 10(2): 126-55. Dalby, S. (1988) 'Geopolitical Discourse: The Soviet Union as Other', Alternatives 13: 4 1 5 4 2 . Dalby, S. (1990) 'American Security Discourse: The Persistence of Geopolitics', Political Geography Quarterly Y(2): 171-88. Dorticos, O.T. (1962) 'Address to the United Nations General Assembly', 8 October, Plenary Meetings, Volume 2, 5 October-20 November, pp. 369-76. Doty, R.L. (1993) 'Foreign Policy as Social Construction: A Post-positivist Analysis of US Counter-insurgency Policy in the Philippines', International Studies Quarterly 37(3): 297-320. Eagleton, T. (1991) Ideology: An Introduction. London: Verso. Eisenhower, D.D. (1954) 'The President's News Conference of April 17, 1954', in Public Papers of the Presidents, Dwight D. Eisenhower, 1954, pp. 382-3. Washington: Government Printing Office. Everett, M. (1989) Breaking Ranks. Philadelphia: New Society Publishers. Fay, B. (1975) Social Theory and Political Practice. London: George Allen and Unwin. Gaddis, J.L. (1982) Strategies of Containment: A Critical Appraisal of Postwar American National Security Policy. New York: Oxford University Press. Garthoff, R.L. (1962) 'The Military Significance of the Soviet Missile Bases in Cuba', memorandum, 27 October 1962, reprinted as Appendix D, Reflections on the Cuban Missile Crisis, revised edn, pp. 202-3. Washington: Brookings Institution, 1989. Garthoff, R.L. (1988) 'Cuban Missile Crisis: The Soviet Story', Foreign Policy 72 (Fall): 61-80. Gibbons, M.T. (1987) Interpreting Politics. New York: New York University Press. Goldstein, J. (1993) Ideas, Interests, and American Trade Policy. Ithaca: Cornell University Press. Goldstein, J., and R.O. Keohane (eds) (1993) Ideas and Foreign Policy: Beliefs, Institutions, and Political Change. Ithaca: Cornell University Press. Gramsci, A. (1971a) The Modern Prince. New York: International Publishers. Gramsci, A. (1971b) Selections from the Prison Notebooks, ed. and trans: by Q. Hoare and G.N. Smith. New York: International Publishers. Gromyko, A. (1971) 'The Caribbean Crisis, Part I: The US Government's Preparation for the Crisis' and 'The Caribbean Crisis, Part 11: Diplomatic Efforts by the USSR to Eliminate the Crisis', reprinted in R.R. Pope (ed.) Soviet Views of the Cuban Missile Crisis: Myth and Reality in Foreign Policy Analysis, pp. 161-226. Washington: University Press of America.
.
.i
Constructing National Interests
267
Grossberg, I.. (1992) W e Gottir Get orit of this I'lncr: Pvprrlirr C:onser~~atrsnr irnd Moiicwz Ctrltzrrr. I.ondon: Koutledge. Hans, I). (ed.) ( 1992) Knozc~ld,yc,I'o~uer arid Interrmtronirl I'olri-y C:oordinirtion, special issue of lnternatrond Organrzntron 461 1 ). Haggard, S. i 199 1 ) 'Structuralism and Its Crit~cs:Recent I'rogrcss in lnternat~onalRelat~ons 'Theory', in E. Adler ;und K. Crawford (eds) I'rogrrss in I'ostlc~irr lnternntronul Rc/irtiom, pp. 403-37. New York: C:olumhi~.Un~versityPress. Hall, S. (1985) 'Signification, Repl-esent~~tirm, Ideology: Alrliu\scr and the Post-structuralist Debate', (:ritrciil Studies in M i i ~Cottzniu~ncation212): 9 1 - 1 14. Hall, S. (1986a) 'The Problem of Ideology - Marxism W ~ t h o u tGuarantees', Jorrr~iiilof Co~nrnrinici~trotr Inqnrry I O(2):28-44. Hall, S. ( 1986h) 'On Postmodernisrn and Articulation: An Interbiew with Stuart Hall',]i~urn~rI of Co~nnzunrr~~tion lnyrrrr?) l0i2): 45-60. Hall, S. (1988) 'The Toad In the G.lrden: Thatcherism Among the Theorists', in C. Nelson and I.. Grossberg ieds) Marsrsrit unri t h t Interprc~tatiort of C~rItrir~~, pp. 35-73. Urhana: University o t Illinois I'ress. Hall~day,I' ( 1990) 'The Ends of Cold War', N r w Left R C ~ W I180: I , .3-23. her^, J. ( 195 1 ) Politrcal Rrirlrsrn m d Polrtrcal Idmlrsnr: A Strrdy in Theorres und Re ‘1 I rtres. ' Chlcago: Univers~tyof Ch~cagoPress. Hirschnian. A. ( I 977) The lJ~7ssi~trs and the Interc3sts: I'olrtrc.Lrl Arguments for Cnprtizlisn~ Oc3forr its Trirrntph. Princeton: Princeton University I'res\. Hoffrnann, S. ( 1978) Primizry or World Order: Aincrican Forcrgn Policy Since, thr, Cold Wilr. New York: McCraw-Hill. Hollis, M. and S. Smith ( 1990) Explirrnin~and Undrrstilndiizg 1iztcrnational Relations. Oxford: Clarendon. Jacohsen, J.K ( 199.5) 'Much Ado About Ideas: The Cognitive t:,ictor in Economic Policy', World Politrcs 47: 283-3 lo. Jervis, K. m d J. Snyder (ed
268
Widening Security
Kissinger, H.A. (1969)American Foreign Policy: Three Essays. New York: W.W. Norton. Kolko, G. (1980) Confronting the Third World: United States Foreign Policy, 1945-1980. New York: Pantheon Books. Lacan, J. (1977 [1966])Ecrits: A Selection, trans. A. Sheridan. New York: W.W. Norton. Laclau, E. (1979)Politics and Ideology in Marxist Theory. London: Verso. Laclau, E. and C. Mouffe (1985)Hegemony and Socialist Strategy. London: Verso. Laclau, E. and C . Mouffe (1987)'Post-Marxism Without Apologies', New Left Review 166: 79-106. Lanyi, G.A. (1963)'The Problem o f Appeasement', World Politics 15(2):316-28. Lockwood, L. (1967)Castro's Cuba, Cuba's Fidel: An American Journalist's Inside Look at Today's Cuba. New York: Macmillan. Luce, H.R. (1941)The American Century. New York: Farrar and Rinehart. Lundestad, G. (1989)'Moralism, Presentism, Exceptionalism, Provincialism, and Other Extravagances o f American Writings on the Early Cold War Years', Diplomatic History 13(4): 52745. Marushkin, B. (1970) 'American Falsifiers and the Facts o f History', International Affairs (Moscow) 6 (June):15-22. Mastanduno, M., D.A. Lake and G.J. Ikenberry (1989) 'Toward a Realist Theory o f State Action', International Studies Quarterly 33(4):457-74. Matthews, J.T. (1989)'Redefining Security', Foreign Affairs 68(2):162-77. Milliken, J. (1994)' A Grammar of State Action: US Policymakers' Social Construction of the Korean War'. PhD dissertation, University o f Minnesota. Morgenthau, H.J. (1951) In Defense of the National Interest: A Critical Examination of American Foreign Policy. New York: Alfred A. Knopf. Morgenthau, H.J. (1952) 'Another "Great Debate"': The National Interest o f the United States', American Political Science Review 46(4):961-88. Morgenthau, H.J. (1969)A New Foreign Policy for the United States. New York: Frederick A. Praeger. Morgenthau, H.J. (1978)Politics Among Nations: The Struggle for Power and Peace, 5th rev. edn. New York: Alfred A. Knopf. Nathan, J . (1975)'The Missile Crisis: His Finest Hour', World Politics 27(2):256-81. Norris, J.G. (1961) ' N o Missile Gap Exists, Defense Study Shows', New York Times 7 February: 1. Paterson, T. (1988)Meeting the Communist Threat. New York: Oxford University Press. Pope, R.R. (ed.) (1982)Soviet Views of the Cuban Missile Crisis: Myth and Reality in Foreign Policy Analysis. Washington: University Press o f America. Purvis, T. and A. Hunt (1993)'Discourse, Ideology, Discourse, Ideology, Discourse, Ideology ...', British Journal of Sociology 44(3):474-99. Richardson, J.L. (1988)'New Perspectives on Appeasement: Some Implications for International Relations', World Politics 40(3):289-316. Rosenau, J . (1968) 'National Interest', in D.L. Sills (ed.) International Encyclopedia of the Social Sciences Vol. 1: 34-40. New York: Macmillan. Rosenberg, J. (1990) 'What's the Matter With Realism?' Review of International Studies 16(4):285-303. Ross, G. (1978)'The Domino Theory,' in A. de Conde (ed.)Encyclopedia of American Foreign Policy, Vol 1: 275-80. New York: Charles Scribner's Sons. Rothstein, R.L. (1972)'On the Costs o f Realism', World Politics 87(3):347-62. Rusk, D. (1962)'American Republics Act to Halt Soviet Threat to Hemisphere', Statement to the Council o f the Organization o f American States, 23 October 1962, Department of State Bulletin 12 November 1962: 720-3. Rystad, G. (1981-2) Prisoners o f the Past? The Munich Syndrome and the Makers of American Foreign Policy in the Cold War Era, Vol. 2. Studier utgivna av Kungl. Humanistika Vetenskapssamfundet, Lund, Sweden: CWK Gleerup.
A c i t i c l i Constructing National Interests
269
Schlesmger, A.M. ( 1 965) A 7'hozrsarzd Days: / o h ): Ketznrefy 111 the Whrte House. Boston: Houghton Mifflin. Shaplro, M.J. ( 198 I ) Langi~agc,anti lJolrtrcal llnderstnntiittg: Tlx. Polrtrcs of Discursrl~cPrizrtices. New Haven: Yale Univrr5ity Press. Siv,lchev, N.V. and N.N. Yakovlev (1979) Rrtssia a n d the Urtrtc~eiS t a t ~ strans. , O.A. Titelbau~n. Chicago: Un~versityo f C h ~ c a g oI'ress. Sl'lrer, J . ( 1 9871 ' I h m i n o s in Central America: Will They FiiII? I>oes it Matter?' 1nterrt~7tro~1aI Srrrrrrty 1 I ( ? ) : 105-.34.
S m t h , 1.' ( 1989) Discertrilig the SrrO~~ct. Minneapolis: University of Minnesota I'ress. Sni~th,S. ( 1986) 'Theories of Foreign Policy: ,411 H ~ s t o r ~ c over a l vie^', RCLGPW of Intcr~ratiomzl Strrtircs 121 1 ): 13-29. Sonderman, ]'.A. ( 1987) 'The (hncepr of N'ltional Intere\t', in W.C:. Olson (cd.) T/JC T / J C ( J ~ ' ~ 7th I I Sedn, . pp. S7-65. Englewood Cliffs: I'renticeirnd I'rarticc, of Itztrrttirtiorrill R C ~ L ~ ~ I O Hall. Sorcnson, T. ( 1 965) Ke~~rreti?: New York: Harper & Row. Sreel, K. (1969) 'Endgame', review of R.F. Kennedy, Thrrtccw D~rys.N e t i ~York Kelwc, of Hooks 13 M x c h : 18. Steel, R. ( 1970) I'irx Atttcwrrltra: 717r Cold W'zr Ewprre attti t l ~ cPolltics of (;oz4r1terrevol11ti~111, rev. edn. New York: V ~ k ~ nI'ress. g Stevenson, A. ( I 962) 'UN Securit) Council Hears US <:Iiarges of Sovier Mtllt.iry Buildup In <:uha', Speech t o the U n ~ t e dNations General Assembl~,2 3 October 1962, Depart~ncntof Stirtc. Hrilletirr I 2 Novctnher: 723-34. 'l'cxt o f IJN-Culi,tn Notes' ( 1962) 2 7 October, Neu' York 'lrrtrr~s2 8 Octoher: 3. I . Tomlinson, J . ( 199 1 ) Crrlt~trirlIrnprrii7lrsv1: A Crrtrc-01 I~ltrodrr<-tir~rr. Baltimore: Johns Hopkins l i n ~ v e r s ~ Pres\. t) Trachtenberg, hl. (ed.) (1985) 'Wli~tetlouse Tapes . ~ n dM ~ n u t e sot the Cuban M ~ s s ~ Cris~s: lc The ExComm Meet~ngsof October 1962', 1ntcmi7tiotral Scclrrity 1 O(1): 164-203. Truman, H.S. ( 1 94.5) 'Specul h2essage t o Congress Recommending the Establish~nentof a lkparrment of Nation.11 Defense', 19 December 194 5. Prrhlic Papers of the I'rcsrcicnts, Horry S. Trr~nrirn,IWi, pp. 546-60. Washington: Government Printing Office. Tucker, 1i.W. ( 196 1 ) 'I'olitical Ke,llism , ~ n dForeign Pol~cy',World Polrtirs l 3 ( 3 ) : 4 6 1-70. US Department of State, Bureau of Publ~cAffatrs ( 1962) 'Developments in the Cuhan Siruation: Quc\tions rid Answers', k o r c ~ g rAffmrs ~ Ot4tlr17es, I l e p a r t ~ i i ~ on ft Stare I'uhlic~tion 7454, Inter-Anicric,in Series 8 1. W,i\Iiington: Government I'rint~ng Office. US Natlonal Securiry Counc~l(1950) 'NSC' 68: Un~red Sr.lto Objectives and Program\ for National Secur~ry',14 April 19.50, reprinted in T.H. I:r;rold . ~ n d1.1.. Gaddis ( e d ) Co~~tirrm~lc'rtt: Docrrttrrrrts oil Anzencm I'olic!' find Strrztec
270
Widening Security
Wendt, A, (1992) 'Anarchy is What States Make of It: The Social Construction of Power Politics', International Organization 46(2): 3 9 1 4 2 5 . Williams, R. (1981) Politics and Letters: Intervxws with New Left Review. London: Verso. Williams, W.A. (1962) Tbe Tragedy of American Diplomacy, rev. edn. New York: Delta Books. Wilson, W. (1918) 'Address to Congress', 8 January 1918, reprinted in T.A. Bailey, Woodrow Wilson and the Lost Peace, pp. 3 3 3 4 . Chicago: Quadrangle Books.
Multiple Identities, Interfacing Games:The Social Construction of Western Action in Bosnia K.M. Fierke
The fundamental f x t here IS that we lay down rules, a techn~que,for a game, and that then when we follow rules, thmgs d o not turn out as we had assumed. That we are therefore as ~twere entangled In our own rules. T h ~ sentanglement In our rules 1s what we want to understand (1.e. get a clear vlem o f ) . (W~ttgenste~n, 1958: 125)
T
he end of the Cold War raised serious questions about the dominant paradigms of International Relations, and particularly neorealism, given the failure to predict one of the most dramatic changes of the century (Allan and Goldmann, 1992; Bowker and Brown, 1993; Caddis, 199211993).Some realists now emphasize that it was not realism per se that was put to test by these events, but the rigid structural realism of Kenneth Waltz, which dominated at the time (Wohlforth, 1994l1995: 92). While realists have traditionally emphasized historical contingency, Waltz abstracted from the detail of any particular historical context in order to formulate a more generalized theory regarding the continuity and repetition of balancing behaviour hy states. In his view, to form a theory 'requires envisioning a pattern where none is visible to the naked eye' (Waltz, 1986: 37). The historical particularity of the events giving rise to the end of the Cold War, as well as the greater emphasis in recent years on ideas, perception and interpretation by scholars of various stripes (Campbell, 1993; Gagnon, 19941 1995; Owen, 1994; Wendt, 1992; Wohlforth, 199411995),' suggest that Waltz may have got it wrong in arguing that greater explanatory power is gained by abstracting and moving away from the detail (Elshtain, 1995: 273, 277). One purpose of this article is to suggest an alternative approach to the analysis of patterns in International Relations, a form of analysis that requires moving closer to the detail rather than abstracting. These patterns are not to be found in causeeffect sequences which are repeated throughout time,' but in shared rules, Source: turopei7rr lourrzal
ot Ir~trrrzutrotznlRelatrotrs, 214) ( 19'16): 467-97
272
Widening Security
drawn from the past, by which actions are constituted. The metatheoretical approach examined here builds on the later work of Wittgenstein (1958), and particularly his use of 'language game^'.^ A second purpose is to apply this approach to a cursory analysis of a post-Cold War context: the war in BosniaHerzegovina. It is unusual to combine this kind of metatheoretical exploration with a concrete application within a single piece; in this case the two parts are interdependent since the significance of the analytic tools can only be demonstrated by putting them to use. This exercise is less explanatory of the Bosnian context in any complete sense than illustrative of a particular approach to analysis. The choice of context did, however, result from a number of questions that arose against the background of the dramatic events during the summer of 1995. The first was how to understand the apparent stalemate or inability of 'the West' to act. The second was how to understand the transformation of the Western position by the end of August 1995 towards more interventionary strategies thought originally to be unrealistic in this context. The analysis does not extend beyond the NATO bombing campaign at that time.
Multiple Identities/Multiple G a m e s The proliferation of actors is one of the striking features of the post-Cold War era. While bipolarity was a defining feature of the Cold War world, it is multiplicity, more than multipolarity per se, that has characterized this new world 'order'. Multipolarity is associated with more than two states engaged in some form of balance of power politics. By contrast, post-Cold War conflicts are as likely to be over the identity of the state and its boundaries or to involve a multiplicity of actors, as in the conflict between Greenpeace, Shell Oil and the British government; negotiations over regional trading blocs, within which governments, trade unions and multinational corporations have differing interests; or peace-keeping missions, such as in Bosnia, which involve the United Nations, as well as NATO, in a war between religious ethnic groups. States can no longer be assumed to be the only significant actors in world politics. A flexible approach capable of capturing the multiplicity of identities and games is needed. Language is at the heart of this alternative. The positivist model denies the importance of language, yet implicitly assumes an epistemological position regarding the relationship between word and world. Words are labels that we apply to discrete objects in an objective world. The whole notion that we can test a hypothesis relies on the assumption that the scientist can compare his statements with reality to see whether they correspond. Wittgenstein was very clear about the impossibility of getting behind our words to compare them with that which they describe (Wittgenstein, 1958: 357,401). Rather than understanding words as labels, he approaches language use as a form of action in itself, which cannot be isolated in the
1t
Multiple Identities, Interfacing Games
273
description of discrete objects; agents, actions and objects are given meaning within the context of a game, that is, a set of practices based on rules within which they are constituted in relation t o one another (Wittgenstein, 1958: 1, 7, 23, 65, 66). A chess analogy is useful for elaborating the significance of this approach.Vmagine a chess board with all its pieces. Based on the 'words as labels' approach, we are immediately confronted with the question of whether to attach the label 'piece of wood' or 'piece of metal', whatever the case might be, to the various pieces or, by contrast, the labels knight, bishop, pawn, etc. Once we concede that the latter is the most concise label, we are forced to recognize the dependence of these identities on the larger game of chess. The identity of a piece of wood as a knight, what one does with it, that is, move two spaces one way and a single space another, cannot be detached from the rules of the game of chess (Wittgenstein, 1958: 31). Likewise, we could not begin to observe two players moving objects around on a hoard and say anything meaningful or strategic about these moves or the process by which the game unfolds without knowledge of the rules (Wittgenstein, 1958: 33). Any move made within a game of chess can be understood to be an expression of following or breaking the rules of chess, since these rules prescribe the boundaries of what can reasonably be said about it or done within it. It would be meaningless, as well as nonsensical, to begin invoking the rules of monopoly to describe the interactions between players of chess. A central point of this chess analogy is to begin thinking about patterns belonging to social relations in a way that can be distinguished from the regularities and patterns presupposed by the notion of n causal law. The search for causal laws is considered to be important precisely because of a desire to establish the existence of recurring features of International Relations. The source of regularity in this case is assumed to be independent of human meaning. To explain something is to identify that which necessarily caused it. This relationship, at least in reference to a covering law model, is necessary because of a recurring pattern under which it can be subsumed. A law either exists or it doesn't. The purpose of falsification is to make a valiant effort to demonstrate that it probably does by looking at the most difficult case in which it might not. By contrast rules are explicitly social and thc patterning or regularities we associate with them are dependent on people following them over and over again.' The game of chess would change significantly i f we stopped following the rule that knights move two spaces forward and one sideways or vice versa. A rule cannot be applied just once; it is like a custom that is continuously reproduced through our practice (Wittgenstein, 1958: 199). Rules d o not determine behavior in the way that causal laws are said to. We follow rules in acting but it is perfectly possible to break a rule or begin following a different set of rules (Wittgenstein, 1958: 201). Failing to follow a rule in n o way falsifies it. However, in a situation governed by a consistently applied set of rules, if everyone for some reason stopped following them
274
Widening Security
and took up another game, we could say that one set of rules had replaced another. While laws are the basis for identifying a singular cause, there are multiple rules belonging to multiple games. The question is why choose a metatheory and method based on one or the other approach, that is, causal laws or rules? The standard argument is that causal laws are superior because they allow us to explain why one variable necessarily caused another by identifying this relationship with a recurring pattern. The goal is to construct theories of international relations of equal status to the theories of the natural sciences. The problem is how we ever identify any two events across time as the same, which is a necessary step in order to make the claim that a pattern has recurred. O n the basis of the positivist model, this involves an act by the scientist of naming two contexts as similar. Explanation, in this case, begins with the categories of the scientist which he sets out to compare with the world. In this case attention shifts to acts of naming by the subjects of study. An analysis of this kind is not explanatory in the way that a positivist model claims to be explanatory. Following rules does not involve the determinancy associated with causal law. However, by providing a descriptive account of a particular world, including the meaning of acts in relation to objects and in relation to the acts of others, we do explain what happened. We explain the unfolding of a context in much the same way that the observer of a chess match explains to an audience the relationship between different moves and the eventual outcome of the game. As the analogy suggests, the unfolding of one game is not a guide to how future matches will unfold. Such an approach makes it possible to explain the particularity of outcomes by situating them within the rules of a game. This approach is useful in a case like Bosnia since it is not recurrence that needs to be explained but a change in strategy and, in addition, a diversion from that which had initially been defined as most 'realistic'. The specificity of an outcome can be understood by reference to a system of rules. Rules are social in nature and, therefore, inseparable from human meaning. If one says she would like to play a game of chess but does not know the rules, and the other responds by saying 'sorry, they are a secret', it is not possible to engage in playing. Rules constitute not only the identity of the pieces with which the game is played, but the meaning of any particular move, which can be repeated by anyone who engages in play (Wittgenstein, 1958: 54). Moving a knight two spaces one way and a single space another is meaningful precisely because it relies on a rule which is the basis for innumerable players - and even a computer6 - to move a knight in this w a y in each game of chess that is played. The pattern is evident in what is done, that is, an act, repeated over and over again by players of chess who will never know one another but know what it means to play this game and how one goes about the playing. No two games of chess will follow precisely the same course, however. In fact, the future chess champion may recognize, in the range of possible moves from any one position on the board, the wisdom of avoiding certain past mistakes. The only sense in which one can meaningfully
I
t i
Multiple Identities, interfacing Games
275
introduce the possibility of encouraging or discouraging a particular outcome is in recognizing particular strategies that grandmasters have employed, strategies which encompass more than a single move. Achieving precisely the same outcome would require that both players repeat precisely the moves of a particular chess match, which is highly unlikely. The point is that each chess match unfolds in a distinct way rather than recurring in cxactly the same way, as the logic of recurring cause and effect would seem to suggest. Yet the game of chess is constituted by rules which makes it possible for particular acts to be repeated by players who will never know or see one another. The pattern is a function of the rules by which players know 'how to go on' within a game or the possible moves From any one position in a playing field (Wittgenstein, 1958: 179, 186, 198, 566, 567); it is not expressed in the similarity of outcomes. Identifying a pattern requires moving closer to the details rather than abstracting from them. The goal is to map a process of change by uncovering the rules of the game, within which moves are made and tracing the process by which a specific match unfolds. International politics is often metaphorically conceptualized as a game of chess. The purpose of this article is to bring this notion to life, by engaging in the analysis of a context of play, in this case, Bosnia-Herzegovina, at a stage when the conflict was undergoing a significant transformation. The analysis of a political context lacks the neatness of a single game with a single set of rules. In fact, the Bosnia context is interesting precisely because the conceptual confusion in the immediate aftermath of the Cold War is so evident here. Western decision-making over Bosl~ia-Herzegovinaillustrates that we d o not simply apprehend a single objective reality through observation; rather reality is constituted as one set of meanings as opposed to another is brought to bear in naming a context.' What follows can be thought about in two ways. First, actors, in making sense of a context, identify a family resemblance with the past. In so doing, they selectively focus on certain details, placing them within a coherent frarnework. One might say that meaning is attributed on the basis of historical analogy."he analogy is possible hecause of a fanlily resemblance between some feature of the present and the past. I use the term 'language game' instead of analogy, however. Rather than a comparison of two pictures, as suggested by the analogy, a language game is more dynamic, insofar as it establishes a playing field populated by certain types of identities who engage in particular acts, and can maneuver in a range of ways. Second, in each case a resemblance is identified with a past context of war. In this regard, all of the games belong to a particular type of game, that is, games involving war. In each of these war scenarios a different strategy or set of moves is employed at a particular point within a given match.' The players consider which strategy, employed by grandmasters in the past, will achieve or avoid certain outcomes. If a set of strategies, derived from specific matches, belong to the range of moves constituting war, the key is to assess one's position within a larger ongoing game and 'how to go on' from that position (Wittgenstein, 1958: 179, 186, 198, 566, 567).
276
Widening Security
The first point is more useful for thinking about the process by which meaning is attributed to a context as observations are situated within a coherent framework. This framework represents a selective interpretation, emphasizing certain features and ignoring others, which circumscribes the range of reasonable responses. The second point is useful for understanding a change in Western strategy toward Bosnia as the larger game unfolded in the spring and summer of 1995. The naming of a context is not static, but is part of an ongoing process. As a game unfolds. the relationship between the pieces and the range of possible moves is transformed. What is rational, and therefore realistic, from one position during a match, may become less so at a later stage as the configuration of the game changes. The notion of historical tournaments belonging to a larger game of war also sheds light on the fact that most strategies described below did represent an effort to avoid certain mistakes of the past. The epistemological point of the chess metaphor is that social reality, like a game, is constituted on the basis of rules, meaningful because of a history of past use, by which players know 'how to go on'. The world is not simply given, and apprehended through observation, but is constituted, and made meaningful, as actors apply one set of distinctions as opposed to another.
Naming Games Before one can set out to play a game a decision has to be made about the particular game to be played or - more appropriate to a social context - one has to determine the type of context within which one is situated and the actions meaningful to it. In everyday social life, this process of naming happens as a 'matter of course' (Wittgenstein, 1958: 217, 238). The rules are lived rather than consciously applied. The range of actions belonging to a context of 'greeting someone' or the types of situations in which one might 'offer a cup of tea' are so familiar that they don't even seem to fit the category of rules by which we know 'how to go on' in particular contexts. Similarly, within the Cold War one might argue that moves by the superpowers had become so familiar after several decades of playing that they seemed to belong to a natural order. As the Cold War crumbled, and with it old practices, the difficulty of situating ourselves in a game and therefore knowing how to go on, has become more apparent, and most particularly in former Yugoslavia where the naming of this context has, since the beginning, been very controversial. While generally referred to as a war, the issue of which war it most closely resembled - World War I or 11, Vietnam, the Gulf War, etc. - was significant in establishing the parameters of how to go on in this context, not to mention the identities of the different players involved.1° What follows is a brief sketch of various interpretations which have been drawn on to name the Bosnia context. It is important to emphasize that these represent Western interpretations, not those of factions within Bosnia itself. These constructions are based on clusters of related categories,
I
L
r i :*
Multiple Identities, Interfacing Games
277
ident~f~able by their fam~lyreseinblance wrth a particular h ~ s t o r ~ ccontext. al These categorle? have been mvoked repeatedly ~n p ~ ~ b accounts l~c of the Bosn~anconf11ct.l' All of them should be f a m h r t o the reader. My point is to illustrate the coherence underlying these mterpretatlons because of rules prolected from a pact context." Thls overview of multiple possible games provtdes a beginning polnt tor t h m k ~ n gabout the ~nterfacebetween them in the ongolng construction ot t h ~ scontext.
In this interpretation, the actions of the Serbs share a family resemblance with those of Hitler; they are trying to capture territory in the name of an ethnically pure state and to ethnically cleanse territory of a particular category of people: the Muslims.' This naming constitutes clear categories of aggressor (Bosnian Serbs), victim (Bosnian Muslims) and potential liberator (the West, NATO). Within the context of this game, inaction on the part of the West is a form of appeasement which will have predictahle consequences. The most rational action by the potential liberator, by contrast, is to stop the Serhs and liberate the Muslin~sfrom the extreme suffering to which they have been subjected.'"he consequence of not taking this action at an early stage in the conflict will he an increase in the power of the aggressor which will only make the larger confrontation that will necessarily follow more bloody. While familiar from the context of the Cold War, within which arguments against appeasing the Soviet Union were the standard fare of NATO, this interpretation was more likely to be heard from European peace movements or parties to the left most concerned about the injustice being done to the Muslim population in Bosnia." Like other interpretations, this one emphasized avoiding a mistake of the past, which in this case is Chamberlain's appeasement of Hitler at Munich. Appeasement is a sign of weakness which will only increase the strength of the aggressor. Intervention would lead to liberation of those who suffer and thereby result in a winning strategy. Intervention involves a range of primarily military actions including fighting on the ground, as distinguished from talking which was said to have resulted in appeasement. Talking and fighting are in an oppositional relationship within this game.
'
In contrast to the asgunlent for intervention, n~any,in the early stages of the war, argued that Bosnia had the potential for becoming another Vietnam, an argument with particular salience in the United States as the 20th anniversary of the withdrawal of American troops was approaching. The logical consequence of this type of reasoning is that the West shouldn't get involved. It is a Bosnian conflict based on nationalist and ethnic differences going back centuries, anlong peoples who have been trained in guerrilla warfare. The United States does not want to repeat the experience of Vietnam. As in the former interpretation, a mistake from the past shapes what is understood to
278
Widening Security
be reasonable action. As McNamara (1995) emphasized in his recent reflections, the consistent policy of successive American administrations was that the Vietnamese would ultimately have to determine their own destiny which should have been a powerful factor in limiting US involvement, but was not. Within the Bosnian conflict, the hesitation of the United States to become involved on the ground was coupled with afiguments that the arms embargo should be lifted so that the Bosnians could more effectively defend themselves against the Bosnian Serbs.16 It established the United States on the sidelines of this conflict, at best as a source of financial or material support. This is a Bosnian game, or at the very least a European one, which relates minimally to the national interest of the United States. The main players should be the various factions within Bosnia. Lifting the embargo would make it possible for the US to avoid another Vietnam and for the Bosnians to defend themselves. Until the summer of 1995, this option did not make much headway, since it was opposed by the European allies and, on and off, by President Clinton. Gulf War
In contrast to US arguments about its place at the sidelines, another line of reasoning establishes the relative weakness of any one European power relative to the United States. The US, as the major world power, should lead since no one European power on its own has the capacity to do so. Within this strategy, the United States or NATO, under its leadership, is the primary actor as in the Cold War or Gulf War." The objective is to deter and the threat is reinforced or realized with highly advanced military technology. In contrast to an intervention game, this is a 'clean' strategy. Since reliance is on airpower rather than troops on the ground, it is possible to respond militarily to the morally outrageous behavior of the Serbs against UN personnel in Bosnia at a minimal cost. An alliance structured around a dominant power and dependent allies is the main actor in this case, and its central action is threatening, which would be followed by bombing from the air if deterrence failed. Unlike other interpretations, which emphasized playing old games with more skill and effectiveness, this interpretation points to a success from the past which might be repeated in this new context. Following the recipe of an extensive bombing campaign against Iraqi targets in the Gulf War, NATO airplanes would begin the complete neutralization of Bosnian Serb air defenses from Italian airbases and aircraft carriers in the Adriatic Sea. Once air supremacy was reached, NATO bombers would be free to destroy munitions depots, central command posts and the heavy equipment of the Bosnian S e r b ~ . ' ~ World War I
One other line of reasoning, which played a role in establishing peacekeeping as the dominant game, is the fear that the Bosnian conflict could spiral out of
1 ,
I
Multiple Identities, Interfacing Games
279
control, drawing in other major powers.'y Sarajevo is the site at which World War I broke out, and is on the faultline of historical great power conflict. Peacekeeping, as a strategy, is an attempt to avoid the mistake of World War 1. Great power conflict is to be avoided by involving the major contemporary powers directly in decision-making over this conflict in a peaceful way within the Security Council. Peace-keeping would preserve the balance of power politics within the United Nations, thereby preventing an escalation of tensions at this level, while attempting to respond to the humanitarian disaster in Bosnia by sending troops to protect refugees and to facilitate the passage of humanitarian aid. In contrast to the Cold War, during which warnings of appeasement constituted a 'realist' approach, this interpretation was largely viewed as the most realistic. As Robert Howse (1995: 2) states: In the realist view, national conflicts are inherent in the deep structure of international politics in the post-Cold War era. These conflicts cannot he prevented or solved, but rather the major task is to prevent their escalation into unhounded and unstable competition between the major powers. This, for different reasons, suggested a minimalist response to the Yugoslav crisis, a response that would not require a hard choice between the different traditional allegiances of the European powers in the Balkans ... and would therefore prevent the Yugoslav crisis from escalating into a conflict among the major powers. Of course, an underlying assumption was that decisive intervention would require the intervening powers to choose sides. ... Unless either of these main perspectives on the post-Cold War world order have misunderstood the character of nationalism in the contemporary world, we are compelled, whatever our moral sensibilities and instincts, to view the Western response to the Yugoslav crisis as entirely reasonable. As for the sanctions against Serbia, UN intervention in the form of peacekeeping, negotiations, and so forth, these can best be seen as relatively low-cost, politically rational responses to an uneducated public opinion, which demands that 'something must be done'. To decry the failure of these measures is to assume that Western statesmen or policy bureaucrats ever seriously believed they would lead to a resolution of the war. Howse displays concern about - if not a respect for - the importance of public opinion in this game. The emphasis is not first and foremost on morality, but keeping the costs low. Action must appear to have moral relevance, however, in light of public demands that something be done. Therefore, 'promising to protect' Bosnians in safe areas from Serb aggression is a major move within this game. Resolving the conflict is less significant than keeping it from spiralling out of control, as it might if the arms embargo were lifted or the Western powers intervened directly. The very possibility of the UN presence in Bosnia was predicated on a minimal acceptance of this game by all the parties involved, from great powers to those engaged directly in the Bosnian conflict. Parties to a conflict had to
280
Widening Security
agree to the presence of UN peace-keepers.20 In addition, this game was constituted around a number of identities and a shared understanding of what they would do. United Nations troops were neutral, meaning that they would not engage in armed conflict with any one party. They were there to protect populations and facilitate the movement of humanitarian aid. Within this game, no one local party is associated with guilt; it is understood that all contribute to the construction of the conflict. The possibility of moves which threaten the neutral position of the United Nations, for instance, by punishing the Bosnian Serbs, was minimized by the differing interests of members of the Security Council, and Russia in particular. All of the major powers and conflicting parties in Bosnia were actors in this game. A victory would be a negotiated agreement bringing the conflict to an end. An eruption of the conflict beyond the parameters of Bosnia and involving the major powers was to be avoided at all costs.
Public Reasoning
As the different naming games illustrate, the rationality of particular moves belongs to a context. Each defines the identities of the players and how they relate to one another, what can and should be done with the available material capabilities and the consequences of doing so. The identities of the players are not fixed as 'egoists', for instance, but constituted in relationship to one another within particular games. The Bosnian Muslims are constructed as 'victims' in relation to Bosnian Serb 'aggressors' in a World War I1 game, and the need for 'liberation' relates to Serb acts of 'ethnic cleansing'. In the World War I scenario, the emphasis shifts from the identities of local players21 to the potential that the major powers may be drawn into conflict. The difference between the two may be subtle, but is significant in constituting the response of the West - intervention vs peace-keeping and negotiations. Each of the games is constituted in a public language, that is, the meaning is not specific to individuals (Wittgenstein, 1958: 491). This is common sense, in so far as action involved deliberation between leaders on two continents regarding a situation with potential consequences for the populations of each. While there are clear examples of secret deliberations and moves within this context, the larger strategies had to be publicly presented and reasonable to that public. The specter of body bags filled with European or American nationals coming home from a far-off war played into the debate over what should be done. In the United States, as peace-keepers were preparing to leave for Bosnia, the media endlessly repeated the need for President Clinton to convince the American people of the rightness or national interest in this decision. The question of whether there was a national interest in sending young men and women to Bosnia was a big one in both Western Europe and the United States. But the moral necessity to 'do something' also played a role in public discourse. Media images of bare-boned Muslim men staring out over
t ic
r l,t,
Multiple Identities, interfacing Games
28 1
barbed wire fences tapped the public consciousness; it was not merely the raw observation of starving men, but rather the meaning of this image, 50 years after World War 11, and after 50 years of saying 'never again'. O r from the American side, the significance of the Vietnam scenario was the meaning of sending American troops abroad into a conflict that was potentially as unwinnable and complex as the debacle 20 years earlier. The question of how to respond to Bosnia had a clear public dimension, and was not merely a matter of the rational calculation or the intentions of individual^,'^ as is often emphasized in the study of International Relations. Acts of naming a social game relate t o processes of public reasoning by which leaders attempt to establish the greater rationality of one game over another. Kratochwil (1989: 11) makes a distinction between the rationality of individual choice and processes of public reasoning: Since rules and norms influence choices through the reasoning process, the processes of deliberation and interpretation deserve further attention. While various choice models have attempted to give a coherent account of certain aspects of choosing, such as specifying rational action as a maximizing choice under certainty, risk or even certain conditions of interdependence, these models are of limited help in understanding the reasoning procedures we use when we argue about our grievances. In that case the reasonableness, fairness or appropriateness of our valuations and their attendant claims to priority are at issue. Here the rational-choice models are of little help precisely because the criteria of traditional rationality presuppose the independent and fixed valuations of the actors. However, most of our arguments concerning policy or rights are not so much about the determination of the likely result, given a certain distribution of 'preferences', as they are debates over which preferences deserve priority over others, which ones ought to be changed, and which judgements deserve our assent. Here the overall persuasive 'weight' of claims rather than their logical necessity or aggregation is at issue. N a t ~ o n a land moral Interest may be d ~ s t ~ n or c t In competltlon, but both played a role. Real~sts\lnce Machlavell~have recogn~zeda gap between the natlonal Interest underl) mg the calculat~onsof state leaders and the Instrumental role ot moral d~scourse,dtrected at the public, but one mlght argue t h ~ the t gap hetween these two has been clos~ngd u r ~ n gthls century. E.H. Carr starts h ~ cs l a w c work, Thc Twenty Years' Crlsls ( 1 964: 2 ) , w ~ t ha c l a m that the h r t h of Internattonal Relat~onsas a sclence was gwen l lmpetus by the convlctlon, atter World W
282
Widening Security
ideas about morality and what the 'ordinary man' is thinking (Carr 1964: 146-9). Public opinion, in addition to economic and military capabilities, is an important category of power in his analysis, which is a point that has been largely lost on later realists. One might argue that the significance of this opinion has only increased with the advent of television, and even more so with the globalization of communications in the post-Cold War world. President Clinton articulated the difficulties of foreign policy decisionmaking in the post-Cold War era, given the need to explain policy choices to the public very quickly and the lack of stable categories for framing each new situation. As presented by Jonathan Alter (1993: 4 ) Clinton told Reeves [the author of a book on JFK's presidency] that he believes that he is in a Kennedy like period of activity now, with issues pressing in on him in rapid succession. But the president is almost envious of the clarity of the Cold War. Kennedy could rely on a ready made rationale for foreign policy decisions - namely, fighting communism. Nowadays, says Clinton, he is forced to explain the reasons behind intervention differently in each circumstance. And the reaction time is shorter. Survival of individual states in a war-like condition of anarchy is less an issue at this point in time, for the Western industrial democracies at least, than survival before a moody and multidimensional public. And it is this multidimensionality which gives rise to the contest between multiple scenarios of what is and is not realistic. Realism is not purely a matter of material capabilities; the public had to be convinced of both the rationale and the rightness of any particular move. Each of the games represent a packaging of this conflict in meaningful terms; and each is meaningful because Bosnia did share a family resemblance with these historical contexts in quite different ways, with the possible exception of the Gulf War. Each of the scenarios focused attention on different elements of this very complex situation. The possibilities were not infinite and the choice was only relative in a positional sense; that is, the meaning of this conflict was relative to geographical position and history. The events in Bosnia and the prospect of involvement pulled different kinds of emotional chords for Europeans and Americans. The boundaries of debate in the United States and Western Europe were quite different and in part this difference was due to historical experience. In the United States, games invoking Vietnam and the Gulf War were dominant, while World Wars I and I1 framed the debate in Europe. Peace-keeping and negotiation (avoiding the mistake of World War I) dominated as the most reasonable and realistic response throughout the conflict until the Americans stepped in to play a guiding role with the realization of NATO's 'Gulf War' strategy in August 1995. Other alternatives, less defining of the experience of these two continents, such as references to Bosnia as another 'Lebanon' or the potential for creating a 'Palestinian problem', did not capture attention in the same way as these other historical experiences.
t
Multiple Identities, interfacing Games
283
The role of the media in framing these games means that the choice of the most 'realistic' strategy is not totally in the control of experts or diplomats, who are forced to fit their analyses into sound bites. Media depictions take on a life of their own. O n the one hand, they become both an important source of information for those making decisions o n the ground and in Western capitals. O n the other hand, the media simultaneously responds to and constitutes the public response.
T h e Analysis of G a m e s Actions are dependent on language for their meaning. While experience may be individual it can only be meaningfully understood or communicated on the basis of language, the rules of which are shared.lZIt is not possible to simply observe behavior, to understand its meaning in the absence of language, any more than we know or can learn the meaning of the various chess pieces or the rules by which they are used in the absence of language.24 Language is woven into the range of acts constituting a game and language is the vehicle by which we are socialized into, or learn the rules of how to proceed in any context. Analysis of language games does not deny the importance of material objects or capabilities. This is not an argument about the importance of ideas over military and economic capability. Rather, the instruments of action take on meaning or a particular use or avoidance of use is justified within the framing of a particular game. The capability of the US or NATO to use force was less at issue in this context than the rationale, political will or moral necessity to do so. The 'realist' response to Bosnia was initially to avoid the use of force and to emphasize peace-keeping and negotiations, given fears that the conflict would spiral out of control. The central question here is how the 'West' moved toward alternative strategies by August 1995 which had initially been considered 'unrealistic'. The naming of a context is an act in itself which establishes a set of distinctions and the boundaries of action (Hinds and Windt, 1992: 9). The public reasoning behind these interpretations is also a part of this act of naming in so far as it contributes to the constitution of one game or another as dominant. When put into place, each of the resulting games specifies the moves specific to it, such as intervening, threatening o r facilitating the movement of convoys. One class of acts is not by definition undertaken with language, but the meaning attached to them is dependent on language. Particular movements, which to the observer may look similar have distinct meanings within different games; intervening and invading, for instance, cannot be distinguished on the basis of pure observation. There are also classes of acts which, like naming, cannot be undertaken without language. Within the Cold War, the 'threat' to use nuclear weapons if the Soviet Union crossed a line in Central Europe and the 'promise' to the Western Europeans that the United States would protect them were two such acts. The dependence on nuclear weapons does not subtract from the fact that
284
Widening Security
'threatening' and 'promising' are speech acts and they are speech acts that were not only undertaken by state leaders but were part of the shared language by which the Cold War was c o n s t i t ~ t e d In . ~ ~that context, threatening and promising were part of the same game - the threat to the Soviet Union was part of the realization of the promise to protect Western Europe. These same two acts are also undertaken within Bosnia, although their meaning is constituted within different games. In 1992 the UN's 'promise to protect' focused on the humanitarian convoys supplying relief to civilians suffering as a result of the conflict. The idea of a 'safe haven' was first applied in March 1993, in response to attacks by Bosnian Serb forces which resulted . ~ ~ protection of in thousands of Bosnians seeking refuge in S r e b r e n i ~ aThe refugees was understood within the traditional UNPROFOR mandate and was not supposed to detract from UN 'impartiality'. In this context UNPROFOR was authorized to act in self-defense, including the use of force, in reply to attacks against the safe areas.27 The Security Council also decided that member states could, acting nationally or through regional arrangements, use all necessary powers, including air power, to support UNPROFOR. In January 1994 NATO issued a declaration which, in addition to emphasizing the importance of a negotiated solution, reaffirmed their readiness, under the authority of the Security Council 'to carry out air strikes in order to prevent the strangulation of Sarajevo and other threatened areas' (UN, 1995: 84). While previously any air support had been explicitly designated for purposes of self-defense of UN personnel, NATO was authorized to use air strikes for pre-emptive or punitive purposes, but only on the basis of a decision by the North Atlantic Council. The deterrent threat was first and foremost intended as protection of UN personnel who were engaged in protecting the refugees in the 'safe havens'. The 'threats' and the 'promises' in this construction can be understood as actions belonging to two separate yet interfacing games, with the UN peacekeepers at the intersection of both. Bennett and Thorson (1991: 133) distinguish different types of deterrence, one of which is extended deterrence involving the protection of third parties, as in the US protection of Western Europe with its nuclear umbrella. They state the difference between two types of deterrence as follows When the contingency that party a hopes to avert involves harm by b specifically upon a third party c, then the content of the threat differs from the case of 'direct deterrence', in which a attempts to dissuade b from doing harm to a. Notice the structure of the interfacing threats and promises in the Bosnian context, with p representing the UN peace-keepers, s the populations in the safe havens, n NATO and b the attackinghhreatening party in Bosnia. P attempts to dissuade b from doing harm to p, who is protecting s, a situation of direct deterrence in so far as the threat to use force is in self-defense, and not directly tied to the protective task of the peace-keepers toward the
f
~
i
s
lLe i
Multiple Identities, Interfacing Games
285
safe havens. This can be distinguished from the formula n hopes t o avert attack by b on p, a third party, who is also protecting a fourth party, s. The peacekeepers are a t the intersection of the two threats within two potentially conflicting games. O n the one hand, the threat to use force in self-defense is a move in a game in which the peace-keepers as the protectors of refugees are 'impartial'. The NATO threat, as a form of third party deterrence, intended t o protect the peace-keepers, who are t o protect the populations in the safe havens, is much more conducive t o an interpretation of 'partiality' in which the peacekeepers and those they protect blur t ~ g e t h e r . ' Also, ~ this game constructs a clearer distinction between threatener and potential aggre~sor.~' In the one case that the deterrent threat from NATONN actually worked, the two games were closely interfaced and reinforced the 'impartiality' of actors under UN auspices. The first articulation of the threat was inspired by international outrage in response to the 58 civilian deaths in the bombing of Central Market in Sarajevo on 5 February 1994. Boutros Boutros-Ghali argued, in a letter t o the Security Council, that the incidents made it necessary, in accordance with Resolution 836 ( 1994), to prepare 'urgently for the use of air strikes to deter further attacks' (UN, 1995: 86). An ultimatum was issued demanding that, within 10 days, all parties move their heavy weapons outside the exclusion zone surrounding Sarajevo o r be subject to NATO air strikes. The Russians stated that the call for both the Bosnian Serbs and the government to place heavy weapons in Sarajevo under UN control or withdraw them was close to their position, but disagreed with 'interpretations' of the ultimatum by some NATO members as a 'one-sided ultimatum to the Bosnian Serbs' (UN, 1995: 87). While interpretation of the Sarajevo ultimatum allowed for a specific focus on the Bosnian Serbs, the 'impartiality' so central to the peace-keeping game was maintained since both sides were implicated, if not equally. In this context, both parties did, for the time being, move their heavy weapons outside the exclusion zone. After Sarajevo, the use of the NATO threat increasingly focused on the Bosnian Serbs who were attacking safe havens populated by Bosnian Muslims, which set the stage for alternative moves by the Bosnian Serbs within a Gulf War game.
The following is a preliminary analysis of the trarisformation of interfacing games within this context based on categories drawn from newspaper accounts covering a period from March through July 199.5:'" The point of analyzing the categories presented in these public accounts is that knowledge of this context, our access t o it, is through language. Again, this is not assuming that capabilities are unimportant, but rather that their role and reasoning about how they should be put t o use is constituted within a language game. 1 want t o emphasize the preliminary nature of this analysis and that a 'thicker' description might be developed by adding documents from
286
Widening Security
the actors themselves as well as extending the analysis over a longer period of time. The goal of this sketch is to illustrate the transition from one set of interfacing games to another at a time of dramatic change (see Figure 1 on page 289). This section is written in the present tense in order to situate the reader within the changing games, based on the action categories used at the time. Between the Sarajevo ultimatum in February 1994 and the massive taking of UN hostages by the Serbs at the end of May 1995, moves are made by each side which transform the interfacing games by which the Bosnian context had been constituted. Bosnian Serbs step up acts of 'harassing' peace-keepers, 'hijacking' their equipment, 'blocking' convoys of aid and 'shelling' safe havens, at a time when they are increasingly 'isolated', 'losing morale' and falling behind the Bosnian government army. In the months prior to the hostage taking, the credibility of the threat of air strikes erodes, as requests for air support are 'overruled' by the UN and avoided because of the appearance of 'impartiality'. The United Nations, at the same time, is 'bowing' and 'making concessions' to the Serbs. By contrast, the UN tribunal on war crimes names Karadzic and Mladic, the two foremost leaders of the Bosnian Serbs, to be suspected war criminals, which transforms them from one of two perpetrators of a conflict into the perpetrators of genocide, torture and 'ethnic c l e a n ~ i n g ' . ~ ~ While the decision to introduce the threat of air strikes in 1993 represented an interfacing of a Cold WarIGulf War and a peace-keeping game, by late May 1995, as UN hostages are taken en masse by the Bosnian Serbs, the dominant playing field begins to shift toward two alternatives. The first illustrates the distinction between threatening within a Cold War and a Gulf War game. The Cold War was constructed around mutual threats, buttressed with nuclear weapons, between two major powers. By contrast, taking hostages and placing them at the site of potential military retaliation is an act within a game involving a major power possessing a significant military advantage over a weaker power. Saddam Hussein, in an effort to deter the realization of the threat to bomb by the US-led coalition, used Western hostages as a human shield. Like the latter, the Bosnian Serbs - not only weaker in relation to NATONN, but increasingly at a disadvantage in relation to Bosnian government forces - retaliate against NATO air strikes by taking UN peacekeepers hostage. Many of these 'hostages' are handcuffed to military targets and used as 'human shields' to deter further air strikes. The main demand of the Bosnian Serbs, now named 'terrorists' in the Western press, is a 'promise' to halt the air attacks. NATO is unwilling to rule out further bombing; the UN, on the other hand, refuses to authorize any further NATO actions. While applying the name 'terrorist' to the Bosnian Serbs, Western or UN actors make moves that are contrary to the conventional wisdom of how one deals with terrorists, that is, they 'make concessions', against the background of threats by the Bosnian Serbs that any attempt to 'liberate' the hostages would be writing their death warrant. A secret deal is made between
I
Multiple Identities, Interfacing Games
287
UN officials and the Bosnian Serbs for a release of the hostages in exchange for a promise that there will be no more bombings (Cohen, 1995; Evans and Boyes, 3 995). The hostages are gradually released as it becomes apparent that no further air strikes will be undertaken. The promise to protect the UN peace-keepers is at this point - in so far as these allegations are correct - coupled with a promise to the Bosnian Serbs that the UN will not attack, instead of being coupled to either the deterrence threat or the promise to protect the safe havens. As hostages, the peace-keepers are unable to protect the Muslim populations and public attention is diverted from this goal to 'protecting the peace-keepers', a pattern that reappears at a later point as Dutch peacekeepers in Srebrenica are taken hostage in mid-July. The impossibility of protecting the Muslim population, forced to flee as the 'safe haven' collapses, is recognized and, while concern is expressed about the plight of the refugees, energy is directed to getting the Dutch soldiers out o f Bosnia. With the effective collapse of the peace-keeping game, another historical analogy is reinforced as a defining feature of a second game - Chamberlain's appeasement of Hitler at Munich. Within this naming of the context, Serbian aggressors are once again advancing on the Muslims who, as targets of 'ethnic cleansing', are victims in the conflict. The Bosnian Serbs, refusing to call the UN peace-keepers 'hostages', refer to them as 'prisoners of war', who are aligned with the Muslim 'enemy', and therefore clearly 'partial'. The Bosnian Muslims, especially by the time of Srebrenica, clearly emphasize their position as 'victims' of Serb aggression, condemning, along with many international commentators, the failure of the West in this desperate situation, and emphasizing Western 'appeasement' of the Bosnian Serbs, against the background of criminal acts such as 'ethnic cleansing'. There is a family resemblance between the two new games. 'Appeasing' and 'conceding' or 'bowing' are similar acts. Both games are structured around an 'aggressor', 'victim' and potential 'liberator'. 'Liberating' and 'appeasing' or 'conceding' are opposing possibilities within these games. The identity of the victim in each game is quite different, however. In the 'hostage taking' game, the peace-keepers are in the position of 'victim' and the United NationsINATO in that of potential liberators who, rather than 'liberating', are suspected of making secret 'concessions' to the terrorists in the form of a promise to forego further air strikes in return for release of the hostages. In the 'ethnic cleansing' game, the Muslim population of Bosnia is the 'victim', and the United Nations the potential liberator, who instead is accused of 'appeasing' the aggressor. 'Concessions' were made to the Bosnian Serbs in this case as well." Against the background of two cases of hostage taking en masse hy the Serbs, France, Britain and The Netherlands make an effort to launch a Rapid Reaction Force for the purpose of 'beefing up' the protection of UN personnel and making a more 'muscular' response. Clinton uses the same language in relation to the air strikes, drawing more explicitly now on a Gulf War 'recipe'. Both become controversial and deepen divisions within the Atlantic Alliance.
288
Widening Security
The main question regarding the Rapid Reaction Force is whether it will have an interventionary role or be merely an extension of the peace-keeping mandate. The French in particular, with the British by their side, step forward as the leaders of this new more 'muscular' and 'firm' approach. UN Special Representative Akashi, about the same time, reassures the Serbs that this force will not step beyond the traditional mandate for peace-keeping, a move for which he is severely criticized. The transatlantic conflict is exacerbated by European concern about the air strike strategy and American demands to lift the arms embargo on the Bosnian government, as well as mixed signals from Clinton regarding the possibility of deploying UN troops to assist in a withdrawal of UN peace-keepers. The American Congress, beginning with the Senate vote in July, calls for the arms embargo to be lifted and various Islamic countries promise, about . ~response, ~ Clinton threatthe same time, to provide arms to the B ~ s n i a n s In ens to veto the Senate proposal, pleading that NATO's bombing strategy be given one last chance. On the same day, NATO makes an announcement that it will respond to all Serb actions against the remaining safe havens with intensive bombing of Serb command and supply targets.34 Senate majority leader Dole makes it quite clear that the Senate vote on the arms embargo is meant as a 'signal' to both NATONN and the Bosnian Serbs, regarding the consequences of their respective inaction or action. As these steps are taken, the two games that were explicitly avoided in the first instance, move into the realm of possibility, accompanied by talk of the impending collapse of the UN mission. A 'beefed up' Rapid Reaction Force, possibly for interventionary purposes, and 'deciding to lift the embargo' become the symbol of 'doing something' at a time when the United Nations has been exposed to repeated 'humiliation' for failing to act effectively to protect either the Bosnian population or its own peace-keepers. Constructing a Stalemate?
In concluding I want to take a second cut at these interfacing games. The question - consistent with Howse's 'realist' account of this conflict - is whether the dominant Western games intentionally or unintentionally encouraged a Serb advantage. If approached in this way, the moves of the Bosnian Serbs and Western actors can be placed within the contours of a single strategy of stalemate, within which the conflict between multiple moves is a part of playing. It is obvious that the ongoing lack of agreement over the naming of the Bosnian context was one source of stalemate, at least in a military sense. The conflicting demands to protect Western soldiers and to 'do something' were central to this lack of agreement. In addition, when the deterrence and the peace-keeping strategy are separated, as constituting two distinct games which are in many ways contradictory, the consequence of playing the two simultaneously becomes clear. Within a game involving more than one player, a move by one sets the stage for a response by the other. Moves are made
I I( I I,(
Multiple Identities, interfacing Games
289
f r o m a particular position within a playing field. T h e interface between the t w o games set the stage for a hostage taking by t h e Bosnian Serbs. O n the other hand, there may have been m o r e underlying agreement a b o u t w h a t t o d o than appeared o n the surface. If the objective of a realist g a m e w a s t o allow a quick victory a n d a territorial solution t h a t would reestablish order, o n e might argue a single g a m e w a s facilitated by multiple namings of this context. T h e following moves might bc understood as constituting a single game, the objective of which w a s a quick victory by the d o m i n a n t regional power. A strategy based o n doing a s little as possible, in order t o allow the w a r t o play itself out, involved the same actors a s a g a m e involving 'lifting the embargo'; however, in this case, o n e player h a d a clear handicap from the start which increased the likelihood of victory by t h e other. Western negotiators, since the Lisbon Agreement of 1992, accepted this power differential a s the Figure I : Interfacing Games
MOVE: UN/NATO I'rorn~se to Protect Safe F 1,lvens Response to: Serb Attacl\s Goal: Avoid 5prllover Mrstake of World W x I
MOVE: UN/NATO Threaten Ketal~ation Response to: Central Market boinbrng Goal: Deter- through threat Succcss o f C old W x
COUNTERMOVE: BOSNIAN SERBS Advance o n Srehrenrca Ethn~cclcmsrng, PK hostagcs Outcome: Tran\torm: World W'lr ll gdine
COUNTERMOVE: BOSNIAN SERBS Take h o s t ~ g c s'1s H u m m Shrelds Retaliation for: NATO arr strike5 Outcome: Tr'lnstorm: Gulf W ~ r l Terrorist g'lnic
PUBLIC RESPONSE: Moral o ~ i t r ~ g e Concern for Peacekeepers
I COUNTERMOVE: U N
COUNTERMOVE I: UN/NATO Appease aggressor Act: None Mistake in World War 11 game
Make concessions Act: Promise to halt attacks Mistake in Terrorist game
PUBLIC RESPONSE: West must act: Cred~billtvon the I ine COUNTERMOVE 11: EUROPEANS Response: More muscular approach Proposal for interventlonary force Repeat Succcss of World War I1 game
AMERICANS Response: More muscular approach Gulf War Recipe R e p a t Success of Gulf War
OUTCOME: Negotiations Note: There is n o t a pertect chronolog~caloverlap hetween the interfacing games, ac would seem to he suggested by this chart. The purpose is to map the qequence of moves in each case wh~chgave rlse to the outcome.
290
Widening Security
basis for negotiations, in so far as the terms of an agreement would have allowed the Serbs to hold much, if not all, of the land they had conquered. UN peace-keepers minimized the suffering of the war's victims, but subsequently facilitated the aims of the Bosnian Serbs by providing a safety net to catch 'cleansed' populations. The Serbian response to 'pin prick' bombs, that is, taking UN peace-keepers hostage, divided public opinion between concern over Western troops on the ground and moral outrage over the 'ethnic cleansing' of the safe havens. Divisions between allies over 'what should be done' contributed to inaction. Division, both within populations and between Western powers, was a part of playing this stalemate game, of providing a moral face while biding time until there was a clear victor, and in the process avoiding an escalation of the war. The objectives of this game turned out to be less than realistic, however, in so far as one of the oldest lessons was ignored, that is, political defeats can be as important as lost battles (Economist, 1995: 24). Despite an initial military disadvantage, the Bosnian government troops managed to prevent a victory by the Bosnian Serbs and by the time of the May 1995 hostage taking, were on the offensive. On the political level, the Bosnians occupied the moral high ground in this conflict, increasingly at the expense of the United Nations and NATO, both of which became unable to publicly defend a minimal response. From this angle, a 'realist' strategy of stalemate contributed, along with the actions of others, to a reconstitution of the playing field such that the games originally thought to be 'unrealistic' in this context moved toward center stage.
Conclusions Given the central role of the moral imperative to 'do something' in constituting the possibilities for action at different points in time, the relationship between the moral and the 'realistic' needs some rethinking. Realists have traditionally argued that morality is secondary to national interest as the basis for state action. However, many realists emphasize that moral discourse can play an important role in constituting the power of the state, even if the ultimate rationale for action is national interest.35In this context, there is a direct relationship between moral outrage, expressed in international public opinion, and diversions from the 'realist' course of doing as little as possible in order to keep the conflict from spreading. The articulation of the threat of air strikes emerged immediately in response to international outrage over the death of 58 civilians in Sarajevo. Demands for withdrawal of the peace-keepers emerged after the May 1995 hostage taking. Actions to lift the arms embargo against Bosnia were taken against the background of two hostage takings and the 'ethnic cleansing' of 'safe havens'. A logical consequence of the 'realist' relationship between moral discourse and power is that too large a gap between moral appearance and action (or inaction) diminishes that power. While some realists recognize a role for moral discourse in constructing state action, they cannot account for the underlying significance of this
~ u k i p l eIdentities, Interfacing Games
291
recognition. While realism assumes an objective reality, independent of human meaning, moral discourse, and not least its role in constructing state power, is fundamentally intersubjective in nature. After the Bosnian Serb attack on Sarajevo at the end of August 1995, killing 36 civilians and wounding 90, NATO was finally authorized to actualize the air strike campaign against Bosnian Serb targets. At this point the credibility of the United Nations and NATO was on the line a n d it was n o secret t h a t their survival was a t stake.
While survival is the highest priority of states in realist thinking, survival as a credibility issue, whether in the face of public opinion or other states, is not what the realist means by survival. Issues of credibility and legitimacy are intersubjective in nature. Underlying this credibility gap was some notion of right and wrong action and in this case, most notably, the difficulty of ignoring that 'ethnic cleansing' was once again happening in Europe 50 years after World World I1 and after 50 years of saying 'never again'. In addition, while realism posits the state as a unitary actor, the nod to moral appearance reveals the collective underpinning of state action. State leaders, in most cases, may act with a degree of autonomy, or may be more active than reactive in shaping public opinion, but both the need to shape international opinion and the concern for moral appearance presuppose the importance of public acquiescence to state action and the potential impediment to that action when the appearance is called into question. A 'realist' strategy could not be carried out consistently in this context, given the distinction between the reasoning behind this game - that is, doing as little possible, while presenting a moral face, and allowing the war to play itself out - and public demands that 'something he done' in response to successive onslaughts against the civilian populations in Bosnia. While the rcalist game required the inlpartiality of the UN, actions and public demands were clearly 'partial' in their nanling of the Bosnian Serbs as aggressors and, while both sides of the conflict were perpetuating the war, Bosnian Serbs' actions more blatantly violated accepted rules of warfare, in so far as they involved the systematic use of rape and execution as methods of war and the taking of U N peace-keepers as hostages." The incremental introduction of moves belonging to alternative games contributed to the waning of the d o n inant game of peace-keeping, and its replacement by the three more explicitly military strategies, bombing, intervention on the ground and a de facto lifting of the arms embargo, all of which are more 'partial' in their categorization of the Bosnian Serbs. In contrast to realist arguments about the danger that the conflict might spread as a result of any military action, as well as arguments about the unlikelihood of any solution, the possibilities of this context changed dramatically when NATO finally did realize the bombing campaign. After that time, the negotiating process took on a new seriousness, resulting in an agreement three months later. Part of the usefulness of a language game approach is to create distance from a single picture of what is real or rational in this context, and to emphasize instead the construction of a changing context. What players 'do' begins with acts of naming which establish the parameters for knowing 'how to go on'. I have analyzed the relationship between multiple names
292
Widening Security
for this context, as the basis for a range of contradictory games; based on a second cut, the UN - and the West - were engaged in a stalemate game constituted by acts which reinforced indecision and division. While the consequence of both is the same - an erosion of the credibility of multilateral institutions - the first arises from the inability to construct coherent action and the second from a deliberate strategy of inaction. These sketches are simplified representations of a range of interpretations and moves in this context of change. A 'thicker' description, adding an analysis of documents from the various actors, might provide the basis for a more detailed understanding of the structure of moves by which the war was constituted. The purpose of this analysis has been to introduce an alternative way to think about the patterning of International Relations, based on shared rules, drawn from the past. The patterning is to be found in the constitution of identity and action, based on the rules, rather than a similarity in outcome. Empirically, this preliminary analysis points to the role of interfacing games as a factor in constituting Western inaction and action in Bosnia. One question for further investigation, which emerges from this analysis, is how particular games or strategies come t o be understood as the most 'realistic'. 'Avoiding appeasement', a realist strategy in the Cold War and the Gulf War, was considered unrealistic in the early stages of Bosnia. A largely non-military strategy of peacekeeping and negotiation, by contrast, was considered 'realistic'. The contrast harks back to the classical realist concern with the contingency of historical context, in contrast to the greater emphasis on abstraction and the search for universal laws more characteristic of neorealism. The contrast also highlights the intersubjective nature of these processes of naming and of power, which is implied in classical realist thought, but never explicitly recognized. Notes This piece was written while the author was in residence at the Amsterdam School for Social Science Research, University of Amsterdam. She would like t o thank the Amsterdam School for their generous support of this project and the following people for their comments on draft versions of the article: Tarak Barkawi, Andreas Behnke, Shampa Biswas, David Blaney, Bert Bomert, Sherry Gray, Keith Krause, Peter Lawler, Jennifer Milliken, Iver Neumann, Nicholas Onuf, Richard Price, David Sylvan, and the referees of the EJIR. 1. With the constructivist move of the last decade, many scholars of International Relations have argued that the identity of states is constituted rather than given. More recent literature in the positivist tradition has focused on the causal role of ideas. This is particularly evident in the 'democratic peace literature', much of which argues that democratic attitudes cause peace. There is also an increasing emphasis o n the perceptions or interpretation of leaders, by both realists and liberals. 2. Many scholars have argued that the scientific study of world politics has not found anything of importance. See, for instance, Ferguson and Mansbach (1988: 220) o r Hawthorn (1991: 160-1). The latter states that 'generalisable answers of what we conventionally think of as a causal kind have ceased t o be persuasive. The casual connections or runnings-on that we have been able to detect in human states of affairs have turned out either t o have t o be
i
1c.r i r
Multiple Identities, Interfacing Games
293
phrased at a level that is so general as to be insufficiently informative and not address our Interests in explan.ltion; or to he so conditional as not t o be general'. 3. This IS not meant t o he an exegesis of Wittgenstein's thought, hut rather an elahoration o n the signif~canceof his notion of a language game for the analysis of International Relations. Wittgenstein was nor a social sc~entistand therefore 1 w ~ s ht o 'lvoid any pretension of following his &as to the letter. although 1 hope I have captured the splrir. 4. For a related, but distinct, analysis of Wittgenstein's chess analogy, see H o l l ~ sand Smith ( I YC) I ) a n d 1 1<1lli\ ( 199.5).
5. 1 a m referring t o constltutlvc rules, although there is cons~derabledebate about the e p arahil~tyof constltutlve and regulative rules. See Onuf (1989: 5 1 ) and Kratochwil (1989: 26). 6 . The tact th.it a computer can be programmed t o engage in a game o f chess, t o such a high degree of conlplexity ;is to compete with a chess~mstersuch :IS K.isparov, dramatizes the social nature o f rules, that is, that they 'Ire acquired, rather th,in based o n 'mental processes' of individuals. 7. Wittgenstein eniphasues that rules of language games are not fixed in the way they are in a rrame o f chess. It IS ~reciselvbecause the rules are not fixed and because there are nl~~ltiple poss~blegames, t h ~ we t need to tocus on how they are put t o use in practice, rather than constructing ideal models (Witrgenstein, 1958: 8 1, 84, 85, 90, 100, 10 1). 8. Th15 reterence to histor~calanalogy m,lkes one t h ~ n kimrned~atelyof the work of Kohert J e r v ~ s(1976). There is a significant difference, however, In so f,lr as he examines the role of these .unalogie\ In the cho~cesof ind~wdualpolicy-rmkers, I,awd on their belief cystcrns. I empIias17e the fund,lrnentally social nature of these analogles and r h e ~ rrole In processes of p u h l ~ creasoning. Yucn Foong Khong (1992) has done more recent work o n the role of htstorical analogy in the context of the Vietnam W'lr. 9. 1 a m indehted to I h v d Blaney, Macalcster (:ollegc, for the ~ngeniousinsight thnt the naming of games, descr~bedin the following, can be understood a s sets o f strategies, drawn from the experience of past w:lrs, which belong to the repertoire ot poss~blemoves. Rather than thinking ot each (1t the game.; as dict~nct,they should he understood to be nested in a larger game. Each h i s t o r d strategy i j a s p e c ~ f ~chess c match, with111which momentous blunders or SUCCCSS~UI I ~ I O V C Swere nude, ~ n probide d a model for reasoning J ~ O L I current ~ strateg!. 10. The distinct~onhet~vccna name ,IS a 'label', '1s opposed to naming as an 'act', hy which we selectively interpret realit), making certain kinds of distinctions and constituting certain pos\ihilities, needs to be cmphasizcd agair (W~ttgenstein,19.58: 27, 49, 59, 257, 4491. I I. Wittgensrein (1958: 202, 2 3 8 ) says following a rule is ,111alogoust o obeying an order, t h ~ IS, t it IS practice, done '1s J matter of course, rather than someth~ngone consciously thinks about. The idea that leaders consc~ouslychoose str,ltegles based o n identification with a past context would s e e r to he ~nconsistentwith rhis point. However, in this case, the process of narnung is less choos~ngfrom 1' repertoire of past strategies; rather the naming acts were insep~ r a h l efrom ohservat~on,w h ~ c hselect~belyattr~butedIneanlng on the b a s ~ sof one I,uiguagc game or another. It is less a matter of choosing which rule to obey than obeying a rule in the act of presenting Bosnia as one type o f context or another. 12. For the relationship hetween interpretation and rule, we W~ttgenstein(19.78: 1981. 13. I f one were t o focus o n the texts of local, as opposed t o Western actors, t h ~ sscript would he pos~tioned ditfererrtly, with the Serbs a w ~ i a t ~ nthe g Croats w ~ t hthe IJmshe, H~rler'spuppets d u r ~ n gWorld War 11 who massacred t h o u s a n d of Serbs, Jews, etc. 14. The precise move that constitutes 'stoppmg an aggressor' may differ from one contest ro another. When pl~tyedwithui the Cold War, it was an argument for deterrence; in this context it is 311 argument tor ~ntervention. 1.5. O n e example of rhis is a plece hy Martin Shaw (199.i) which begins with an analysis of a change in the position of the Western peace movement ,lnd the Left in general towards intervention since the end of the Cold War. While oppwition to Western intervention had heen a p o ~ n tof con<ensuc, various examples of genocide, and former Yugoslavia is the most noteworthy, were calling the old position ~ n t oquestion. In analysing Bosnia he points to several missed opportunit~est o halt the contlict e.lrly on, which 'might have inhibited the appalling carnage of the p ~ s rime t months'. He states, 'In a situation like Bosnia, the determined use of
294
Widening Security
limited military force is necessary to halt the massacres, to bring their perpetrators to international justice and to begin to restore civilian economy and society in a pluralist state. Without such clear evidence of Western determination to protect the people, war is likely to spread until everlarger-scale and less discriminating Western intervention is the unhappy consequence'. 16. The positive historical example that should be repeated, and which might help the US go beyond the paralysis of Vietnam, it is argued, is the Reagan doctrine, by which freedom fighters around the world, such as the Nicaraguan Contras and the Afghani Mujahadeen, were supplied with arms by the United States. See, for instance, Helms (1995). 17. This game might also be given the name Cold War, which is the prior example constituting its rules; there are a number of reasons, aside from the conventional nature of the two later conflicts, for giving it the name Gulf War, however, which will become clear later in the analysis. 18. A 1500-page plan for this large-scale campaign was prepared under the title 'Operation Determined Effort'. 19. I uncomfortably use the term peace-keeping game throughout this text for two reasons. First, some may find the word 'game' offensive in this case, given the human suffering involved. I want to emphasize that my use of the word relates to rules and the attribution of meaning, and does not carry a connotation of artificiality or lightness. Second, peace-keeping games contrast uncomfortably with references to Gulf War or World War I1 games, in which the potential strategy is more directly tied to the historical analogy. The fit is less direct since peace-keeping, as a relatively new development, was not an available option in the World War I context, even though the rationale in Bosnia was to avoid the mistake of this era. 20. This game was played in a number of locations around the world during the Cold War. The playing field has changed in this case since the notion of a peace-keeper presumes the existence of a peace which is to be kept. No such agreement had been found at the time of writing and the numerous ceasefires that had been declared by both parties were consistently violated. 21. Their identities can be distinguished from the other game, however, in so far as they are not aggressor and victim but constitute the conflict together, although they are recognized as possessing different capabilities. 22. For a discussion of the embeddedness of intentions in human customs and institutions, see Wittgensteiu (1958: 337). 23. Wittgenstein (1958: 241) makes the distinction between the expression of opinions, which people often do not share, and the shared rules of language, as follows: 'So you are saying that human agreement decides what is true and what is false? - It is what humans say that is true and false; and they agree in the language they use. This is not agreement in opinions but in forms of life'. 24. One might, by means of observing a series of chess games, pick up on patterns by which different moves are made but these could only be communicated to another by means of language. 25. Bennett and Thorson (1991: 129) make the point that one cannot have a policy of deterrence secretly. 'In fact one must utter a threat in order to execute a deterrent act. The party intended to be influenced must hear and comprehend the threat in order that it succeed. This understanding makes the linguistic component of deterrence essential'. 26. The UN Security Council adopted Resolution 819 on 16 April 1993. Resolution 824, 6 May 1995, added Sarajevo, Tuzla, Zepa, Gorazde and Bihac to the list of 'safe areas'. See, UN (1995: 78). 27. While the peace-keepers were authorized to use force in self-defense, they were lightly armed and it was initially assumed that their presence, more than the threatened use of force or the capability to do so, would have a deterring effect. The focus of the promise was the people populating the safe areas. 28. This blurring is evident in the logic of extended deterrence as applied during the Cold War. American soldiers were placed in Europe as a 'trip wire' for the express purpose of blurring the distinction between Americans and the Europeans they were there to protect. The logic was that the presence of American soldiers would immediately draw the USA into the conflict, thereby assuaging fears that the USA would never sacrifice New York for Berlin in a nuclear exchange. 29. Campbell (1993) has argued that action within the Gulf War was constructed on the basis of a range of blacklwhite distinctions in which responsibility for evil was unambiguously
Multiple Identities, Interfacing Games
295
located in one agent, that is, Irltq, and good in another, that IS, the West. Both the Cold War and Gulf War scrlpt5 identity ,I clear aggressor who 15 the target of the threat. 30. These accounts were drawn from the daily select~onof articles from a range of Western newspapers made hy the Western European Union. Specific references have not been footnoted due t o space cons~derations. 3 1. While the language of 'ethnic cleans~ng'far preceded the explicit naming of Karadric a n d M l a d ~ c appIy111g , t h ~ name s to the des~gnatcdleaders of one side is clearly taking a parti'il pc>\iti<>r~.
32. Dutch cornmand~ngofticers apparently signed a sraternenr that expressed acceptance of the Bosn~anSerb decision t o separate Mushm men from the women and children. In addition, 1.t Col Karrenians made public statements ahout thi. 'correctness' of Bosni,~n Scrh 'ictions in Srehrenic'l, and that there were no 'good' and 'bad' guys In thls situation, which caused cons~derahlcembarrassment for the 1)utch Ministry of Defense as the mass executions of M u s l ~ mmen became ev~dent. 33. It has since hecome known, of course, that arms s h ~ p m e n t swere channeled through Croatia and that the Cltnton atltnin~stratlonwas aware of chi\. 34. In some reports the new threat was attached specif~callyt o Goradze, where British peace-keepers were located, In contrast t o Bihac, populated by Pakistani peace-keepers, and was presented hy many cornrnentators In terms of Br~tishnational Interest. In other reports, the threat was more general In nature. In any case, the hollowness of the new thredt was ~ m n i e d i a t e levident ~ as NATO did nothing in response to attacks o n Zepa and Bihac. 3.5. As Donnelly (1992: 94) notes, most realists allow for an instrumental morality, that IS, moral arguments c,tn be used ~tistr~unentally as moral just~f~cation for pursuing power. Kiss~nger (1977: LOO) stated that Arner~cnnvalues In United States foreign policy 'contributed to our unlty, gave focus t o our priorities and sustained our confidence 111 ourselves'. The moral d~scourseof foreign pol~cy-makers,some realists imply, plays a role in constituting the state's power to act. Why keep up the ,ippearance In the first place? Because the source of state power, the ability t o mobilize resources, including t a r doll:irs and personnel, IS a state'\ populat~on.Realists may exclude the possibility that st'ttes act with moral purpose, ~f they are rat~onal,hut some recognize the political value of a puhlic moral reasoning. See also Mnchiavelli ( 1 950: 63-6). .%. A s po~ntedour in .I W r s l ~ r ~ r ~Post t r ~ neditorial ( 6 J u n e I995), although the Bosni,in Serbs preterred the term 'pr~sonerof war' to 'hostage', the UN peace-keepers were nor tre,ttcd as POWs in so far ,ts this category entails certain well-known protections of a sort denied to soldiers who are sh,tckled to possihle ~ n i l ~ t a targets. ry
References Allan, Pierre and Kjell <;oldm,tnn (eds) ( 1992) T h e Errd of thc Cold War: Eualuatirrg Tlieorrc.~ of lntcrnationul Relations. Dordrecht: Martinus Nijhoff Publishers. Alter, Jonathan (199.3) '1.ess l'rof~le, More Courage', Nezosu~cck( 1 November). Bennett, James P. m d Stuart J. Thorson (1991) 'Reasoning 'tnd Intelligibility', in Valerie M. Hudson, (ed.) Artrficial lntelligcnc~and lnternatiorm/ Politics, pp. 127-48. Boulder, CO: Westv~ewI'ress. Bowker, Mike and Robin Brown ( I 993) From Cold W7r t o C o l / i l / ~ r7%eory : and World Politrcs in the 1980s. (:ambridge: Cambridge University I'ress. Campbell. David ( 1 993) I'olrt~<-sWithorit Prrnciple: Sovereignt): Lthics and Narratives of thc Gulf War. Boulder, CO: I.ynne R~enner. Carr, E.H. ( 1964) T h e T u ~ e n t yTears' C ~ I SI 9, 1 9-1 9.39: A n Introduction to the Study of Interniitron~71Rclutions. New York: Harper and Row. Cohen, Roger ( 1995) 'Par~sMade I)eal t o Free Hostages in Bosnia, Officials Say', interrzatrorral Herald Trrbuwc ( 2 3 June). Donnelly, lack ( 1 992) 'Twentieth-<:ent~iryRealism', in Terry Nardin and D a v ~ dK. Mapel, (eds) 'fiadrtrorrs o f Intrrnationul Ethics, pp. 85-1 1 1 . Ctrnhridge: Cantbridge University Press.
296
Widening Security
Economist, The (1995)'Santayana's Revenge' (22-28 July). Elshtain, Jean Bethke (1995) 'International Politics and Political Theory', in Ken Booth and Steve Smith (eds)lnternational Relations Theory Today, pp. 263-78. Oxford: Polity Press. Evans, Michael and Roger Boyes (1995)'UN Force Suspects Secret Deal Banning Airstrikes on Serbs', The Independent (27 June). Ferguson, Yale and R. Mansbach (1988)The Elusive Quest: Theory and International Politics. Columbia, SC: University o f South Carolina Press. Gaddis, John Lewis (199211993) 'International Relations Theory and the End o f the Cold War', International Security 17(3):5-58. Gagnon, Jr, V.P. (199411995)'Ethnic Nationalism and International Conflict:The Case o f Serbia', International Security 19 (3):130-66. Hawthorn, Geoffrey (1991) Plausible Worlds. Cambridge: Cambridge University Press. Helms, Jesse (1995) ' W h y the Reagan Doctrine is Right for Bosnia', The Wall Street Journal ( 8 June). Hinds, Lynn Boyd and Theodore Otto Windt, Jr (1992) The Cold War as Rhetoric: The Beginnings, 1945-1 950. New York: Praeger. Hollis, Martin (1995) The Philosophy of Social Science: A n Introduction. Cambridge: Cambridge University Press. Hollis, Martin and Steve Smith (1991)Explaining and Understanding International Relations. Oxford: Clarendon. Howse, Robert (1995) ' A Horizon Beyond Hatred: Introductory Remarks', Yugoslavia, the Former and Future: Reflections by Scholars from the Region. Washington: The Brookings Institute. Jervis, Robert (1976) Perception and Misperception in lnternational Politics. Princeton, N J : Princeton University Press. Khong, Yuen Foong (1992) Analogies at War: Korea, Munich, Dien Bien Phu, and the Vietnam Decisions of 1965. Princeton, N J : Princeton University Press. Kissinger, Henry (1977)American Foreign Policy, 2nd edn. N e w York: W.W. Norton. Kratochwil, Friedrich (1989)Rules, Norms and Decisions: O n the Conditions o f Practical and Legal Reasoning in International Relations and Domestic Affairs. Cambridge: Cambridge University Press. Machiavelli, Niccolo (1950) The Prince and Other Discourses. New York: The Modern Library. McNamara, Robert S. with Brain Van DeMark (1995) In Retrospect: The Tragedy and Lessons of Vietnam. New York: Times. O n u f , Nicholas Greenwood (1989)World of our Making: Rules and Rule in Social Theory and lnternational Relations. Columbia, SC: University o f South Carolina Press. Owen, John M . (1994) ' H o w Liberalism Produces Democratic Peace', lnternational Security 19(2):87-125. Shaw, Martin (1993)'Grasping the Nettle', New Statesman and Society 6 (235). Steketee, Menno (1995)'VS recept Golfoorlog ook in Bosnie?' [US Recipe for the Gulf War in Bosnia As Well] N R C Handelsblad (22 July). United Nations (1995)UN Peacekeeping Update: December 1994. Waltz, Kenneth N. (1986)'Anarchic Orders and Balances o f Power', in Robert Keohane (ed.) Neorealism and its Crrtics. New York: Columbia University Press. Washington Post, editorial, 'Cautiously, With NATO' ( 6 June 1995). Wendt, Alexander (1992) 'Anarchy is What States Make o f It: The Social Construction o f Power Politics', International Organization 46(2):393-425. Wittgenstein, Ludwig (1958)Philosophical Investigations. Oxford: Basil Blackwell. Wohlforth, William C. (1994195) 'Realism and the End o f the Cold War', International Security 19(3):91-129.
CompetingVisions for U.S. Grand Strategy Barry R. Posen and Andrew L. Ross
T
he dramatic events that marked the end of the Cold War and the subsequent early end of the twentieth century require the United States to reconsider its national security policy. What are U.S. interests and objectives? What are the threats to those interests and objectives? What are the appropriate strategic responses to those threats? What principles sho~tld guide the development of U.S. policy and strategy? In short, what should be the new grand strategy of the United States? Four grand strategies, relatively discrete and coherent arguments about the U.S. role in the world, now compete in o u r public discourse. They may be termed neo-isolationisn~;selective engagement; cooperative security; and primacy (see Tahlc 1 for a summary presentation of the four alternative visions). Below, we describe each of these four strategies in its purest form; we borrow liberally from the academics, government officials, journalists, arid policy analysts w h o have contributed to this debate, but o n iss~les where others have kept silent, o r been inconsistent, we impose consistency in the interest of clarity. O u r purpose is not advocacy; it is transparency. We hope to sharpen the public debate, not settle it. We then offer our characterization and critique of the evolving grand strategy of the Clinton administration, an uneasy amalgam of selective engagement, cooperative security, and primacy. Finally, we speculate on what might cause the United States to make a clearer grand strategy choice. The state of the U.S. economy, the national finances, a n d persistent social problems largely drove foreign a n d defense policy out of the 1992 presidential race. The 1996 campaign was little different. The first months of the first Clinton administration were characterized by indirection, and later by a nearly single-minded focus on economic issues. Security matters were dealt with sequentially and incrementally; n o obvious grand scheme emerged until Assistant to the President for National Security Affairs Anthony Lake proposed in September 1993 that U.S. policy shift "From Containment t o Enlargement." N o t until July 1994 were the ideas initially advanced hy Source: I ~ ~ t ~ r ~ ~S e~u tr ~i to? t'2, ~1 ( d3 ) ( I O O h - 9 7 ) : 5-S.3.
Minimal, defensive realism Avoiding entanglement in the affairs of others Distant balance of power Supports status quo Narrow North America
Not our problem Withdraw Abstain Abstain Abstain Self-defense Minimal self-defense force
Analytical Anchor
Major Problem of Int'l Politics Preferred World Order Nuclear Dynamics Conception of National Interests Regional Priorities
Nuclear Proliferation NATO Regional Conflict
Ethnic Conflict Humanitarian Intervention Use of Force Force Posture
Neo-Isolationism
Table 1: Competing Grand Strategy Visions
Interdependence Supports aggression Transnational
Balance of power Supports status quo Restricted
Maximal realism/ unilateralism The rise of a peer competitor Hegemonic Supports aggression Broad
Primacy
Industrial Eurasia
Global
Industrial Eurasia & the home of any potential peer competitor Indiscriminate prevention Discriminate prevention Indiscriminate prevention Expand Transform & expand Maintain Contain; discriminate intervention Intervene Contain; discriminate intervention Nearly indiscriminate intervention Contain Contain Nearly indiscriminate intervention Discriminate intervention Discriminate intervention At will Discriminate Frequent Two-MRC force Reconnaissance strike complex for A two-power-standard multilateral action force
The indivisibility of peace
Liberalism
Cooperative Security
Traditional balance of power realism Peace among the major powers
Selective Engagement
20
m
E n 2. a
e
1'
iii t i
i
3
-
Competing Visions for U.S. Grand Strategy
299
Lake codified in the administration's National Security Strategy of Engagement a n d Enlargement. Those ideas remain intact in the February 1996 version of that White House document.' Yet the Clinton administration, like the Bush administration before it, has failed to build a domestic political consensus in support of its strategic vision. Thus the post-Cold War grand strategy debate continues. We distinguish the four alternative strategies in four ways. We ask, first, what are the major purposes or objectives each identifies for the United States in international politics? These range from a narrow commitment to the basic safety of the United States to an ambitious effort to secure permanent U.S. global preeminence. Second, we ask: what are each strategy's basic premises about international politics? Though advocates are seldom explicit, underlying disagreements among the strategies on basic questions help to explain their other disagreements. In particular, the four strategies disagree on the "fragility" of international politics - the propensity for developments unfavorable to the United States to cascade rapidly in ever more unfavorable directions, and for developments favorable to the United States to move in ever more favorable directions. A fragile international political system both requires and responds to U.S. activism. Answers to three central questions of modern international relations theory affect each strategy's assessment of the fragility of international politics: (1)Do states tend to balance against, or bandwagon with, expansionists? That is, will most states,, faced with a neighbor growing in power and ambition, take steps to improve their power through some combination of internal military preparation and external alignment? (2) Do nuclear weapons make conquest easier or harder? If secure retaliatory nuclear deterrent forces are easy to get, and the risks they impose for ambitious aggressors are easy for those aggressors to grasp, then they make it difficult for aspiring hegemons to improve their power position through intimidation or conquest. If, on the other hand, they cause hegemons to perceive themselves as invulnerable to attack, such states may be emboldened to act aggressively. (3)H o w much potential influence does the United States actually have in international politics? How do we measure relative power in international politics; is it reasonable to speak of a unipolar world? Here, there are two subsidiary issues. Measured globally, how much international political influence can the current U.S. "share" of gross world power resources - economic, technological, and military capabilities - buy? How much money, and how many lives, are the American people willing to pay for influence in international politics in the absence of a major threat? If the United States is relatively quite powerful in international politics, then it can think in terms of great objectives. If not, its objectives will need to be limited. If the United States is inherently much more powerful than is often believed, then the American people may not need to sacrifice much more than they already d o for the United States to undertake ambitious policies successf~lly.~ We ask, third, what are the preferred political and military instruments of each strategy? Do advocates prefer to work multilaterally or unilaterally?
300
Widening Security
Do they favor international organizations or prefer traditional alliances? How much military force does the United States require, and what kind? Our force structure analysis is indicative rather than comprehensive; as a heuristic device we rely substantially on the array of alternative force structures developed by the late Les Aspin during his tenure as Chairman of the House Armed Services Committee and then as Secretary of Defense early in the Clinton admini~tration.~ The force structures (see Table 2) were developed with an eye to the number and variety of contingencies they could support the "business end" of grand strategy.4 Fourth, to illustrate the real world implications of each grand strategy, we ask: what are their positions on a number of basic issues now on the U.S. agenda, including nuclear proliferation, NATO enlargement, and regional conflict? After describing each strategy along these four dimensions, we offer a short critique, which reflects both our own specific concerns and what we believe are the most credible counter-arguments that the proponents of the other strategies might offer. The essay closes with a brief review and analysis of the Clinton administration's grand strategy, which consists of a core of cooperative security principles and impulses, drawn toward primacy as it has faced a less tract able international environment than it expected, but constrained toward selectivity by a U.S. citizenry whose support for ambitious foreign projects seems shallow at best. We explain why this compromise has proven necessary, and offer some hypotheses about what could cause this grand strategy to change.
Neo-isolationism is the least ambitious, and, at least among foreign policy professionals, probably the least popular grand strategy option.The new isolationists have embraced a constricted view of U.S. national interests that renders internationalism not only unnecessary but counterproductive. National defense -the protection of "the security, liberty, and property of the American p e ~ p l e "-~is the only vital U.S. interest. The new isolationism subscribes to a fundamentally realist view of international politics and thus focuses on power.' Its advocates ask: who has the power to threaten the sovereignty of the United States, its territorial integrity, or its safety? They answer that nobody does.8 The collapse of the Soviet Union has left a rough balance of power in Eurasia. If either Russia or China begins to build up its military power, there are plenty of wealthy and capable states at either end of Eurasia to contain them. Indeed, Russia and China help to contain one another. Thus no state has the capability to conquer the rest and so agglomerate enough economic capability and military mobilization potential to threaten the American way of life. Like traditional isolationism, this strategy observes that the oceans make such a threat
1
Y
n
I
i I
'
Competing Visions for U.S. Grand Strategy
301
improbable in any event. The United States controls about one quarter of the gross world product, twice as much as its nearest competitor, Japan, and while not totally self-sufficient, is better placed than most to "go it alone." U.S. neighbors to the north and south are militarily weak and destined to stay that way for quite some time. The United States is inherently a very secure country.Yndeed, the United States can he said to be strategically immune."' The new isolationism is strongly motivated by a particular understanding of nuclear weapons. It concedes that nuclear weapons have increased the potential capacity of others to threaten the safety of the United States. But nuclear weapons make it very hard, indeed nearly inconceivable, for any power to win a traditional military victory over the United States. Nuclear weapons assure the political sovereignty and the territorial integrity of the United States. The collapse of the Soviet Union has so reduced the military resources available to its successor states that a counterforce attack on U.S. nuclear forces, an old and exaggerated fear, is out of the question. There can be no politically rational motive for any country large or small to explode a nuclear weapon on North America. U.S. retaliation would be devastating. Moreover, the fact that Britain, France, the People's Republic of China, and Russia have nuclear retaliatory forces makes it quite likely that these powers will deter each other, further reducing the risk that an ambitious hegemon could dominate and militarily exploit the econonlic resources of the Eurasian landmass.
Given the absence of threats to the U S . homeland, neo-isolationism holds that national defense will seldom justify intervention abroad. The United States is not responsible for, and cannot afford the costs of, maintaining world order. The pursuit of economic well-being is best left to the private sector. The promotion of values such as democracy and human rights inspires ill-advised crusades that serve only to generate resentment against the United States; consequently, it is a poor guide to policy and strategy. The new isolationism would concede, however, that our great capabilities are a magnet for trouble so long as we are involved in any way in various political disputes around the world. Intervention in these disputes is thus a good way to attract attention to the United States. The strong try to deter the United States; the weak to seduce it; the dispossessed to blame it. Neo-isolationism would argue that those who fear terrorism, especially terrorism with nuclear, biological, or chemical weapons, can increase U.S. safety by keeping it out of foreign conflicts. Middle Eastern terrorists, for instance, whether sponsored by Syria, I r m , Iraq, or Libya, would find little reason to target the United States and its citizens, either abroad or at home, if the United States refrained from meddling in the Middle East. Neo-isolationism advises the United States to preserve its freedom of action and strategic independence. Because neo-isolationism proposes that
8 2 2 1 8 6 290 8 40 50 1,312,000 691,000 246
8 2 2 1 6 4 220 6 20 50 1,247,000 666,000 23 1
Force B2
1,409,000 904,000 270
340 12 40 50
10 8
2 1
9 6
Force C3
1,575,000 933,000 295
430 15 50 82
11 9
3 1
10 6
Force D4
1,626,000 920,000 291-301
450 13 80 SO
15 11
2 '11 1
12 6
Base Force5
1,450,000 905,000 253
346 12 45-55 44
13 7
3 1
10 8
Clinton-BUR6
Notes: 1. Alternatives A,B,C, and D were devised by the House Armed Services Committee under the leadership of then Chairman Les Aspin. Force A: A "foundation" of nuclear, forward presence, special operations, and continental defense forces, and an industrial mobilization base, plus forces for one "major regional contingency" (MRC) such as the 1991 war against Iraq, and a modest humanitarian intervention capability. 2. Force B: Preceding plus sufficient airpower to support heavily an ally in a second major regional contingency. 3. Force C: Preceding plus sufficient forces in reserve to sustain comfortably a large new forward deployment for a major regional contingency, plus the capability to mount simultaneously a small invasion similar to the attack on Panama in 1989. 4. Force D: Preceding with "a more robust response," plus a second humanitarian intervention and naval "power projection" for the second MRC. 5. Base Force: Proposed by President Bush and Former Chairman of the Joint Chiefs of Staff Colin Powell. General Powell was attempting to develop a force structure that accommodated the widespread expectation of a "peace dividend," and at the same time clearly preserved the image and the fact of U.S. superpower status.
ARMY Active divisions Reserve divisions MARINES7 Active divisions Reserve divisions AIR FORCE Active wings Reserve wings NAVY Total ships Carriers Attack subs Amphibious assault ships8 PERSONNEL Active Reserve 1997 BUDGET AUTHORITY, billion 97$ (DOD+DOE)9
Force A '
Table 2: Comparison of Alternative Future Force Structures
n
cR VJ fD
3
g ID 2.
E
U N
W
6. Clinton B o t t o n - U p Review: T ~ v o" n e < ~ simultaneous r regional contingencies" plus ,I rnoder'lte peace-keeping operation a n d suhstantial forward presence; objective for the year 2000; 1 9 9 7 force structure 1s close b u t nor identiccll. T h e 'Bottom-Up R e v ~ e w "was developed hy Secretary of Defense I.es Aspin early . suhsranr~allyo n the analysis that he had conducted as a Congressman t o generate Options rl-D. T h e BUR Force in the Clinton a d m ~ n ~ s t r r ~ r i oItn relied Structure 1s meant t o he able t o tight t w o Desert Storm-scale "Major Regional Contingencies" (XlRCs) "nearly" simultaneously, a n d t o sustain a high level of forward nlilitary presence 111 peacetime. 'The BUR force structure has the unusual attribute of being slightly larger, bur costrng somewhat less than Force C , Aspin'a earlier preference. 7. Marine divisions a n d Navy Carriers each I1~r.cx s o c ~ a t e dalr w ~ u g s ,r e ~ ~ e c r ~ v sl~ghtl) ely larger 'ind sl~ghtlysm,~llet-than t h e ~ .rk r Force counterpclrrs, which number 72 aircraft. 8. These transport Marine units t o their attack positions; s o m e of these ships (10-12 in the current fol-ce) are very large, roughly half t h e s ~ r eof I' standard N i m i t ~class carrler, and carry VS'TOL a ~ r c r a t t helicopters, , m d hoverc~-nit. 9. Totals ~ n c l u d eroughly ten billion dollars of 1>OE funding t o r n a ~ n t a i nthe nucle'lr weapons complex. Among budget analysts, ~t is generally agreed that the available defense dollars th,it the Ku5h a c i m ~ n ~ s t r a t i oprojected n m d the C l ~ n t o n,~dministratronprolecrs after the turn of the centur! \vould he ~ n a d e q u a t e t o support t h e ~ rpreferred force structures. By 2005, $20-65 hdlion more t h a n the prolected 1 9 9 7 budget would he req~iiredt o fund the Base Force; see Congressional Budget Office, "Fiscril Inlplications of the Base Force," p. 11. T h e CBO estimates that after the turn of the century the modernization o t the smaller Bottom-Up Re\lew Force S t r u c t ~ ~ with r e new technology weapons c u r r e n t l ~in develop~nento r p r o d u c t ~ o nwould require hetween $7 b ~ l l i o na n d $31 billion more per year than the current budget p l m s for the year 1999, w h ~ c his little difterent from the 1997 plan. See CBO, An Atzalys~s o f the Administration's Ftiturc~Years Defense Program for 199.5-I 999 (Washington, D.C.: Congressional Budget Oftice, January 19951, p. T O .
304
Widening Security
the United States stay out of political conflicts and wars abroad, it has no particular need for political instruments. Even traditional alliance relationships that obligate the United States in advance, such as NATO, ought to be dismantled. International organizations are a place to talk, perhaps to coordinate international efforts to improve the overall global quality of life, but not to make or keep peace. This would implicate the United States and draw it into conflicts. Most of the foreign policy issues now facing the United States would disappear under the new isolationism. The future of NATO, for instance, would be left to Europe. Neo-isolationists would have the United States abandon that anachronistic alliance, not lead the way in its ill-conceived expansion. Bosnia, too, is a European problem in which the United States has no concrete, material stake. The United States would no longer be preoccupied with Russian political and economic reform, or the lack thereof. Arabs and Israelis would have to sort out their affairs (or not) without U.S. meddling. Islamists would be deprived of the Great Satan. The North Korean threat would be left to South Korea, the country whose interests are actually threatened. In Latin America and Africa, the United States would no longer rescue Haitis and Somalias. Humanitarian assistance, if and when provided, would be confined to disasters - famines, epidemics, earthquakes, and storms. The United States might be willing to help clean up the mess after foreign wars have sorted themselves out. But intervention of any kind during wars would be viewed as a mistake, since at least one side is likely to be disadvantaged by humanitarian assistance to the others and would thus come to view the United States as an enemy. Force Structure
Neo-isolationism generates a rather small force structure. It is unlikely to cost more than two percent of GDP.ll First and foremost, the United States would need to retain a secure nuclear second-strike capability to deter nuclear attacks from any quarter. Modest air and missile defenses might be put in place to deal with low-grade threats. Second, the U.S. intelligence community would have the task of watching worldwide developments of weapons of mass destruction in order to forestall any terrorist threats against the United States. If such threats occurred, it would be their job to find an address against which retaliation could be directed. Third, the United States would probably wish to retain a capable navy (perhaps a third to a half the current size), and diverse special operations forces. The purpose would largely be to protect U.S. commerce abroad from criminal activity - piracy, kidnapping, and extortion. The remainder of U.S. forces would be structured to preserve skills at ground and tactical air warfare in the event that the balance of power on the Eurasian land mass eroded, perhaps requiring a return to a more activist U.S. policy. Since the burden of defending wealthy allies can be discarded in the aftermath of the Soviet Union's fortuitous collapse, those forces need not be forward-deployed in Europe and Asia. A major mission of the intelligence
I
I
I
I
I
Competing Visions for U.S. Grand Strategy
305
community w o ~ ~ be l d to prov~detmely warnmg of strategic developments In Euras~athat would warrant a return to a more , ~ t l v ~fore~gn st and securlty pol~cy.The U.S. force structure would no longer he dr~veneither by demandIng and costly forward presence requirements or hy the need to prepare to engage In mult~plefore~gncontingencies. Amencan mhtary forces would be used only to defend narrowly construed U.S. Interests. G ~ v e nthese l~mited rcqulrcments, even "Force A" (see Table 2), the srnalle\t of Aspm's not~onal force structures, IS larger than necessary.
The United States can, more easily than most, go it alone. Yet we do not find the arguments of the nco-isolationists compelling. Their strategy serves U.S. interests only i f they are narrowly construed. First, though the neoisolationists have a strong case in their argument that the United States is currently quite secure, disengagement is unlikely to make the United States more secure, and would probably make it less secure. The disappearance of the United States from the world stage would likely precipitate a good deal of competition abroad for security. Without a U.S. presence, aspiring regional hegemons would see more opportunities. States formerly defended by the United States would have to look to their own military power; local arms competitions are to be expected. Proliferation of nuclear weapons would intensify if the U.S. nuclear guarantee were withdrawn. Some states would seek weapons of mass destruction hecause they were simply unablc to compete conventionally with their neighbors. This new flurry of c o n petitive behavior would energize many hypothesized immediate causes of war, including preemptive motives, preventive motives, economic motives, and the propensity for miscalculation. There would likely be more war. Weapons of mass destruction might he used in some of these wars, with unpleasant effects even for those not directly involved. Second, if these predictions about the international environment are correct, as competition intensified U.S. decision-makers would continuously have to reassess whether their original assumptions about the workings of the balance of power in Eurasia and the deterrent power of nuclear weapons were still valid. Decision-makers require both good political intelligence and compelling cause-effect knowledge about international politics to determine that a policy shift is in order. More importantly, decision-makers woiild have to persuade the country that a policy reversal is necessary, but U.S. foreign policy is n tough thing to change. Given these problems, how much trouble would have to occur before the United States returned to a more active role? Would the United States return in time to exert its influence to help prevent a great power war? If the United States did decide that a more active role was necessary, how much influence would it have after years of inactivity? W o ~ ~ the l d United States return in time to prevent a n aspiring hegemon from getting a jump ahead, as N a n Germany did In World War II? If not, the costs of containment or rollback could prove s u b s t ~ n t ~ a l .
306
Widening Security
Third, though the United States would save a great deal of money in its defense budget, perhaps 1-1.5 percent of GDP, or $70-100 billion per year relative to the budgets planned by the Clinton administration, these annual savings do not seem commensurate with the international influence the strategy would forgo. Though this is a lot of money, which has many worthy alternative uses, the redirection of these resources from the military is unlikely to make the difference between a healthy and an unhealthy economy that is already some seven trillion dollars in size. Neo-isolationists seem willing to trade away considerable international influence for a relatively modest improvement in domestic welfare. Given the potential stakes in international politics, the trade-off is imprudent. Engagement in international politics imposes obvious burdens and risks. Shedding an active role in international politics, however, increases the risks of unintended consequences and reduces U.S. influence over the management of those consequences, and over issues that we can hardly anticipate.
Selective Engagement
Selective engagement endeavors to ensure peace among powers that have substantial industrial and military potential - the great powers.12 By virtue of the great military capabilities that would be brought into play, great power conflicts are much more dangerous to the United States than conflicts elsewhere. Thus Russia, the wealthier states of the European Union, the People's Republic of China, and Japan matter most. The purpose of U.S. engagement should be to affect directly the propensity of these powers to go to war with one another. These wars have the greatest chance of producing large-scale resort t o weapons of mass destruction, a global experiment that the United States ought to try to prevent. These are the areas of the world where the world wars have originated, wars that have managed to reach out and draw in the United States in spite of its strong inclination to stay out. Like the new isolationism, selective engagement emerges from the realist tradition of international politics and its focus on large concentrations of power.13 Like cooperative security, it is also interested in peace. Though some of its proponents agree with the neo-isolationist premise that U.S. geography and nuclear deterrence make the United States so secure that a Eurasian hegemon would not pose much of a security problem for the United States,14 selective engagement holds that any great power war in Eurasia is a danger to the United States.15 On the basis of both the increased destructive power of modern weaponry and the demonstrated inability of the United States to stay out of large European and Asian wars in the first half of this century, selective engagement argues that the United States has an interest in great power peace. Selective engagement shares the neo-isolationist expectation that states balance, and that nuclear weapons favor the defender of the status quo.
I
IIIII
Competing Visions for U.S. Grand Strategy
307
However, selective engagers also recognize that balancing may be tardy, statesmen may miscalculate, and nuclear deterrence could fail. Given the interest in great power peace, the United States should engage itself abroad in order to ensure against these possibilities in the places where the consequences could be the most serious. Balancing happens, but it happens earlier and more easily with a leader. Nuclear weapons deter, but why not place the weight of U.S. srratcgic nucleal- forces behind thc status quo powers, just to
simplify the calculations of the ambitious? Selective engagement tries to ensure that the great powers understand that the United States does not wish to find out how a future Eurasian great power war might progress, and that it has sufficient military power to deny victory to the aggressor. Advocates of selective engagement do start from the premise that U.S. resources are scarce: it is simply impossible to muster sufficient power and will to keep domestic and international peace worldwide, or to preserve the United States as the undisputed leader in a unipolar world.lh The United States does have 22 percent of gross world product, at least half again as much as Japan, its closest economic competitor, but only 4.6 percent of the global population. Global economic development will gradually reduce the U.S. economic advantage, and demographics already limit U.S. capacity for intervention in labor intensive civil wars. Desert Storm does not suggest a permanent, overwhelming U.S. military superiority; other wars may not be so easy. Moreover, short of a compelling argument about an extant threat, the people of the United States are unlikely to want to invest much money or many lives either in global police duties -cooperative security - or in trying to cow others into accepting U.S. hegemony - primacy.
Selective engagement advocates are worried about nuclear proliferation, but proliferation in some countries matters more than in others." Countries seeking nuclear weapons who have no conflict of interest with the United States or its friends are viewed more favorably than those who do. The Nuclear Non-Proliferation Treaty (NPT) is viewed as an instrument to permit countries who havc neither the wealth to support nuclear forces, nor the political insecurity or ambition to need or want them, to find a refuge from a race that they would rather not run. Selective engagement advocates may he willing to try to cajole India, Israel, Pakistan, or Ukraine into surrendering their nuclear capabilities and joining the NPT, but they hold that it would he absurd to turn neutrals or friends into enemies on this issue alone. Proliferation really matters in politically ambitious countries that have demonstrated a certain insensitivity to risks and costs. North Korea, Iraq, and Iran fall into this category. The most important response is to convince them that they are being watched, and that the United States intends to stand against any nuclear ambitions they might have. Depending on the pace of their weapons programs, and the extent of their bellicosity, stronger measures may be warranted. There is no consensus on the use of force,
308
Widening Security
however. Advocates of selective engagement are always sensitive to costs; preventive attacks may not be feasible. Regional competitions among small states matter to the extent that they could energize intense great power security competition. This risk preserves the Persian Gulf as a core U.S. security interest.18 The problem is not so much U.S. dependence on Gulf oil but the far greater dependence on it by many other great powers. A struggle over the control of the Gulf could draw in great powers on opposing sides, or set off competition elsewhere to expropriate energy resources. Moreover, should most of the economic potential associated with this oil fall into the hands of one ambitious actor, it could provide the underpinnings for a substantial regional military challenge. If Iraq could achieve the military development it did on its own oil revenues, how much more might it have achieved with the revenues of Kuwait or Saudi Arabia? Even if such a power would not pose a direct threat to the United States, it would certainly be in a position to pose a threat to many of its neighbors. A great war in the Persian Gulf, with the risk of large-scale use of weapons of mass destruction, is the kind of experiment that the United States probably ought not to wish to run. For the advocates of selective engagement, then, the parts of the world that matter most are the two ends of Eurasia - Europe and East Asia - and the Middle EastISouthwest Asia. Traditional alliances are the appropriate vehicle to pursue these interests. Selective engagement especially favors the preservation of NATO, though not its expansion. That is not to say that the rest of the world can be completely ignored. Some countries may matter more than others for particular reasons. For example, proximity alone makes Mexico an important U.S. foreign policy interest. Moreover, if selective engagement is to remain a viable strategy, it will need to adapt to the likely emergence of sizeable new powers, and the potential for conflict among them.19 Advocates of selective engagement are concerned with ethnic conflict where it runs the risk of producing a great power war. Fortunately, there are not many places where this seems likely. Arguably, there is only one dangerous potential conflict of this type in Eurasia today - the currently dormant rivalry between Russia and Ukraine. Conflicts elsewhere in Eurasia may tempt one or more great powers to intervene, and thus they merit a certain degree of judicious diplomatic management. Most of these conflicts do not engage the vital interests of any state; they are strategically uninteresting. The former Yugoslavia, for instance, contains no military or economic resources that would affect the security of any European great power. Advocates of selective engagement view humanitarian intervention as a question to be settled by the normal processes of U.S. domestic politics. There is no clear strategic guide that tells which interventions are worth pursuing and which are not. Their perspective does suggest several critical considerations. The most important strategic question is the opportunity cost. Given one's best estimate of the plausible course of the humanitarian intervention, what will be its consequences for U.S. material and political
it
-
1 ,itti?
:
Competing Visions for U.S.Grand Strategy
309
ability to intervene in more strategically important areas if trouble should arise during or after the humanitarian intervention? An intervention t o hring sufficient order to Somalia t o permit the distribution of humanitarian assistance required the equivalent of a single division of ground forces and involved the risk of relatively modest U.S. casualties. But even the horror of what had transpired earlier in Somalia proved insufficient t o preserve L7.S. public support through the relatively modest U.S. casualties that ensued. To preserve by force the unitary, multiethnic, ethnically intermingled BosniaHerzegovina that existed a t the moment of Yugoslavia's dissolution could have required three or more U.S. divisions for the indefinite future, plus European forces."' There would likely have been more than a few casualties. Intervention in Yugoslavia would have made it more difficult to intervene elsewhere. As the casualties mount in any intervention, and the bloodshed begins t o make the U.S. position more morally ambiguous to the American public, the political will to act in more important regions could erode.
A selective engagement policy probably requires a force structure similar to those proposed by the late Secretary of Defense Les Aspin in 1992 as "Force B" o r "Force C" (see Table 2). A strong nuclear deterrent is still needed to deter nuclear attack on the United States and to protect its freedom of action in a world of several nuclear powers. Since the United States has an interest in stability in three critical areas of the world (both ends of Eurasia and the Middle East), and since simultaneous trouble in two o r more areas cannot he ruled out, it is reasonable to retain a "two regional wars" capability. Both force structures have sufficient air and ground forces for one major regional contingency ("MRC"), and sufficient air forces t o support a regional ally in a second contingency. "Force C" places additional emphasis on sea and air lift and o n aircraft carrier task forces, perhaps more than is truly necessary given that the United States ought to be able to identify in advance the location of the interests over which it might he willing t o threaten or wage war. "Force C" also assumes that the United States must maintain sufficient reserve forces t o sustain with case a new major forward deployment of indeterminate duration, and at the same time conduct a small offensive operation such as the invasion of Panama. These additions seem an overly conservative interpretation of the forces necessary for selective engagement; "Force B" may be adequate.
Selective engagement has its own problems. First, the strategy lacks a certain romance: will the cool and quiet, steady, long-term exercise of U.S. power in the service of stable great power relations win the political support of any major constituency in the United States? Compared t o other strategies, there is relatively little idealism or commitment t o principle
3 10
Widening Security
behind the strategy. It lacks the exuberant U.S. nationalism of primacy, or the commitment to liberal principle of cooperative security. It focuses rather narrowly on interests defined in terms of power. Can such a strategy sustain the support of a liberal democracy long addicted to viewing international relations as a struggle between good and evil? Second, the strategy expects the United States to ignore much of the trouble that is likely to occur in the world. America's prestige and reputation might suffer from such apparent lethargy, however, which could limit its ability to persuade others on more important issues. Great power rivalries are currently muted, and if successful, the strategy will quietly keep them so. This would be an enormous contribution to the welfare of the entire world. However, it is an open question whether a regular tendency to avoid involvement in the issues that do arise will ultimately affect the ability of the United States to pursue its more important interests. Arguably, it was fear of such a result that provided one of the impulses for the ultimate U.S. involvement in trying to end the war in Bosnia. Third, selective engagement does not provide clear guidance on which ostensibly "minor" issues have implications for great power relations, and thus merit U.S. involvement. It posits that most will not matter, but admits that some will. Some connections are more obvious than others, but all will be the subject of debate. Since trouble in peripheral areas is likely to be more common than trouble in core areas, the selective engagement strategy gives its least precise positive guidance on matters that will most commonly figure prominently in the media, and hence in the public debate on U.S. foreign policy. The responsible practice of selective engagement will thus require considerable case-by-case analysis and public debate. Fourth, selective engagement is not as selective as its advocates would have us believe. Europe and Asia matter because that is where the major powers reside; and the Middle East matters because of its oil resources. Much of the world, therefore, matters. Developments on the periphery of this rather large expanse of the earth will invariably and regularly produce intense media coverage and committed partisans of intervention. The argument will often prove tempting that the frontiers of "what matters" need to be pacified to protect "what matters." NATO enlargement is a good example; advocates want to pacify eastern Europe "preventively" even though Russia is weak and there is no obvious simmering major power conflict there. Few advocates of selective engagement favor this policy, in part because they believe in balancing behavior, and fear that Russia will be catalyzed into reactions that will cause exactly the kind of trouble the United States hopes to avoid. It is likely that those who subscribe to selective engagement would be doomed to spend their careers arguing against grand strategy "mission creep," even if U.S. policymakers explicitly chose selective engagement as the national ~trategy.~' Finally, neo-isolationists would argue that there is one huge tension in the selective engagement argument. The United States must maintain substantial military forces, threaten war, and risk war largely for the purpose
,'
'$1
I
Competing Visions for U.S.Grand Strategy
31 1
of preventing war. A traditional realist position accepts the risk of war, and the costs of waging war, to prevent aggressors from building sufficient power to challenge the United States directly. Neo-isolationists, however, argue that if you want to avoid war, you must stay out of the affairs of others. They remind us that it is quite unlikely that the results of even a great power war could decisively shift the balance of power against the United States. If the United States goes out into the world to prevent hypothetical wars, it will surely find some real ones. Advocates of selective engagement resist this deductive logic for two reasons: the United States was drawn against its intentions into two costly world wars that started in Eurasia; and the United States pursued an activist policy during the Cold War which both contained Soviet expansionism and avoided great power war.
C o o p e r a t i v e Security
The most important distinguishing feature of cooperative security is the proposition that peace is effectively indivisible." Cooperative security, therefore, begins with an expansive conception of U.S. interests: the United States has a huge national interest in world peace. Cooperative security is the only one of the four strategic alternatives that is informed by liberalism rather than r e a l i ~ r n . ~ Advocates ' propose to act collectively, through international institutions as much as possible. They presume that democracies will find it easier to work together in cooperative security regimes than would states with less progressive domestic polities. Cooperative security does not view the great powers as a generic security problem. Because most are democracies, or on the road to democracy, and democracies have historically tended not to fall into war with one another, little great power security competition is expected.I4 A transitional Russia and an oligarchical China remain troublesome, but the answer there is to help them toward democracy as in the Clinton administration formulation, "Engagement and Enlargement." The motives for great powers to collaborate are presumed to be greater than in the past, and the barriers to cooperation are presumed to be lower. The cooperative security enterprise represents an effort to overcome the shortcomings of traditional collective security." For both, aggression anywhere, and by anyone, cannot be allowed to stand. Both place a premium on international cooperation to deter and thwart aggression. It is to be "all for one and one for all." Cooperative security advocates d o not rely on spontaneous power balancing because this is only likely when traditional vital interests are engaged. Instead, international institutions, particularly the United Nations, are to play a critical role in coordinating the deterrence and defeat of aggression. Regional institutions, particularly a transformed NATO, have an important role to play where international institutions are weak. Institutions respond to imminent threats, and deter all who would break the peace.
3 12
Widening Security
Previously, great powers could view small wars as unlikely threats to their national security. But the emergence of weapons of mass destruction means that any arms race or war can produce a world-class disaster.26 The United States, and indeed the rest of the industrialized world, simply cannot live with these risks indefinitely. Nuclear weapons do not favor the status quo, except for the very small number of great powers who have them. Most states do not have the resources or organizational skills to deploy secure retaliatory forces. Most do not yet have, and many will not be able to acquire, nuclear weapons. The casualty-sensitivity of the democracies suggests that the risk of even a small nuclear attack might discourage them from coming to the assistance of a country in trouble. Aggressors are expected to be undemocratic, greedy, and casualtyinsensitive; nuclear weapons favor them. Thus nuclear arms control, particularly non-proliferation, is at the heart of cooperative security. Cooperative security subscribes to one premise that, for the most part, the other three strategies do not even consider. A high level of what one might term "strategic interdependence" is posited. Wars in one place are likely to spread; unsavory military practices employed in one war will be employed in other wars. The use of weapons of mass destruction will beget their use elsewhere; ethnic cleansing will beget more ethnic cleansing. Refugees fleeing the nationalist violence of one country will energize xenophobia in countries of refuge. The organization of a global information system helps to connect these events by providing strategic intelligence to good guys and bad guys alike; it connects them politically by providing images of one horror after another in the living rooms of the citizens of economically advanced democra~ies.~'The result is a chain of logic that connects the security of the United States and its more traditional allies to a host of distant troubles. Thus, these distant troubles cannot be ignored. Issues a n d Instruments
Cooperative security advocates believe that they now have more effective means to achieve their goals. The United States is presumed, based on the Desert Storm victory, to hold decisive military-technological superiority and thus to be able to wage speedy, low-casualty wars. In the past, advocates of collective security relied on world public opinion, and on economic sanctions. They understood that it is difficult to get self-interested states to support military intervention on the side of peace in distant places, so they stressed the impact of these less costly measures. Cooperative security advocates still like these mechanisms, but history has taught them to be skeptical that they will prove sufficient. Instead it is argued that real military action is cheaper than it once was.28 Advocates of cooperative security have added the arms control mechanisms developed in the last three decades to the traditional collective security repertoire. With enough arms control agreements, transparency, and confidence-and security-building measures (CSBMs), and enough intrusive
I
1
I
Competing Visions for U.S. Grand Strategy
3 13
verification, states around the world will be able to avoid conflicts arising from misperception or first-strike advantages. The offensive military capabilities that enable states to engage in aggression will thus be acquired by few countries. Peace-loving states will adopt defensive military postures and an international military division of labor that will provide only their combined forces with an offensive capability. The few "rogue states" left after all this arms control and i~istitution-buildingcan either be intimidated by the threat of high technology warfare or decisively defeated in short order. A cooperative security strategy depends on international organizations to coordinate collective action. They are part of the complicated process of building sufficient credibility to convince all prospective aggressors that they will regularly be met with decisive countervailing power. The threat of great powers to intervene - even when they have n o immediate interests at stake - must be made credible. A standing international organization with substantial domestic and international legitimacy is necessary to coordinate multilateral action and to create the expectation of regular, effective intervention for peace. Global Its advocates stress that cooperative security is a work in progre~s.~' cooperative security structures will not emerge fully developed. Indeed it is argued that they need not: existing "overlapping, n~utuallyreinforcing arrangements" provide the foundation upon which cooperative security can be built. As three leading proponents have written, "military establishments around the world already are entangled in a large web of internationally sanctioned restraints on how they equip thenlselves and operate in peacetime. Cooperative security means making the effort to thicken and unify this web.""' That, clearly, entails a long term project. In at least one area of the world, the project is seen as already well under way. Europe has begun to practice cooperative security with a web of diplomatic, econonlic, and security arrangements, particularly the arms control, transparency, and CSRMs associated with the Organization for Security and Cooperation in Europe. The Clinton administration views NATO enlargement, in part, as an extension of the cooperative security project." If Europe, even during the Cold War, could develop such arrangements, the proponents of cooperative security ask, can other regions not do the same now that the distractions o t the Cold War are hehind us? Proliferation is a key issue for cooperative security advocates. They support very strong measures to prevent and reverse i t . ' V h e y supported not only the indefinite extension of the Nuclear Non-Proliferation Treaty in 1995 but also the strengthening of its safeguards. The demonstration effect of any new proliferation is presumed to be great. It is therefore reasonable to oppose any new nuclear power beyond those declared nuclear weapons states in the original treaty. Moreover, the policy must be pursued equally versus friends, enemies, and neutrals. Israeli, Indian, and Ukrainian nuclear weapons are all bad, regardless of the fact that the United States has no political conflict of interest with any of these countries. Proliferation must also he headed off for another reason: the more nuclear powers there are in
3 14
Widening Security
the world, the more dangerous it will be for international organizations to act aggressively against miscreants, the less likely they will be to act, and the more likely it is that the entire cooperative security edifice will collapse.33 War to prevent new nuclear powers from emerging would be reasonable in some circumstance^.^^ Regional conflicts among states are of critical interest to cooperative security advocates. Cross-border aggression has always been the most clear-cut problem; it is never acceptable. Conflicts within states emerge as a new, serious problem for a cooperative security strategy.35Historically, collective security tried to establish the conditions for peace among a small number of great powers and empires. Today we have many more states, and even more groups aspiring to statehood. Politically conscious groups often span the boundaries of several territorially defined states. Thus inter-group conflict may become inter-state conflict. Even when irredenta are not involved, civil wars may attract outside intervention by the greedy, and thus precipitate international wars. Finally, ethnic conflict tends to be ferocious. The brutal behavior portrayed on the television screens of the world creates a malign precedent. Cooperative security advocates favor military action for humanitarian purposes.36 But the connection between immediate humanitarian concerns and the task of building sufficient credibility to deter future aggressors is tenuous. Indeed, the goals may conflict, as often seemed the case in BosniaHerzegovina. In the first phase of that war, the United States and other democratic states could have supplied arms to the Bosnian Muslims with relative ease to help them fend off the military attacks of the Serbs. They might even have flown tactical air sorties to assist the Muslims. This would have made the point that aggression does not pay. But it is unlikely that UN humanitarian efforts would have survived such a policy. A large-scale intervention with several hundred thousand troops might have been necessary both t o stop the Serbs and to sustain the UN humanitarian effort to care for those in need of the everyday necessities of life. Despite such difficulties, cooperative security advocates seem to want to pursue short-term humanitarianism and long-term political principle at the same time. This makes for demanding military operations. Force Structure What kind of U.S. force structure is required to support a cooperative security strategy? While cooperative security envisions the adoption of defensive military postures, "a small number of nations, including the United States, must maintain certain elements of their armed forces beyond that required for territorial defense and make those elements available to multinational forces when needed."37 The U.S. contribution to this multinational force would emphasize the country's comparative advantage in aerospace power: the three elements of the reconnaissance strike complex - command, control, communications and intelligence; defense suppression; and precisionguided munitions - that were employed in Desert Storm.
1
I I , ~
Competing Visions for U.S. Grand Strategy
3 15
Advocates have suggested that this force would be smaller than the "Bottom-Up Review" force advocated by the Clinton administration (see Table 2)." But their assessment focuses on means, while assuming that others will cooperate t o the maximum extent of their ability - i.e., that they will maintain larger forces than they currently plan. Moreover, it ignores the necessity for a period of regular and consistent military action if there is t o be any hope of building the international credibility necessary t o affect the calculations of prospective aggressors everywhere. A true cooperative security strategy could involve the United States in several simultaneous military actions. U.S. forces were recently engaged in Iraq and in Somalia simultaneously, while advocates clamored for a third US. military action in Bosnia. Haiti subsequently replaced Somalia on this list, even as the U.S. military role in Bosnia expanded. UN forces were deployed in r s accomplish their several other places - arguably in insufficient n ~ ~ m b e to missions completely. The experiences in Desert ShieldIDesert Storm and in the Somali relief operation suggest that U.S. leadership is often the key ingredient for substantial international c ~ o p e r a t i o n . It ' ~ is not the subtle diplomacy of the United States that proves critical, but rather its military reputation, which depends on large, diverse, technologically sophisticated, and lushly supplied military forces capable of decisive operations. At least initially, the United States would have to provide disproportionate military power to launch a global cooperative security regime. A force structure in the range of the Clinton administration's "Bottom-Up Review" force and the "Base Force" (see Table 2) may be necessary to pursue a true cooperative security poltcy with a good chance of success.
Cooperative security is vulnerable t o a range of criticisms. First, individual states are still expected to be able to rise above narrow conceptions of national interest in response t o appeals for action on behalf of the collective good, and to engage in what will seem t o them as armed altruism. In theory, some collective action problems associated with collective security4()may be ameliorated by cooperative security. In particular, the combination of intensive arms control, military technological superiority, and U.S. leadership is meant t o reduce substantially the costs of cooperation for any given member of the cooperative security regime. Nevertheless, there will still be defectors and free riders. Major power aggression would still be a problem for cooperative security, as it was for collective security, if some powers perceive the intrinsic stakes as small and the aggressor as far away and difficult t o fight. It seems unlikely, for example, that the NATO allies would ever fight the People's Republic of China over Taiwan, even if the United States wanted t o d o so. States concerned about the possible competitions of the future will still ask if any given opportunity for current cooperation t o achieve a common good, o r oppose a common bad, changes their power position relative to all other potential challengers, including one another.
3 16
Widening Security
Second, the task of building sufficient general multilateral credibility to deter a series of new and different potential aggressors seems very difficult. Regular U.S. action to oppose the Soviet Union during the Cold War did not entirely dissuade that regime from new challenges. Since this was an iter ative bipolar game, credibility should have accumulated, but that does not seem to have happened. Although U.S. credibility appears to have been quite high in Europe, where direct interests were great and deployed military power was strong, elsewhere Soviet behavior was often mischievous. It is quite likely, therefore, that a true cooperative security strategy would involve the UN, designated regional organizations, and effectively the United States, in a number of wars over many years if it is to have any hope of establishing the ability to deter the ambitious and reassure the fearful. This would, however, serve to further strain public support for a demanding strategy. Third, democracies are problematical partners in a cooperative security project in a crucial respect: their publics must be persuaded to go to war. Since the publics in modern liberal democracies seem to be quite casualtysensitive, the case for risking the lives of their troops in distant wars is inherently difficult to make. This is one reason why the decisive military superiority of a technologically dominant coalition of peace-loving states is a necessary condition for cooperative security to work. This in turn depends on the military power of the United States. Fourth, cooperative security places a heavy burden on arms control. It is not clear that arms control can bear that burden. Nonproliferation efforts have met with mixed success. Verification and, especially, enforcement remain problematic. The open international economic system, which most cooperative security advocates strongly favor, inevitably accelerates the diffusion of the economic and technological underpinnings of military power. While arms control can increase the economic costs and political risks of engaging in proscribed activities, determined states will continue to acquire and employ military forces. Thus the members of a cooperative security regime are likely to have to respond to aggression more often than the proponents of such a regime predict. Cooperative security must oversell the probability and magnitude of an international happy ending in order to elicit political support for an indeterminate initial period of high activism.
Primacy
Primacy, like selective engagement, is motivated by both power and peace. But the particular configuration of power is key: this strategy holds that only a preponderance of U.S. power ensures peace.41 The pre-Cold War practice of aggregating power through coalitions and alliances, which underlies selective engagement, is viewed as insufficient. Peace is the result of an imbalance of power in which U.S. capabilities are sufficient, operating on their own, to cow all potential challengers and to comfort all coalition partners. It is not enough, consequently, to be primus inter pares, a comfortable position
I
i
n I
1
A
Competing Visions for U.S. Grand Strategy
3 17
for selective engagement. Even the most clever Bismarckian orchestrator of the balance of power will ultimately fall short. One must be pvimus solus. Therefore, both world order and national security require that the United States maintain the primacy with which it emerged from the Cold War. The collapse of bipolarity cannot be permitted to allow the emergence of multipolarity; unipolarity is best. Primacy would have been the strategy of a Dole administration. Primacy is most concerned with the trajectories of present and possible f u t ~ ~great r e powers. As with selective engagement, Russia, China, Japan, and the most significant members of the European Union (essentially Germany, France, and Britain), matter most. War among the great powers poses the greatest threat to U.S. security for advocates of primacy as well as those of selective engagement. Rut primacy goes beyond the logic of selective engagement and its focus on managing relations among present and potential future great powers. Advocates of primacy view the rise of a peer competitor from the midst of the great powers to offer the greatest threat to international order and thus the greatest risk of war. The objective for primacy, therefore, is not merely to preserve peace among the great powers, but to preserve U.S. supremacy by politically, economically, and militarily outdistancing any global challenger. The Bush administration's draft Defense Planning Guidance (DPG), leaked to the press in March of 1992, provides the most fully developed blueprint for precluding the rise of such a peer competitor. The DPG is the high-level strategic statement that launches, and in theory governs, the Pentagon's annual internal defense budget preparation process. Subsequent p ~ ~ b l i s h ecommentary d by former Secretary of Defense Richard Cheney suggests that the Bush administration hroadly subscribed to the principles suggested by the leaked passages." The authors of the draft DPG were unyielding in their insistence that the United States maintain its status as the world's sole superpower: r O L If m ~ t objective 15 to prevent the reemergence of a new r~val,e ~ t h e on the terntory of the former Sov~etU n ~ o nor elwwhere, that poses a thredt IS a domon the order of that posed formerly by the Cov~etU n ~ o n This . Inant cons~deratwn... and requlres that we endeavor to prevent m y ho5t1le power from dommatmg a reglon whose resources would, under consol~datedcontrol, be s u f f ~ c ~ e ntot generate global power ... O u r strategy mu\t now refocus on precludmg the emergence of 'iny potentla1 future global c o t n p e t ~ t o r . ~ ase most d l~kelyto harbor potentla1 peer Those parts ot the world ~ d e n t ~ f ~ competitors were Western Europe, East Asla, the terrltorles of the former Sov~etUnron, and Southwest Asla. Strateg~cplanners In the Department of Defense and more recent advocates argue that others a l r e d y belleve, or can be led to belleve, that the Un~ted States 1s a bemgn hegemon. Thus the project IS expected to meet w ~ t hglobal
3 18
Widening Security
support rather than o p p o ~ i t i o n Other . ~ ~ states will not balance against the United States. Thus: the U.S. must show the leadership necessary to establish and protect a new order that holds the promise of convincing potential competitors that they need not aspire to a greater role or pursue a more aggressive posture to protect their legitimate interests. ... In the non-defense areas, we must account sufficiently for the interests of the advanced industrial nations to discourage them from challenging our leadership or seeking to overturn the established political and economic order. ... We will retain the pre-eminent responsibility for addressing selectively those wrongs which threaten not only our interests, but those of our allies or friends, or which could seriously unsettle international relation^.^' Present and aspiring major powers are to be persuaded, it seems, that they can rest easy, and need not bother investing in the political, economic, and military means they might otherwise require to safeguard their interests. Indeed, any assertion of strategic independence by the likes of Germany and Japan would only erode the global and regional stability sought by all.46 In addition to maintaining U.S. primacy by reassuring others of the purity of its intentions, the draft DPG envisioned the United States seeking to prevent the rise of challengers by promoting international law, democracy, and free-market economies, and precluding the emergence of regional hegemons. It is important to note that though primacy focuses on the maintenance of overwhelming U.S. power and influence, it remains strongly committed to liberal principles. It is simply more judicious about the commitment of U.S. military power to particular liberal projects than is the cooperative security strategy. Support for political and economic transformation are seen as the best way to ensure that Russia will not revert to the authoritarian, expansionist habits of old, though the United States should hedge against the failure of such reform. In Europe, the United States would work against any erosion of NATO's preeminent role in European security and the development of any security arrangements that would undermine the role of NATO, and therefore the role of the United States, in European security affairs. The countries of East and Central Europe would be integrated into the political, economic, and even security institutions of Western Europe. In East Asia, the United States would maintain a military presence sufficient to ensure regional stability and prevent the emergence of a power vacuum or a regional hegemon. The same approach applied to the Middle East and Southwest Asia, where the United States intended to remain the preeminent extraregional power. The United States would also endeavor to discourage India's hegemonic ambitions in South Asia. The regional dimension of the strategy outlined in the draft DPG is thus consistent with the global dimension: the aspirations of regional as well as global hegemons are to be thwarted. Proponents of primacy are more than a little upbeat about the post-Cold War international position of the United States. Even though all too few
I I
,
Competing Visions for U.S. Grand Strategy
3 19
Americans recognize their good fortune, "they have never had it so In this best of all possible worlds, the United States today is the only world superpower. It "enjoys strategic and ideological predominance" and exercises hegemonic influence and authority." The U.S share of gross world product is considered to be more than sufficient to sustain primacy. According to primacy advocates, this is in line with its share at the outset of World War 11, in which the United States led a global war and siniultaneously enjoyed the highest standard of living in the world.4') Moreover, looking only at GDP masks the extent of U.S. dominance. The United States has more hard-tomeasure "soft power" - domination of the news media, mass culture, computers, and international communications - than any other nation."' And the United States is the master of the most advanced military technologies, especially intelligence and command and control capabilities and precisionguided munitions. This technological advantage renders traditional military organizations vastly less capable against the United States than traditional military analysis would suggest. (I'rimacy and cooperative security share this premise.) Advocates of primacy, like those of selective engagement, do recognize that U S . resources are limited, but they contend that the United States is a wealthy country that all too often acts as if it were poor." The problem is not a lack of resources, but a lack of political will. Advocates of primacy are quite optimistic, however, that the U.S. public can be induced to sacrifice for this project."
Certainly the most serious threat to U.S. primacy would he an across-theboard political, economic, and military challenger. Yet even a power that rivaled the United States in only one or two of these three dimensions of national power could erode U.S. preponderance. That the Soviet Union during the Cold War was unable to issue a credible challenge in the economic realm, as well as the political and military, did little to allay U.S. fears. It is generally the one-dimensional challenge that is seen as providing the nearterm threat to continued U.S. primacy." Some fear a resurgence of a militarily capable Russia. Others argue that the United States is most vulnerable in the economic realm. For a time, Japan was viewed as the main contender. Others worry about the rise of China, fearing an imminent, mutually reinforcing growth of its economic and military power. The debate on NATO enlargement has shown that some still view Russia as strong and dangerous. Though smaller and weaker than its Soviet predecessor, it is presumed to be on the move again.'4 The remedy is a revived policy of containment. This "new containment," however, is little more than a stalking horse for primacy. Whether targeted a t Russia or China, the new containment, like the old containment, identifies a threat that provides the rationale for remaining heavily involved in Eurasia and for maintaining the political, economic, and especially military capabilities needed to pursue an intense glohal strategic competition. One advocate of primacy who wants the
320
Widening Security
United States "to be the global hegemon of the regional hegemons, the boss of all the bosses" has explicitly called for the "potential" or "latent" containment of both Russia and China, while others prefer a more active version.55 Calls for containing Russia are most prominently identified with Zbigniew Brzezinski and Henry Kissinger, and have surfaced with the greatest clarity in the debate on whether NATO should formally expand and offer membership and protection to former Eastern European members of the Warsaw Pact. Both fear the seductive effect of a "security vacuum" in Eastern (newly re-christened "Central") Europe. "A Russia facing a divided Europe would find the temptation to fill the vacuum irresistible."j6 Observers should not be lulled by the relative decline in capability precipitated by the dissolution of the Soviet Union, the collapse of the Soviet economy, and the deterioration of the Soviet (now Russian) military. Containment advocates cite a new Russian assertiveness, demonstrated in diplomatic, military, and economic interventions large and small around its periphery.j7 Russia brings three dangerous qualities to the table: it possesses tremendous inherent strategic reach, considerable material reserves; and the largest single homogeneous ethnic-cultural population in Europe. Brzezinski asserts that .~~ Russian culture somehow contains within it the seeds of e x p a n s i ~ n (One notes here echoes of Cold War logic, which viewed Communism as inherently aggressive.) Because the new containment is so closely tied to NATO expansion, advocates say little about other regions of the world. It seems, however, that NATO expansion is part of a much more ambitious policy. Brzezinski adds a more forward U.S. policy around the Russian periphery.j9 In some recent work, he describes an "oblong of maximum danger," which extends from the Adriatic to the border of the Chinese province of Sinkiang and from the Persian Gulf to the Russian-Kazahk frontier.60Here he expects a stew of ethnic and nationalist conflict and proliferation of weapons of mass destruction - a "whirlpool of violence" - although the precise nature of U.S. interests here is not well developed. Similarly, Kissinger alludes to the role of a revived NATO in the resolution of the crises that will surely attend the adjustment of Russia, China, and Japan to the changed circumstances of the post-Cold War world; Kissinger has also alluded to a NATO role in Korea, Indonesia, Brazil, and India.61 Two elements in the case for NATO expansion suggest that its advocates perceive the Russian threat as less imminent than they often imply. First, they think that Russia's fears of an expanded NATO can be rather easily assuaged. Second, they see the Russian military threat as quite manageable. Advocates of NATO expansion usually advocate a simultaneous diplomatic approach to Russia in the form of some sort of "security treaty."62 They concede that NATO should not move large forces forward onto the territory of new members.63The combination of a formal diplomatic act of reassurance and military restraint is expected to ameliorate the possibility that the eastward march of a mighty and formerly adversarial military coalition could be perceived by Russia to pose a threat. These expectations seem inconsistent with the image of a looming Russian threat.
i i3
$I
i ,iri(
I
1'
i,
Competing Visions for U.S. Grand Strategy
32 1
Similarly, advocates of NATO expansion are relaxed about its costs because they are relaxed about the current Russian military threat. As of late 1996, NATO had yet to release a public estimate of the costs of expansion." One general statement of the threat has been offered by a team of political and military analysts from the Rand Corporation: One should a v o d assuinlng worst-case sccnarlos. Even a re-armed R u s s ~ awould not be the m ~ l ~ t a rLevlathan y the Sov~etUnmn once was. It would have an Imposing m ~ l ~ t a force, ry hut probably not a great deal more than that of Iran, Iraq, or North Korea - 111 short, a malor regronal contmgency-s~zedthreat. Defendmg agalnst such a threat would be kery d~fferentthan agamst the theater-w~dechallenge posed by the Warsaw Pact d u r ~ n gthe Cold War.h' Thus, there is no imminent or even remote military threat to these Eastern European countries that NATO cannot deal with rather comfortably with its current capabilities. Given the politically and militarily relaxed image of the Russian threat expressed hy NATO expansion advocates, one wonders what is actually driving them. In our judgment, it is first the desire to anchor the United States in a diplomatic enterprise that will preserve and widen its involvement in European and international affairs, simply because this is viewed as an unalloyed good in its own right. Second, it is to forestall even a hint of an independent German foreign policy in the east."" A revived containment policy in Europe may be nothing more than the adaptation of a politically familiar vehicle to the task of preserving U.S. primacy. Another candidate for future peer competitor, and therefore long-term threat, is China."' Current economic trends in that country suggest that it could become a formidable economic competitor in the first quarter of the next century. Its new economic capability could easily be translated into not only regional but also perhaps global military might.hx The admission of Vietnam into ASEAN (the Association of Southeast Asian Nations) can be read in part as reflecting regional concerns about China's intentions. China's rapid economic growth, improving military capabilities, stridency on Taiwan, and interest in the South China Sea have led to the suggestion that it would be prudent to hedge against the failure of engagement with China by means of a strategy of "hidden containment." Such a strategy would include maintaining U.S. military presence in the region, establishing a robust diplomatic relationship with Vietnam, and perhaps even reviving something along the lines of SEATO." According to The Economist, containment "should mean recognizing that China is a destabilizing force and impressing upon it the need to forswear force in trying to settle its grievance^."'^ Advocates of primacy share with the new isolationists and selective engagers a healthy skepticism of international organizations." International organizations have little if any power and therefore can d o little to maintain or, particularly, restore peace. Yet international organizations should not be entirely rejected because of fears that they may draw the United States into
322
Widening Security
conflicts or concerns that they cannot credibly deter aggression. Even a hegemonic power will, from time to time, find it useful to exploit the diplomatic cover provided by international organizations. If the facade of multilateralism renders the rule of an extraordinary power more palatable to ordinary powers, as it did during the Gulf War, international organizations are a strategic asset. Proliferation is as much a concern for primacy as it is for cooperative securThe threat to U.S. interests posed by the proliferation of nuclear and other weapons of mass destruction and their means of delivery was highlighted in the draft DPG. Proliferation is a problem because it undermines U.S. freedom of action by increasing the costs and risks of U.S. military interventions around the world. Because they serve to perpetuate a U.S. military advantage, current nonproliferation efforts should be continued. But while prevention is a useful first line of defense in combating proliferation, by itself it is inadequate to the task. The United States must also be able to deter and defend against the use of nuclear, biological, or chemical weapons by present and future powers which might develop such capabilities. Proponents of primacy view regional conflict, ethnic conflict, and humanitarian intervention in much the same light as do the advocates of selective engagement. Regional conflict matters most when it impinges on major power relations and the rise of potential peer competitors and regional hegemons. Outside of the Persian Gulf, most conflicts in what was once referred to as the Third World will be of little concern. Much the same can be said for ethnic conflict, however reprehensible it may be, and the need for U.S. humanitarian i n t e r ~ e n t i o n .There ~ ~ is no obvious security rationale, under primacy, for humanitarian military operations, though some operations (such as Bosnia) may offer opportunities to demonstrate and assert U.S. power and leadership. Force Structure
The forces needed to support a grand strategy of primacy should inspire a sense of dbja vu. A nearly Cold War-size force, in particular the Bush administration's "Base Force," would do just fine (see Table 2). The draft DPG was intended to provide the classified rationale for a 1.62 million person Base Force. General Colin Powell apparently saw this force as essential if U.S. primacy was to be preserved.74 Two advocates of primacy recently called for increasing defense spending by as much as $80 billion above current levels, to roughly the level required to support the "Base Force." They propose that the adequacy of U.S. military forces be measured against a ''two- (or three-, or four-) power standard," analogous to Britain's twopower standard of old, in which the Royal Navy was meant to be superior to the two next strongest navies in the world combined. This would serve to perpetuate the current disparity in military capabilities between the United States and other powers.75 Presumably, the disparity to be maintained is qualitative rather than quantitative.
I
I
-
Competing Visions for U.S. Grand Strategy
323
Military modernization is a high priority for the advocates of primacy. Indeed, if the objective is actually to deter any state from considering a challenge to U.S. preeminence, then it is logical for the United States military to pursue a level of qualitative superiority over potential challengers that would discourage them from entering the competition. That requires higher levels of research and development and procurement funding. The force must also be capable of what the Bush administration termed reconstitution: the ahility to expand U.S. military capabilities in order to deter, and if necessary respond to, the rise of a global challenger. Thus the level of defense spending required to support a grand strategy of primacy would likely be greater in the future than it would be now, as a consequence of both modernization and expansion. American military preeminence should ensure that U.S. forces could be used at will, hut would seldom have to be, since threats to U.S. interests would be deterred by overwhelming military capabilities. Advocates of primacy, perhaps in an effort to reassure the rest of the world, have counseled that the United States use force sparingly. They advise against the use of military force on behalf of purely economic interests, or to promote American values, reverse setbacks to democracy, support the United Nations, or resolve civil wars. Protracted military involvement in non-critical regions is to be avoided. Because world order and stability are to be maintained, however, the United States is to look favorably on the use of force to resist aggression." Despite the lip service given to restraint, this self-appointed mission could involve a lot of fighting.
One of the foremost advocates of primacy has argued that "it matters which state exercises the most power in the international system"; that U.S. primacy is to be preferred to that of another power and is superior to a world in which no one is able to exercise primacy (the balance-of-power world implicitly embraced by selective engagement); and that primacy enables a state to achieve its objectives without resorting to war.'; However, although primacy may offer many benefits for the United States and even for the world, the quest for primacy is likely to prove futile for five reasons. First, the diffusion of economic and technological capabilities -precipitated in part by the open international economic system that the United States supports, in part by the spread of literacy, and in part by the embrace of market economics - suggests that other countries will develop the foundations to compete in international politics. New great powers will rise in the future. Indeed, though there is no recognized rule of thumb that specifies the share of gross world product a state must command in order to bid for hegemony, it seems peculiar to suggest that the situation today is not much different from the end of World War 11, when an unhombed United States produced 40 percent of gross world p r o d ~ c t . ' ~
324
Widening Security
Second, contrary to the expectations of primacy advocates, it is likely that some states will balance against the United States. They will not wish to remain in a permanent position of military inferiority, just as the United States would struggle to reverse the position if it were imposed even by a benevolent state. Primacy underestimates the power of nationalism. Some states, simply out of national pride, may not accept U.S. leadership. States coalesce against hegemons rather than rally around them. Primacy is therefore a virtual invitation to struggle. Third, American insistence on hegemonic leadership can engender resistance that may undermine the long-term effectiveness of any multilateral mechanisms that the United States may wish to exploit should challengers actually emerge. If a rising power such as China cannot be accommodated, as Britain accommodated the rise of the United States, the collective defense mechanisms of selective engagement or the collective security component of cooperative security would ensure that the United States need not alone bear the burden of taking on those who would undermine international order and stability: primacy may make this remedy unavailable. Fourth, primacy carries the logical implication that the United States should be willing to wage preventive war. For now, such discussions focus on depriving "rogue" states of their nascent capabilities to assemble weapons of mass destruction. However difficult this may be, it is easy compared to the problem of restraining larger states. Will U.S. domestic politics permit a preventive war to forestall the rise of a challenger if other measures have proven insufficient? How will other major powers react to preventive war? Fifth, the pursuit of primacy poses the constant risk of imperial overstretch. Primacy is inherently open-ended. A little bit more power will always seem better. Selective engagement is vulnerable to this temptation; primacy is even more so. Attempting to sustain an image of such overwhelming power that others will not even think of making the effort to match U.S. capabilities, or challenge U.S. leadership, seems a good recipe for draining the national treasury. Primacy may be affordable today, but it is less likely to be had on the cheap in the future. Ultimately, primacy is probably unsustainable and self-defeating. Primacy is little more than a rationale for the continued pursuit of Cold War policy and strategy in the absence of an enemy.79
The Clinton Administration's Grand Strategy: Selective (but Cooperative) Primacy The Clinton administration came to office strongly inclined to pursue a cooperative security policy. Several of its senior national security officials were identified with the development of cooperative security ideas before the 1992 election.80 The international and domestic constraints that the administration has encountered in its efforts to execute the strategy have forced both real and rhetorical compromises. A National Security Strategy of Engagement and Enlargement (February 1996), the most complete statement of the administration's grand strategy
I
I
I
Competing Visions for U.S. Grand Strategy
325
vision, prominently contains within it the language of cooperative security and selective engagement, plus a dash of primacy." The document reveals a curiously dialectical quality, alternating between cooperative security rhetoric and selective engagement rhetoric. The administration has adopted an avowedly internationalist posture founded on a broad conception of national interests. The phrase "engagement and enlargement" conveys both the mode and the purpose, o r vision, o f the strategy: the United States must be engaged in the world to enlarge the community of democratic free-market countries. Neo-isolationism is explicitly rejected. The repeated calls for U.S. leadership may be interpreted as a bow in the direction of primacy, as is the stress on U S . mi lateral military ~ a ~ a b i l i t i e s . ' ~ The document promotes, on the one hand, "cooperative security measures." O n the other hand, it acknowledges "limits to America's involvement in the world - limits imposed by careful evaluation of our fundamental interests and frank assessment of the costs and benefits of possible actions," and notes that "we cannot become involved in every problem." The array of transnational threats and challenges confronting the post-Cold War world "demand cooperative, niultilateral solutions." Arms control is unequivocally embraced as "an integral part of our national security strategy" and seen as becoming increasingly multilateral. But the country's force structure must enable the United States to deal with threats not just multilaterally but unilaterally. "Our leadership must stress preventive diplomacy ... in order to help resolve problems, reduce tensions and defuse conflicts before they become crises," yet "our engagement must be selective, focusing on the challenges that are most important [to] our own interests and focusing our resources where we can make the most differe~~ce."~' While the document issues calls for strengthening the United Nations, and for the United States to be prepared to participate in a wide variety of multilateral peace operations, that participation is nevertheless subject to a restrictive set of conditions that, if taken at face value, would ensure that the United States is seldom actually engaged in such operations. Economic rnultilateralism too is championed, but a self-regarding emphasis on "enhancing American competitiveness," which might be expected of selective engagement or primacy, is present as well.x4 Democracy must be promoted, but a selective approach prevails: some parts of the world and some countries, particularly the states of the former Soviet Union and Eastern and Central Europe, matter more than others. The United States will intervene in the morass of ethnic and other intra-state conflicts only if there is an exit strategy. Humanitarian interventions too will occur under the strategy, but only under "certain conditions."" More generally, decisions on whether, when, and how to use military force are subject to stringent guidelines that, if consistently adhered to, ensure that it will be used quite selectively. The administration's highest-priority regions - the two ends of Eurasia - are the same as those of selective engagement and primacy. The Clinton administration has been forced to water down a commitment to cooperative security because its purposes proved too grand and its premises faulty; the U.S. power necessary to pursue the strategy proved
326
Widening Security
greater than expected. The liberal internationalist rhetoric that accompanies cooperative security generates a long agenda and great expectations for action. But to succeed without the commitment of substantial U.S. power, both international and multilateral institutions need to be strong and cohesive. And, more generally, very extensive international cooperation would be required. Both assumptions were flawed. The UN remains a weak institution. Though it has been remarkably busy at peacekeeping over the last five or six years, it has proven ineffectual wherever the local parties have been even moderately resistant. Regional institutions did not do much better: the European Union and to a lesser extent the Organization for Security and Cooperation in Europe made attempts to help manage the dissolution of Yugoslavia, but they were unable to produce any results. The UN was able to organize some humanitarian relief in Yugoslavia, but was unable to bring about a settlement, or even to ameliorate the brutality of the fighting. Moreover, all three of these institutions contained ample numbers of democratic, peace-loving states. The EU is made up entirely of such states. Democracies may not fight one another, but this does not mean that they will always cooperate to settle disputes at the margins of traditional national interests. The Clinton administration discovered that although international institutions are weak, the forces of U.S. domestic politics are not particularly supportive of strengthening them. The rhetoric of U.S. "leadership" that both the Democrats and the Republicans have adopted in their foreign policy statements is as much an expression of what the U.S. public seems to be against in international affairs as what it is for. It is against giving up much U.S. autonomy. As several observers have noted, the freshmen Republicans elected in 1994 are not so much isolationist as n nil at era list."^^ This means that the United States is in no position to strengthen weak international institutions. The only multilateral organization that is loved across the U.S. political spectrum seems to be NATO, which is why it is carrying so much U.S. foreign policy weight. The Clinton administration also discovered that international cooperation is not so easy to arrange. Even the good guys can conceptualize their national interests in opposition to one another. Three conflicts with liberal democratic allies have surfaced during the Clinton administration. While all of these conflicts cannot be attributed to cooperative security projects, they nevertheless illustrate the broader problem: democracies can be "uncooperative." First, the Clinton administration itself pursued a strangely "non-cooperative" economic policy with the Japanese for most of 1993-96. This caused many in Asia to wonder if the United States was abandoning its commitment to a multiSecond, the United States vehemently disagreed with lateral trading sy~tem.~' the policy pursued in Bosnia by Britain and France. U.S. policymakers believed that there was some way to produce a unified, pluralist, democratic Bosnia-Herzegovina. The British and French believed that once the war got going, some variant of a partition solution was the right answer. Privately,
Jt
' I
111
Competing Visions for U.S. Grand Strategy
327
both British and U S . officials admit that differences over Bosnia brought U.S.-British relations to their lowest point since the 1956 Suez crisis. In the end, the United States and the allies compromised on a Bosnia settlement: the United States agreed to commit troops t o support an effort to achieve a Bosnia settlement more to its liking, while the allies agreed to support such a settlement so long as it included a very high level o f autonomy for the three communities of Bosnia. Finally, in August 1996 the United States initiated a dispute with its allies and trading partners over their economic relations with countries that the United States intended to sanction economically. The U.S. proposed unilaterally to punish the citizens of countries who d o business with Cuba, Iran, and Libya. While in the latter two cases the allies may broadly agree with the antiterrorism principles that motivate U S . actions, they do not consider these actions to be commensurate with their own national interests. More iniportantly, they recoil from what they perceive as the arrogance of U.S. policy. If friends and allies have their own interpretations of U.S. actions, "rivals" are even more likely to be suspicious, and less likely to prove cooperative. Though the Clinton administration has gone to great lengths to portray NATO expansion in cooperative security terms, Russian political figures and policy makers d o not seem to accept the notion that NATO expansion is good for their country. Clinton administration officials remain optimistic that the Russians will accommodate themselves to NATO expansion. This is probably true in the sense that since there is nothing they can d o about it, at some point they have nothing t o gain by opposition. This does not mean, however, that a positive Russian consensus will develop around the project. Indeed, it seems equally plausible that the fact of NATO expansion will be a continuing sore point in Russian domestic politics. Similarly, the llnited States initially pursued a very energetic policy of "engagement" with the People's Republic of China, "engaging" the Chinese simultaneously on their domestic politics, their economic policies, and several aspects of their foreign policy. Engagement usually took the form of the United States explaining to Chinese officials how they should change their behavior, and ignoring Chinese sensitivities about interference in their internal affairs, and the status of Taiwan. The result was a generally non-cooperative China. Because international and regional security institutions are weak, more U.S. leadership is required t o make things happen than cooperative security advocates had hoped. Resources are necessary t o supply this leadership, and resources for international affairs have become more scarce than they were during the Cold War. In particular, foreign aid and the State Department budget have been cut in half since 1984, largely a t the instigation of the Congress, and are destined t o fall another 2 0 per cent by 2002.8XThe defense budget remains large, even by Cold War standards; real defense spending nearly equals the outlays of the 1970s, and is roughly 80 percent of what it was in the early 1960s. It is also very large relative to the rest of the world, equaling the total defense spending of the next five major military powers in 1994 (Russia, China, Japan, France, and Germany).xyYet these resources,
328
Widening Security
which would be more than adequate to support a policy of selective engagement, seem to produce a military that is not quite capable of the range of projects that it now faces. The Clinton administration's defense program faces persistent tensions among force size, activity, readiness, and modernization. Most observers believe that the force structure cannot be funded for the level of resources planned after the turn of the century. The "Bottom-Up Review" avowedly sized the military for two nearly simultaneous Major Regional Contingencies (MRCs), and then added extra capabilities to support a vigorous forward presence. The quest for permanent military-technological dominance has proven expensive. In contrast to many doubters, it does seem to us that the force structure may well be able to deal with two simultaneous MRC's today, but it appears that both "Major" and "Minor" Regional Contingencies (MaRCs and MiRCs?)are difficult to end definitively. This high level of activity seems to have imposed stresses and strains on the organization that may require additional resources to resolve. The United States today deals with two simultaneous MiRCs on a daily basis: the military containment of Iraq, including protection of the Kurds, and the combined ground, naval, and air operation in Bosnia. For a brief period, the U.S. military was also simultaneously involved in Haiti. Calls are occasionally heard for forcible intervention in Rwanda and Burundi; humanitarian military assistance was provided in Rwanda; and logistical military support has been offered for multilateral military interventions in both places. The U.S. military presence in the Republic of Korea has an edgy quality to it that makes the mission anything but garrison duty, arguably a "MiRC" that could quickly turn into a "MaRC." The U.S. military is busy, and new missions are suggested daily. Finally, resources that were expected from the "downsizing" of the U.S. military have not materialized. Cuts in the infrastructure that supported the Cold War effort have not been proportional to the cuts in the divisions, wings, and warships that are the "business end" of the force. Neither the Congress nor the executive have shown much discipline in this matter. Thus, though the financial resources to remedy many problems may be present within the defense budget, they are fenced off politically. In sum, pursuit of the objectives of cooperative security, with weak or non-existent cooperative security institutions, probably requires more U.S. resources than advocates projected. The Clinton administration's grand strategy is the result, therefore, of four conflicting sets of pressures. Its own ambitious purposes impel considerable activism. The constraints presented by the current realities of international politics make these purposes difficult to achieve without the exercise of U.S. leadership and power. A substantial portion of the U.S. political elite, in particular congressional Republicans, displays an erratic impulse toward unilateral U.S. actions on selected issues, particularly those that have to do with perceived unfinished Cold War business, such as national ballistic missile defense, Cuba, and Taiwan's independence. The general public is far from isolationist, but is nevertheless not particularly interested in foreign affairs. The Clinton administration has moved toward a grand strategy that tries to
0
I
i
Competing Visions for U S . Grand Strategy
329
address these conflicting pressures. The accommodations that the Clinton administration strategy has made with the obstacles it has encountered have been incremental, rhetorical, disjointed, and incomplete. In theory, the incoherence of the current strategy could produce a series of new difficulties for the administration, and conceivably a disaster. In practice, the Clinton administration may succeed in avoiding a disaster through its well-known skills at "triangulation." At the first sign o f serious resistance on the domestic or international front, it adapts or backs away in order to keep costs under control. The second Clinton administration may muddle through. L.ong germ Prospects for Ch
What is the longer-term prognosis for U.S. grand strategy? What could cause this strategy to change and in what direction might it change? The answer depends upon a number of contingencies. Ironically, the Clinton administration grand strategy has already evolved to a point where it has many of the trappings of primacy. Indeed, Clinton's foreign and defense policy team has discovered that considerable U.S. leadership and major commitments of U.S. power are necessary for the pursuit o f the transforn~edworld order they seek. The Republicans would prohably follow a somewhat purer version of primacy, and move even further away from cooperative security than the Clinton administration already has, if they could take back the presidency.'" What might cause U.S. foreign policy makers in hoth parties to abandon primacy? One likely source of a major change in t7.S. grand strategy is change in U.S. domestic politics. The aging of the "bahy boomers" will put substantial pressure on the federal budget after the turn of the century. An increasing portion of the politically active adult population will have dim memories of the Cold War. Even the Persian Gulf War is heginning to fade into the past. The combination of these developments could produce decreasing budgetary and political support for an activist U.S. foreign policy. U.S. leaders will have to husband these scarce resources; selective engagement may become the US. grand strategy by default. Primacy could die the death of a thousand cuts. The overall U.S. share of global power will decline a little. Scientific, technological, and productive capacities will spread across the world. Niche players will develop in economics, warfare, and even ideology. Close allies will grow tired of incessant U.S. demands. Traditional adversaries will balk as the United States tries to set the criteria for responsible membership in the "international community." A series of not very costly but ultimately indecisive interventions could exhaust the patience of the U S . public. Selective engagement again could be the default strategy, but retreat to isolationism is also possible. Alternatively, the U.S. share of gross world power could decline significantly. Though some skepticism is in order on this score, the prospect ought not to be ruled out entirely. Russia may recover economically and politically; the Japanese economy could improve, the Chinese economy might
330
Widening Security
continue to enjoy very high growth rates. Global statistical comparisons may increasingly conform to the description "multipolar world." In such a world the United States would be constrained by other powers. Selective engagement, again, seems a plausible fall-back position. The temptations of U.S. power could prove too strong in the short term. Many Democrats and many Republicans believe that democratic principles and liberal values are universal, or should be, and that this country should act to spread them. Moreover, the end of the Cold War left a lot of foreign policy and security specialists without much to do; they will find new dragons to slay. Thus, it is plausible that the United States will get itself into a major war over these values and principles. The United States is quite powerful militarily, and it is possible that the war would be another Desert Storm. On the other hand, it is just as likely, given the kind of world we face and beliefs we carry, that the war will be a Vietnam, or Boer War, or Algeria, or "the troubles" of Northern Ireland. Such a war could easily produce a retreat to neo-isolationism. This is no great insight, and responsible foreign policy professionals will try to avoid this war, because they understand its risks. But blunders are possible. Finally, a change in a more ambitious direction would result if an aspiring peer competitor jumped the gun, like Saddam Hussein did, challenging the United States before its power was adequate. The behavior of such a state could create threats to many while the United States is still strong and active, and the challenger is still too weak. Such a threat could permit primacy to evolve into "containment." The fearful would once again be eager to embrace U.S. leadership. The people of the United States would allocate plenty to military preparedness and to foreign aid. In a host of small and large ways, medium and great powers would encourage and subsidize U.S. leadership.
Conclusions This brief overview cannot do justice to the full range of argumentation about which the advocates of neo-isolationism, selective engagement, cooperative security, primacy, and engagement and enlargement disagree. But it is a start. By way of conclusion we offer three general points. First, it should be clear that these strategic alternatives produce different advice about when the United States should use force abroad, and the advice is not equally explicit. The new isolationism suggests "almost never." Cooperative security could imply "frequently." Selective engagement advises "it all depends," but suggests some rough criteria for judgment. Primacy implies the employment of force whenever it is necessary to secure or improve the U.S. relative power position, but permits it whenever the United States is moved to do so. An understandable desire for clear decision rules on when to use force should not, however, outweigh the more fundamental concerns that ought to drive the U.S. choice of strategy.
\ r
I
Competing Visions for U.S. Grand Strategy
33 1
Second, these alternative strategies generate different force structures, two of which may prove attractive because of the money they save. But leaders should understand that these force structures constrain future political leaders - o r ought to constrain them. A neo-isolationist force structure cannot quickly be recast for cooperative security o r humanitarian intervention. A force structure designed for selective engagement may prove inadequate for the full range o f cooperative security niissions. A true cooperative security force structure may include more intervention capabilities than needed for strategic weight in great power wars, perhaps at some cost t o the ability of the United States t o wage high intensity warfare, unless the defense budget grows accordingly. A force structure tailored for primacy permits most kinds of military operations hut may be so imposing that it causes some states t o compete more rather than less with the United States. Finally, although the alternatives are not entirely mutually exclusive, for the most part one cannot indiscriminately mix and match across strategies (as both post-Cold War adn~inistrationshave attempted t o d o ) without running into trouble. They contain fundamental disagreements about strategic objectives and priorities, the extent t o which the United States sho~ildbe engaged in international affairs, the form that engagement should assume, the means that should be employed, the degree of autonomy that must be maintained, and when and under what conditions military force should be employed. Some combinations just d o not go together. One cannot expect to reap the rewards of isolationism if one still intends t o engage on behalf of friends such as Israel. One cannot wage war in the name of cooperative security in Bosnia-Herzegovina, fail t o d o the same if Russia helps destabilize the Georgian Republic, and still expect to establish a well-founded fear of international reaction on the part of aggressors everywhere. Selective engagement rnay ultimately draw the United States into strategically unirnportant conflicts if its leaders consistently try to wrap their actions in the rhetoric and institutions of cooperative security. Those who dream of cooperative security, but practice primacy, must understand that they rnay gradually erode the international institutions upon which their dream depends, postponing it to an ever more distant future. And the rhetoric and diplomacy of a new containment strategy, even if it is only a convenient vehicle for the pursuit of primacy, probably does not permit, as the advocates would claim, particularly friendly relations with the objects of the policy. The Clinton administration has found it expedient to draw opportunistically from three grand strategies. It seems plausible that a future Republican administration would succumb to the same temptations, and for similar reasons. Though primacy figures prominently in the strategic inclinations of both parties, elements of other strategies pop up as needed. Given the realities of U.S. politics, such an ad hoc approach is probably inevitable until a crisis impels a choice. And the failure t o develop a clearer consensus on grand strategy may hasten the arrival of that crisis. Perhaps the best we can d o now is t o lay out those choices.
332
Widening Security
Authors' Note The original version o f this essay was submitted by Barry R. Posen as written testimony for the House Armed Services Committee on March 3, 1993. Earlier versions o f this piece appeared in Strategy and Force Planning Faculty, eds., Strategy and Force Planning (Newport, R.I.: Naval War College Press, 1995), pp. 115-134; and in Robert J. Lieber, ed., Eagle Adrift: American Foreign Policy At the End of the Century (New York: Longman, 1997),pp. 100-134. The views expressed here are those o f the authors and do not necessarily reflect the views o f the Naval War College, the Department o f the Navy, or any other U.S. government department or agency.
Notes 1. Anthony Lake, "From Containment to Enlargement," U.S. Department of State Dispatch, Vol. 4 , No. 39 (September 27,1993), pp. 658-664; A Natzonal Security Strategy of Engagement and Enlargement (Washington,D.C.: U.S. Government Printing Office[U.S. GPO],July 1994); and A National Security Strategy of Engagement and Enlargement (Washington, D.C.: U.S. GPO, February 1996). 2. Each grand strategy should have an economic component. Most o f the literature, however, treats the economic component in a cursory way, i f at all. As we began to consider the possible economic elements o f each alternative we determined that a separate essay would be required to offer more than a superficial treatment. Therefore, this essay confines itself to the political and military aspects o f alternative U.S. grand strategies. 3. W e also rely on these options because they have the unusual attribute that five o f them largely employ the same basic methodology to develop force structure and to estimate the costs o f those force structures. Representative Les Aspin, " A n Approach to Sizing American Conventional Forces for the Post-Soviet Era," February 25, 1992 (unpublished manuscript); Secretary o f Defense Les Aspin, Report on the Bottom-Up Review (Washington, D.C.: Department o f Defense, 1993); Congressional Budget Office (CBO), Staff Memorandum, "Fiscal Implications o f the Administration's Proposed Base Force," December 1991 (unpublished manuscript); see also Andrew F. Krepinevitch, The Bottom-Up Review: An Assessment (Washington, D.C.: Defense Budget Project, 1994);and Dov S . Zakheim and JeffreyM. Ranney, "Matching Defense Strategies to Resources: Challenges for the Clinton Administration," International Security, Vol. 18, No. 1 (Summer 1993), pp. 51-78. The Bush-Cheney-Powell "Base Force" was probably generated by a somewhat different methodology. The individuals who made the budget estimates in every case had access to the best available cost information. Other analvsts have develo~edforce structures and estimated costs on the basis o f their individual methodologies; we chose not to employ them because we could not be sure they were strictly comparable. 4. However, there are reasons why the cost estimates in Table 2 could he too high or too low. Most estimates, particularly those for the Base Force and Clinton Bottom-Up Review (BUR) force, probably underestimate the cost o f major procurement after the turn o f the century. On the other hand, many estimates o f the costs o f smaller forces probably do not take credit for the savings that ought to accrue from proportional reductions in defense infrastructure that ought to accompany reductions in force structure. This tends to occur for two reasons. First, because U.S. defense politics focuses on the Future Years Defense Plan, or FYDP, most policy-oriented budget analysts focus primarily on the near-term budgetary consequences that would directly arise from incremental reductions in existing forces. Second, infrastructure, particularly bases and depots, are often politically protected. It is only slightly absurd to suggest, therefore, that nearly all the conventional combat power in the U.S. military could be eliminated, and still leave us with a defense budget o f $100 billion a year, which is the implication o f the trend o f costs versus force structure in Options A-D. 5. The new isolationists seldom refer to themselves as isolationists. Indeed, they often vociferously deny isolationist tendencies. Earl Ravenal, "The Case for Adjustment," Foreign
I I
I
I'
I
Competing Visions for U.S. Grand Strategy
333
Polzcy, No. 81 (Winter 1990-9 I ) , pp. 3-19, prefers "disengagement." Patrick J . Ruchanan, too. in " A m e r ~ c a First - ' ~ n dSecond, 'ind Third," Nirtiomzl lrztcwst, No. 1 9 (Spring 1990), pp. 77-82, uses "disengagement." D o u g Bandow, "Keeping the Troops a n d the M o n e y a t Home," Current History, Vol. 93, N o . 5 7 9 (January 1994), pp. 8-13, prefers "benign detachment." Eric A. Nordlinger, however, in the m o \ t sophisticared, a n d perhaps least conventional version of the new isolarionisrn, Isolat~oursinKeconfigzrrrrl: Amrrican Foreign P d r s ) ~for a Ncui <;etttury (lJrinceton, N.J.: 1'1-inceton Univers~tyPress, 1 W i ) , embraces "isolationism." 6 . Kandow, "Kccping r h c Troops ,und the M o n e ) a t Homc," p. 10. 7. T h e verslon of realism tlint underlies the new i s o l a t ~ o n ~ sISm minimal. Its strategic imperatives are even more limited than those of the m i n m a l realism outlined by C h r ~ s t o p h e rI.;lyne, "Less 1s More: h ~ l i n i ~ n aKealrsm l In East Asla," Niltronnl Ilzterest, No. 4.3 (Spring 19961, pp. 64-77. 1.ay11e drstmguishes hetween maximal m d niini~iialrealism. H e vlews a I)al,ince of power approach (which we call "selecr~veengagement") a\ m ~ n i m a lrealism. Lavne link< prim ~ l c ywith m,~xirn.~l real~sni.For a n earlier version of m ~ r i ~ n i realism ,~l a n d neo-isolat10111s111, see Robert W. Tucker, A N e w Isolizti~~tus~~z: TI~re'rto r Promise! ( N e w York: Universe Books, 1972). Nordl~nger,Isol~~tronisnz K e ~ ~ o n f ~ ~ u is r c the i l , most signific,lnt exception t o the g e n e r a l ~ r ~ t i o n that neo- sola at ion ism is driven by a rc,tlist interpretation of ~nternationalpolitics. H I eclectic approach t o developing ,I n . ~ t ~ o n astrategy l of isol,ltionis~n'ind its concurrcnr foreign policy is, in the end, informed more by I~heralismthan realism. 8. Alan Tonelson, "Superpower Without a Sword," korc~igtrAtfilrrs, Vol. 72, No. 3 (Summer 199.3), p. 179, observes that "few intern~lrionnlconflicts will directly threaren the nat~on'sterritorial integr~ry,pol~rrcal~ndependenceo r nlaterinl welfare." 9. Christopher Layne, "The Unipolar illusion: W h y Nebv (;rear Powers Will Kiw," l ~ t t ~ r ri~lttowalSecurity, Vol. 17, No. 4 (Spring 1993), p. 48, 11ukes th15 poinr. H e uses it t o support an argument for a gr'lnd strategy rhat he calls " s r r x e g ~ c~ndependence."It hears some similarity to the select~vceng,lgernent str'ttegy o u t l ~ n e dbelow, a l b e ~ ,It rather inactive version of I[. 10. Nordlinger, lsolirtiorrrsm Kecotrsrtfrred, pp. 6 and 63-9 I. I I. Kaven.11, "The (.,lse for Adjustment," pp. 15-19, develops a force \tructure a n d defense budget within these pnrnmetcrs w h ~ is h e x p l ~ c ~ r gtxred ly t o support '1 grand strategy quite s111111art o w h ~ we t label isol,~tionism. H e suggests a n 'lcrive force of 1.1 million people. wirh six Army ,lnd t w o Marine c l ~ v ~ s ~ o eleven ns, tactical , ~ i rwtngs, S I X carrlers w ~ r hfive alr wings, m d a strategic dyad of submarines a n d hornlxm, which could he funded tor d h o ~ ~ t $1.50 bill~on in constant 1991 dollars, perhaps $17.5 h ~ l l ~ oInn 1 9 9 7 dollars, o r r o ~ ~ g l i l ~ 2.5 percent of < r L ) t . See POI-ceA In X ~ h l e1, which I \ roughly the same size, but w h ~ c hthen<:ongrcssni,in .A\pin estimated would cost consider,ihly more. $21 1 hillion in 1 9 9 7 dollar\, roly,hly 3 percent o t <;Dl? See nlio 'Timelson, "Superpowel- Without a S\vord." pp. 179-180, u h o argues for ,I sitn~larforcc structure, but w h o seems t o \ ~ ~ b s c r ~t oh ae conservative vcrslon of selective engagement. 'The Crnrer for 1)etense Intorm,~rionh , ~ sproposed that an even s m ~ l l e r forcc structure ivould he s u f f ~ c ~ e nt or \upport 1' srr,lteg) of diwrigagement. For $104 brll~onin c o n \ t m r I 9 9 3 dollars, CI)l proposed ro f ~ e l d;I forcc of only i 0 0 , 0 0 0 people, o n e Marine and three Army divis~ons,four .Air Force t a c t u l wing\, t ~ v ocarrier\ 'ind 2 2 1 other combat vc\5els, a n d ,I nuclear force of I h \ u h m , ~ r ~ n e sSee . " D e t e n d ~ n gAmtwca: (:Dl O p t ~ o n sfor M ~ l i r a r y Spending," Llc~fiwseMonrti~t; Vol. 2 I, N o . 4 ( 1 9 9 2 ) . Nordl~nger,Isolirtronrsm Krcorrfiprr~rf, 11. 46, \ugge\ted rhat forces a t halt the levels ru\t.i~ncd d u r ~ n gthe Cold \Y"lr .ind e x l y post-Cold War >e,irs w o l ~ l dbe s u t f ~ c ~ c n t . 12. Kohert .Art, "A Iktcnsihle Ikfense: Arri~ric~i's <;r,ind Srr,itcgy After the Cold WII;" I t ~ t c m n t ~ o r i Srrztrity, ~zl Vol. 15, No. 4 (Spring 1991), pp. 5-.53; and Stephen Van Fvera, "Why Furope hlatters, Why the Thil-d World 1)oesn't: Anier~can<;rand Strategy After the Cold War," /ozrrnizl ojStr~lt(:qzr Studies. Vol. 1.3, No. 2 ( J u n e 1990), pp. 1-5 I , ,Ire rhe t w o tnost complete e\posirions of selective engagenlent. See ~ l s oKon,lld Steel, T~wzptatrotis1 ~ f~7 S t i ~ r r p o ~ o r r (<:ambrdge, Mass.: Harv,ird University I'ress, 199.5). I 3. Sclect~veengagement I \ informed rie~thcrh! the t i ~ i n ~ re.111sm n ~ ~ l char underlies the n e u
334
Widening Security
14. Posen classifies himself as a "selective engagement" advocate. He does believe, however, that the United States should not only act to reduce the probability of great power war, it should also pursue the traditional policy of opposing the rise of a Eurasian hegemon who would conauer or even dominate the world's centers of industrial and economic Dower. The latter risk seems very low in the short term, but preserving the political division of industrial Eurasia remains a U.S. interest. 15. O n this point see Van Evera, "Why Europe Matters," pp. 8-10; and Art, "Defensible Defense," pp. 45-50. 16. Art, "Defensible Defense," p. 45. See also Jonathan Clarke, "Leaders and Followers," Foreign Policy, No. 101 (Winter 1995-96), pp. 37-51, arguing both that the U.S. share of global power is too small to support cooperative security or primacy, and that U.S. public support for such strategies is too weak. 17. See Art, "Defensible Defense," pp. 23-30. 18. Art, "Defensible Defense," p. 47. Stephen Van Evera, "The United States and the Third World: When to Intervene?" in Kenneth A. Oye, Robert J. Lieber, and Donald Rothchild, eds., Eagle in a New World (New York: Harper Collins, 1992), pp. 127-131, makes a comprehensive case for the U.S. intervention in the Persian Gulf in 1990, Operation Desert Shield, but expresses skepticism about the necessity for Operation Desert Storm. 19. Robert S. Chase, Emily B. Hill, and Paul Kennedy, "Pivotal States and U.S. Strategy," Foreign Affairs, Vol. 75, No. 1 (JanuarylFebruary 1996), p. 33, have singled out Mexico, Brazil, South Africa, Algeria, Egypt, Turkey, India, Pakistan, and Indonesia as pivotal states "whose future will profoundly affect their surrounding regions." The list is long, the adjective "pivotal" seems premature, and systematic attention to these states in addition to the great powers is hardly selective. Nevertheless, the list does highlight states that may pose special problems today, o r which may become serious contenders for regional power in the future. 20. Barry R. Posen, "A Balkan Vietnam Awaits 'Peacekeepers'," Los Angeles Times, February 4, 1993, p. B7. The article assesses the force requirements t o police the "Vance-Owen Plan," which intended to preserve a unitary Bosnia-Herzegovina. The three principal ethnic and religious groups in Bosnia would have remained intermingled, as they were at the outset of the war. Thus the police problem would have been quite complex and demanding, similar to the British problem in Northern Ireland. 21. Chase, Hill, and Kennedy, "Pivotal States and U.S. Strategy," provide an illustration of how the project grows. See also James A. Baker 111, "Selective Engagement: Principles for American Foreign Policy in a New Era," Vital Speeches of the Day, Vol. 60, No. 1 0 (March 1, 1994), pp. 299-302. The former secretary of state argues for an expansive strategic agenda that looks more like primacy than selective engagement. 22. Inis L. Claude, Swords into Plowshares: The Problems a n d Progress of International Organization, 4th ed. (New York: Random House, 1971), p. 247; Arnold Wolfers, Discord and Collaboration: Essays on International Politics (Baltimore: Johns Hopkins University Press, 1962), pp. 183-184: "'any aggressor anywhere' is in fact the national enemy of every country because in violating the peace and law of the community of nations it endangers, if indirectly, the peace and security of every nation." 23. O n the differences between realism and liberalism, see David A. Baldwin, ed., Neorealism and Neobberalism: The Contemporary Debate (New York: Columbia University Press, 1993); Michael E. Brown, Sean M. Lynn-Jones, and Steven E. Miller, eds., Debating the Democratic Peace (Cambridge, Mass.: MIT Press, 1996); Michael E. Brown, Sean M . Lynn-Jones, and Steven E. Miller, eds., The Perils of Anarchy: Contemporary Realism and International Security (Cambridge, Mass.: MIT Press,1995); Robert Gilpin, The Political Economy of International Relations (Princeton, N.J.: Princeton University Press, 1987); Charles W. Kegley, Jr., ed., Controversies in International Relations Theory: Realism and the Neoliberal Challenge (New York: St. Martin's Press, 1995); Robert 0.Keohane, ed. ,Neorealism and Its Critics (New York: Columbia University Press, 1986); and Richard Ned Lebow and Thomas Risse-Kappen, eds., International Relations Theory and the End of the Cold War (New York: Columbia University Press, 1995).
I
1
I
1
Competing Visions for U S . Grand Strategy
335
24. <:harles A. K u p c l ~ l n,lnd Clifford A. Kupchan, "Concerts, Collective Security, ,,.lndthe Future of Europe," Irrtcrnatronal Secr~rity,Vol. 16, No. 1 (Summer 1991), pp. 1 4 9 1 5 0 ; and Richard Ullman, Sectwing t k r o p r (I'rlnceton, N.1.: Princeton University Press, 1991), p. 76. 2.5. For the core works, see Ashton R. Carter, Willlam J. I'erry, a n d J o h n 1). Sreinhruner, A N c ~ uConcept of Cooperatiuc~Securrty, O c c a ~ i o n a lPaper (Washington, D.C.: Krookings I n \ t i t ~ m o n , 1992); ,lanne E. Nolan, ed., Global tngngen~cnt:Cooperation and Sectrrity in thr 2 l s t C ~ n t u r(Wllshlngton, ~ I>.(:.: Brookings Institution, 1994); Paul R. Stares and J o h n D. S t ~ ; n h r u n c r .i c ( : o o p e r ~ ~ tS; ~e ec i l r ~ and t ~ the New Europe," In Stnrcs. cd.. 7'hc N e w C ; ~ Y I I I U M ~ and tile Nrru knrope (Wa\hlngton, L1.C.: B r o o k ~ n g sInstrtution, 1992), pp. 218-248. For .I shorter e x p o a i t ~ o n ,see RLlnJ,1II torsherg, "Creating a <:ooper,lt~veSecurity System," in After t / ~ eCold Wdr: A llehatr on Cooperiitrve Secrfrrty, Institute for I k f e n s e a n d D ~ s a r m a m e n t Studies, Reprint, ('ambridge, M,is\., first published in Kostotr Ki~wzc:Vol. 17, No. 6 (Novenlherl L>ecemhcr 1992). 26. "l'rolifer~tion of destructive technology casts a shadow over future U.S. security In a way t h ~ cannot r he dlrcctly addreised through superior force o r rend~ness.Serious economic and environmental problems point t o a n inescapable ~nterdcpendenceof 11.5. interests with the interests of other n a t ~ o n \ . "Carter, I'err); a n d Sreinhruner, A N r w C:on~-c,ptof Coopcrutiue Secrtrrty, p. 4. 27. Madeleine K. Allmght, U.S. Permanent licprcsenr~~tivet o the U n ~ t e d N,it~ons, "Realism a n d Ide,~lism in American Foreign I'ollcy T o d ~ y . " U.S. Dr3partn1ent o/ State VoI. 5 , NO. 2 6 (June 27, 1994), pp. 434-417, otfers a n explicit and comprehcns~ve Drsp~~tch, statenlent of these views. 28. See Carter. I'erry, :,.inJSteinhruner, A N e u ~Concept of (:ooperatiue Security, pp. 24-.%I. 29. Koss, w h o IS s y ~ n p , ~ t h c t it co cooper:ltive security, emphasizes rhis point. 30. Carter, I'erry, a n d Sreunbruner, A New Conrrpt of Coopcratrue Srcurity, pp. 8 a n d 9. 31. Srrohe 'Ihlhott, "Why N A T O Should Grow," NEIL'York R ~ I W UofI B o o k s , VoI. 42, No. 1 3 (August1 0, 1 YYS), p. 28: "Enlargement of NAT'O would he a force for the rule of l:~wboth within Europe's new democracies a n d a m o n g them. ... An exp,ulded N A T O is likely t o extend the area in w h ~ c hconflicts l ~ k ethe o n e in the Balkans s ~ m p l yd o not happen." T h e admini\tration's case for expansion incorporates the loge o t cont,linmcnr as well a s that o f cooperative security. As T ~ l b o put t IT,"among the contingenc~esfor which N A T O must he prepared is that Russia will a b a n d o n tlemocracy and return t o the threatening patterns of international behavior that have solnetlnies characrer~zedits history" ip. 2 9 ) . See also Ronald Asmus, Richard Kugler, a n d Stephen 1 arrahee. " N A T O F.xp,insion: T h e Next Steps," Sztruiu~rl.Vol. 37, No. 1 (Spring 1995), p. 9; and the \ysternatic crit~qlieottered by Michael E. Brown. "The Flawed I.ogic o t N A T O E x p n n s ~ o n , "Sr~rvi~wl, Vol. 37, No. I ( S p r ~ n g1995), pp. 38-39. 32. Coniin~ssiono n A m e r ~ c and , ~ the New World, C h ~ n g r Ortr q Ways: A~nericaand the Ncw World (Washington, D.C.: Carnegie Endowment for Intermtional Peace, 1992), pp. 73-75. 33. Advocates seldom n u k e rhis point explicitly, hut a similar point is made by Carter, I'erry, a n d Sreinhruner in A Nrru Concept of Cooperiltiur Serrtrity, p. 5 1 : "many countries that feel threatened hy an intrusive reconnaissance strike c a p a h l i t y they cannot match c ~ r al s p r e t o chemical agents as a strategic c o u n t e r w e ~ g l ~ . " 34. "The Commissior believes that the use of military torce t o prevent nuclear proliferatlon must he retained a s a n option of last resort." C;omm~ssiono n America a n d the New World, Changlng Our Wrrys, p. 75. 35. See Gareth Evans, "<:ooperative Security and Intrastate Confl~ct,"Forcrgrz Polrcy, No. 9 6 (Fa11 1991), pp. 3-20. Comment\ hy coopcrative securlty advocates o n the war in Yugoslavia reveal a btrong desire tor some cooperative security organization t o intervene nlilitarily. See Forsherg, "Crellting a Cooperative Security System," p. 3; a n d lonarhan Dean, "Moving Toward a Less Violent World -Test Case, Europe," Boston Relicw, Vol. 17, No. 6 (November1L)ecemher 1992), p. 7. 36. Cornrni\sion o n America a n d the New World, Chiinsing Ortr Ways, p. 51: "The United States should he more act~velyengaged in strengthening the collectwe machinery t o carry O L I ~ humanitarian ,ictlons. In t h ~ swav w e can reduce the likelihood of havina t o choose between unilateral military intervent~onand standmg idle in the face ot human tragedy."
336
Widening Security
37. William J. Perry, "Military Action: When to Use It and How to Ensure Its Effectiveness," in Nolan, Global Engagement, p. 235. 38. See William W. Kaufmann and John Steinbruner, Decisions for Defense (Washington, D.C.: Brookings Institution, 1991), pp. 67-76, which offers a cooperative security force structure that would cost roughly $150 billion (1992 dollars, excluding Department of Energy expenses on nuclear weaponry) annually by the end of the century. Their recommended force structure is quite similar to Aspin's "Force A," Table 2. The authors seem to argue that the adequacy of such a force structure would depend on a series of prior diplomatic developments in the world that would, for all intents and purposes, put a functioning cooperative security regime in place. Jerome B. Wiesner, Philip Morrison, and Kosta Tsipis, "Ending Overkill," Bulletin of the Atomic Scientists, Vol. 49, No. 2 (March 1993), pp. 12-23, offer a force structure, costing $115 billion per year, which they seem to believe is consistent with a collective security strategy. Though small, the air and naval forces they recommend are quite capable; the Army they recommend, however, with a total active personnel strength of 180,000, would barely be adequate for a repetition of Operation Desert ShieldIDesert Storm. It is difficult to see how it could support a collective security strategy. More recently, Michael 0' Hanlon, Defense Plannmg For the Late 1990s: Beyond the Desert Storm Framework (Washington, D.C.: Brookings Institution, 1995), pp. 3 2 4 0 , has proposed a force structure estimated to cost about $20 billion a year less than the Bottom-Up Review force. 39. Laying out the realist theoretical argument for why coalitions need leaders, and why leaders are defined by great power, is Josef Joffe, "Collective Security and the Future of Europe: Failed Dreams and Dead Ends," Survival, Vol. 34, No. 1 (Spring 1992), pp. 4 0 4 3 . 40. See Richard K. Betts, "Systems for Peace or Causes of War? Collective Security, Arms Control, and the New Europe," International Security, Vol. 17, No. 1 (Summer 1992), pp. 5-43; Joffe, "Collective Security and the Future of Europe"; and John J. Mearsheimer, "The False Promise of International Institutions," International Security, Vol. 19, No. 3 (Winter 1994/95), pp. 5-49. 41. This is the maximal realism of hegemonic stability theory. See Robert Gilpin, War and Change in World Politics (Cambridge, U.K.: Cambridge University Press, 1981). 42. See Dick Cheney, "Active Leadership? You Better Believe It," New York Times, March 15, 1992, Section 4, p. 17. The draft DPG is placed in the larger contexts of the Bush administration's national security policy and strategy, and a discussion of primacy in U.S. policy and strategy by David Callahan, Between Two Worlds: Realism, Idealism, and American Foreign Policy After the Cold War (New York: HarperCollins, 1994). 43. "Excerpts from Pentagon's Plan: 'Prevent the Emergence of a New Rival'," New York Times, March 8, 1992, p. 14. 44. The notion that U.S. hegemony is benevolent and perceived as such by others is evident also in William Kristol and Robert Kagan, "Toward a Neo-Reaganite Foreign Policy," Foreign Affairs, Vol. 75, No. 4 (JulyIAugust 1996), pp. 18-32; and Joshua Muravchik, The Imperative of American Leadership: A Challenge to Neo-isolationism (Washington, D.C.: AEI Press, 1996). 45. "Excerpts from Pentagon's Plan: 'Prevent the Emergence of a New Rival'." 46. The Assistant Under Secretary of Defense for Policy Planning when the draft DPG was prepared, Zalmay Khalilzad, has suggested that "the United States would not want Germany and Japan to be able to conduct expeditionary wars." Khalilzad, "Losing the Moment? The United States and the World After the Cold War," Washington Quarterly, Vol. 18, No. 2 (Spring 1995), p. 105. 47. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 22. 48. Ibid., p. 20. 49. Muravchik, The Imperative of American Leadership, pp. 32-33. 50. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 21. The term "soft power" is associated with Joseph Nye, Dean of the Kennedy School of Government and former Assistant Secretary of Defense for International Security Affairs. He and former Vice Chairman of the Joint Chiefs of Staff William A. Owens develop the notion of U.S. dominance in these new tools of power in Nye and Owens, "America's Information Edge," Foreign Affairs, Vol. 75, No. 2 (March/Aprill996), pp. 20-36.
i
,i
1
.<
Competing Visions for U.S. Grand Strategy
337
51. According t o M u r a v c h ~ k ,T / J ~Inzperatiwe of Ainerrcarr l.eadership, p. 36: "We c a n afford whatever foreign policy we need o r choose. We are the richest country in the world, the richest country the world has ever k n o w n . And w e are r ~ c h e rtoday than we have ever heen before. We coniniand n o t fewer but more resources than ever." 1le calls for spending .5 percent of G1>1' o n w h a t Ire calls foretan policy ("defense, toreign aid, ,lnd everything else"); p. 44. 5 2 . Kristol 2nd Kagan, "Toward a Neo-Reaganite F o r e ~ g nI'olicy," pp. 26-27, 30-32; 'ind Muravchik, T/JC Inzperutil~eof American Leadership, pp. 36-50, Muravchik argues both t h a t the 1in;teJ St.lrc5 .lll<x:xtc\ t c x , tru rrs<,urces t c , thc m i l ~ r a r ).und t c , foreign aid to support .I str.iregy of p r l n u c ) . ~ n dthat it requires a halanced budget. H e suggests that t o remed) these deficienc~esthe U.S. s h o ~ ~ solve l d the problem of rising medical costs a n d soci,il security sol\.enc): a n d a d d revenues, ,ind In lust t w o pages, he explains h o w ipp. 42-43). 53. As the Cold War drew t o 1' close, some saw a n economlc challenge troni Japan a\ the princip,ll threat t o U.S. pri~nacy.See, e.g., Samuel 1'. Huntington, "America's Ch,lnglng Strategic Interests," Sz~rwild,Vol. 33, No. I (~anuary/February199 1 ). 13. 10; Hunttngton, "The Economic Renewal of A ~ n e r ~ c a ,Nntioizi71 " Itrtrrest. No. 27, Spring 1992, p. 15; a n d Huntington, "V[%y Inrern,ltion,~l I'rimacy Matters," Iitrert~atronalSecurity, Vol. 1 -, No. 4 (Spring 1993), pp. 7 1-8 1 . Huntington's concet-n about U.S. economlc strength and h o w it might be preserved a n d strengthencd ,ire echoed in Zalni,~);Klralil~,ld,"1.os1ng the Moment?" pp. 103-104. 5 4 . Z h t g n ~ e wHrzezinsk~. "The I'remature Partnership," Fowrgn Affairs, Vol. 73, N o . 2 (M,lrch/April1994), p. 76. Oddly, though he presents many o t the same Jrgurnents for N A T O c x p ~ n s ~ oinn a suh\equent .irticle, tic is somewhat less alarmist there ahour the extent of the current danger enian,iring from Rus\ia. See Zhigniew Ie~nocr,lt~c Inst~rutionsProject ( C a ~ n h r ~ d g e , M ~ s s . John : E Kennedy School of ( h v e r n m e n t , Harv'ird IJn~vers~ty, January 1994). 58. R r z e z ~ n s k "The ~, Prem,lturr Partnership," pp. 71-75. c ~ l l this s "the iniperul impulse." See ~ l s oB r z e ~ ~ n s kO~u.t of ( h t r o l : (;lobirl Trlrnrod o n the, t.c~i7of the T u ~ n t y - k r r s t(:e?rtcrry ( N e w York: Coll~el; 1993), pp. 17.3-1 8 1. 59. Brzerinski, "The I'remnture I'artnership," pp. 79-87. I tc urges "political assurances tor Ukraine's ~ndependencca n d terr~rorlalintegrity"; "'1 more visible Amerrcan s h o w of interest In the ~ndependence o f the Central A s u n st,lre~. as \\ell as of the three states in the C:aucasus"; a n d "some quiet Amer~can-Chinesep o l ~ t ~ c nc ol n \ ~ ~ l r a t ~ oregarding ns the area." 6 0 . Rrzezinski, O u t of (l~trtr01,pp. 163-166. 6 I. K~ssingcr,"kxpand N A T O Now." 62. Krze711rski,"Premarure I'artner\h~p," pp. 8 1-82; K ~ i s ~ n g e"Expand r, N A T O Now." 63. Ihid.; and Z h ~ g n i e wKrref~nski,"A Bigger - and S,~tcr- Europe," Nczo York Titrrcs, December 1, 1993, p. A23. 64. The Congress~on,ll Budget O t f ~ c has e e s t ~ m a t e dt h ~ NA'I t 0 expansion would cost from $ 6 I billion t o $12.5 billion over the y e x s 1996-20 10. See C o n g r e s s i o n ~ lBudget Office, C B O Papers, "I he Costs of Expanding the N A T O Alliance" (KJC~shirigton. I>.(:.: (:ongre\sioncd Budget Cltticc, M.irch 1996). 6.5. Asrnus, Kugler, and I.arrahee, " N A T O F.xpansion," p. 12. 66. Konald Asnlus, Rich.ird Kugler, a n d Stephen Larrabee, "Building a New NATO," hrc,rgiz Affurrs, Vol. 72, No. 4 (Septemher/Ocroher 1993). p. 3 4 : "While Germany remains preoccupied with the staggering challenge ot the politicnl a n d economic reconstruction o f its Eastern half, the need t o s r a h ~ l ~ Its r e eastern flank is Bonn's number o n e securlty concern." See also Brzez~nski,"A Plan for t'urope," p. 42: "Most important, a united a n d powerful Gcrnrany can he more firml) m c h o r e d within this larger Europe if the t.uropean security sy\tern fully c o ~ n c i d ew ~ t hAmerica's."
338
Widening Security
67. Khalilzad, an ardent proponent o f primacy, has written that China "is the most likely candidate for global rival." Zalmay Khalilzad, From Containment to Global Leadership? America and the World After the Cold War (Santa Monica, Calif.: RAND, 1995),p. 30. 68. Karen Elliott House, "The Second Cold War," Wall Street Journal, February 17, 1994. She alludes to "the looming threat o f a militarizing, autocratic China" and observes that "a resurgent China flexes its muscles at increasingly fearful neighbors." 69. Thomas L. Friedman, "Dust O f fthe SEAT0 Charter," New York Times, June 28, 1995, p. A19. 70. "Containing China," Economist, July 29, 1995, pp. 11 and 12. 71. See, for instance, Muravchik, The Imperative of American Leadership, pp. 71-82. 72. Charles Krauthammer, "The Unipolar Moment," Foreign Affairs, Vol. 70, No. 1 (1991), pp. 31-32. In previous versions o f this essay we classified Krauthammer as a "cooperative security" advocate, but his em~hasison the dominant role o f the U.S. warrants his inclusion here. 73. At least one advocate o f primacy, however, sees the United States as having been, from the start, insufficientlyactive in Bosnia. See Muravchik, The lmperative of American Leadership, pp. 85-131. 74. Callahan, Between Two Worlds, p. 135. 75. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 26. Similarly, Muravchik, The lmperative of American Leadership, p. 138, calls for defense spending that would be "somewhere around 4 percent o f GDP." Khalilzad, "Losing the Moment," p. 102, offersa less ambiguous, and less demanding, multipower standard than do Kristol and Kagan. He proposes that U.S. forces be able to defeat simultaneously "the two next most powerful military forces in the world that are not allied with the United States." 76. O n these issues see Khalilzad, "Losing the Moment?" pp. 104-105; and Muravchik, The Imperative of American Leadership, pp. 152-170. 77. Huntington, "Why International Primacy Matters," p. 70. Huntington more specifically argues that "power enables an actor to shape his environment so as to reflect his interests. In particular it enables a state to protect its security and prevent, deflect, or defeat threats to that security. It also enables a state to promote its values among other peoples and to shape the international environment so as to reflect its values"; pp. 69-70. 78. Muravchik, The Imperative of American Leadership, p. 32: "America is even more powerful today than it was in the immediate aftermath o f World War 11, although that moment is cited by many heralds o f American decline as the apogee o f American power." 79. See Christopher Layne and Benjamin Schwarz, "American Hegemony - Without an Enemy," Foreign Policy, No. 92 (Fall 1993), pp. 5-23; and Benjamin Schwarz, "Why America Thinks It Has to Run the World," Atlantic Monthly, June 1996, pp. 92-102. Layne and Schwarz draw heavily on Melvyn P. Leffler,A Preponderance of Power: National Security, the Truman Administration, and the Cold War (Stanford,Calif.:Stanford University Press, 1992). More extended critiques o f primacy are provided by Callahan, Between Two Worlds; Robert Jervis, "International Primacy: Is the Game Worth the Candle?" International Security, Vol. 17, No. 4 (Spring 1993),pp. 52-67; Layne, "The Unipolar Illusion"; and Nordlinger, Isolationism Reconfigured, pp. 134-141. 80. Prominent members o f the administration who were associated with the theoretical development o f cooperative security ideas include Ashton Carter, Morton Halperin, Catherine Kelleher, and William Perry; see works cited in footnote 25. John Deutsch participated in the development o f a similar approach to U.S. foreign policy; Commission on America and the New World, Changing Our Ways. 81. A National Security Strategy of Engagement and Enlargement. Since the administration's presentation o f its strategy has been more consistent than its actions, we focus here solely on the third version o f this Clinton White House document (February 1996). 82. U.S. leadership appears to be necessary in every class o f international problem; the word "leadership" appears four times on p. 2 alone. See A National Security Strategy of Engagement and Enlargement, p. 2. Military requirements are discussed on p. 14, where the language o f primacy also emerges: " A strategy for deterring and defeating aggression in more than one theater ensures we maintain the flexibility to meet unknown future threats, while our
1
1 I
-
Competing Visions for U.S. Grand Strategy
339
continued engagement represented hy that strategy helps prc~lzrdc~ such threats troni cleveloping in the first place" ( e ~ n p h , ~ s,idded). is 83. Ibid., pp. 3, 9-12, 21. 84. Ihid.. p. L7. 85. Ibid., p. I X. 86. Dick Kitschten, "Mixed Signals," Nntionul /ourmil, M J 27, ~ 199.5, pp. 1274-1177; see also Roherr Greenherger, "T1.1teline C;ipitol Hill: The New Majority'\ Foreign I'olicy," Fwcign Poliqi No. 101 (Winter 199F-961, pp. lS9-lh9. 87. Jeffrey Gartcn, "Is A m e r i u Abandoning M ~ l r i l ~ l t e r 'l'r,lde?" al Forergn Affi~irs.Vol. 74, No. 6 (NovemhrrIDecemher 1995), pp. 50-62. For the mosr pirr, economic tenriont did not directly affect the security relation\hip. b ~ former ~ t Amhassador t o J'lpan Michael H. Artnai-o\r suggests that "trade frictions generated mistrust and resentment that threatened to c o n t ~ n i i narc our security relritk)ns." r\rniaco\r, Frrends or K ~ c d s ?T / J ~Irrsrrier's > Arronnt of U . S . - / L ~ ~ L I ~ Relutions (New York: Columbia Un~versityPress, 1 996), p. 194. 88. Casimir Yo51 and Mary lmcke, "The Raid o n Aid," L'Iiirsh~n,ytorzPost, luly 78, 1996, p. (:I. 89. See Congression,il Budget Office, Redltcrng thca L)czfriit: Spending and Ke~wzrre O p r ~ o l ~(Washington, s D.C.: C B 0 , August 1996), Figure 3-1, p. 98; U.S. Arms Control , ~ n d Disarmament Agency, World M i l i t i q Expencfrtttrc~sm d Artns Trmzsfers, 199.7 ( W a \ h i n p r i , D.C.: U.S. GPO, 1996), F~gui-e4, p. 4. 90. See Bob Dole, "Shaping America's (;lobal Future," t o r e i p Polrcy, No. 98 (Sprmg 1995), pp. 29-4.3. One q ~ ~ o t ~reveals t ~ o ~much: i "From Bosnia t o China, from North Kore'i to Poland, our ,illies and our ,ldversaries doubt our roolbe ,und question our co~ntn~rment"; p. 3 1. See also "Remarks by Senate M ~ j o r i t y1.eader Dole, March 1 , 1995," F o r r i ~ nPolrcy Rrrlletrn. Vol. 5, No. 6 ( M ~ y i J u n e199.5), pp. 33-35; and B ~ k c r ,"Selective Engagement."
Imagined (Security) Communities: Cognitive Regions in International Relations Emanuel Adler
Marco Polo describes a bridge, stone by stone. 'But which is the stone that supports the bridge?' Kublai Khan asks. 'The bridge is not supported by one stone or another', Marco answers, 'but by the line of the arch that they form'. Kublai Khan remains silent, reflecting. Then he adds: 'Why do you speak to me of stones? It is only the arch that matters to me'. Polo answers: 'Without stones there is no arch'.]
A
renewed interest in the study of security communities calls for a careful examination of the relationship between changes in what John Ruggie labels 'social epistemes' -what people collectively know about themselves and others, or intersubjective images of reality - and the places and regions that people feel comfortable calling ' h ~ m e ' During .~ the last few centuries, 'home' - as far as political organisation, authority, and allegiance are concerned - has come to mean the nation-state. Benedict Anderson portrays national 'homes' as 'imagined communities', because 'the members of even the smallest nation will never know most of their fellow members, meet them, or even hear of them, yet in the minds of each lives the image of the c~mmunion'.~ As has been confirmed since the end of the Cold War, national 'imagined communities' are not about to disappear as the basic reality of international life any time soon. Nevertheless, secular changes in technology, economic relations, social epistemes, and institutions are causing globalising and localising pressures that are squeezing the nation-state from both above and below.4 As a consequence, people have begun to imagine new communities, or 'homes'. When it comes to their security and well-being, in some parts of Source: Millennium: Journal
appeared in Millennium.
of International Studies, 26(2) (1997):249-77. This article first
\iiii%iImagined (Security)Communities
341
the world, growing numbers of people have begun imagining that they share their destiny with people of other nations who share their values and expectations of proper behaviour in domestic and international political affairs. Forty years ago, Karl Deutsch developed the concept of 'pluralistic security communities'. In this article, I extend this concept by arguing that such communities are socially constructed 'cognitive regions' or 'community-regions' w h o s e people imagine that, with respect t o their o w n security a n d econornic
well-being, borders run, more or less, where shared understandings and common identities end. People who are territorially and politically organised into states, owe their allegiance t o states, and act on their behalf, will also take their identity cues from the community region as these communities become more tightly integrated. Further, liberal community-regions, in particular, are more prone to turn into security communities b e c a ~ ~ s e of shared practical knowledge of peaceful couflict resolution and a propensity to develop strong civil societies and a transnational civic culture. Nevertheless, non-liberal community-regions may also become security communities since, as this article will argue, ( 1) the conditions for a community to develop are socially constructed - by the individuals and, more generally, the states that eventually form the community, as well as hy international organisations and, ( 2 ) since, international institutions can diffuse 'selected' liberal practices t o non-liberal regions. Finally, I argue that what binds pluralistic security communities into a unit is not principally 'feeling' (subjective emotion), but intersubjective knowledge and shared identity. Accordingly, since international and transnational institutions can help diffuse and internalise norms and knowledge about how to peacefully resolve conflicts - the norms and knowledge which form the basis of security communities - they can play a critical role in the social construction of these communities. Section 1 introduces the notio~lsof 'cognitive region' and 'communityregion'. Section 2 discusses and redefines Deutsch's concept of a security community as a special instance of a 'cognitive region'. Section 3 suggests a constructivist explanation for the relationship hetween pluralistic security communities and liberal ideas. The 4th Section discusses the relationship between knowledge, power, and community, t o elucidate how material and socio-cognitive factors combine t o set in motion the construction of security communities. Section S examines the role shared identities play in the evolution of pluralistic security communities, and it purports that sovereign states, in the process of becoming representatives of a security community, may ultimately redefine their interests and the meaning of sovereignty. Subsequently, I argue that the social construction of plz4ralistic security communities may depend on pre-existing security community-building institutions. By way of illustration, I show that the Organization for Security and Cooperation in Europe (OSCE),' although a creature of the Cold War, exhibits the attributes of an institution conducive to building. a .pluralistic security community. I end this article with some thoughts about the relevance of security communities for international relations theory.
342
Widening Security
Cognitive Regions 'Dirt, as Mary Douglas ... has noted, is matter out of p l a ~ e ' For . ~ traditional realist and neorealist accounts of international relations, everything that is outside the realm of territorially-based states and their 'co-actions' or relations is, in the sociological sense, 'dirt'. Hence, the conventional view in the International Relations (IR) discipline is that 'a state is a fixed territorial entity ... operating much the same over time and irrespective of its place within the global geopolitical order'.' This view lies at the root of the classic understanding of international relations. To begin with, the modern territorial sovereign state has rested on the principle of spatial exclusion, which entailed that '[ildentification of citizenship with residence in a particular territorial space became the central facet of political identity' - or, in Alexander Wendt's terms, of the corporate identity of the state.8 This principle meant that states became the primary vehicles for individual citizens to form societies and achieve human progress - that is, security, economic welfare, and justice. Politics, 'in the sense of the pursuit of justice and virtue, could exist only within territorial bo~ndaries'.~ By taking the state as an abstract individual unitary actor, endowed only with a corporate identity, and by artificially separating the domestic and international realms, realism lost sight of the social identities of states.1° I argue instead, from a constructivist perspective, that state social identities and interests are not fixed but evolve from the diffusion and convergence of causal and normative understandings across national boundaries, high levels of communication, economic interdependence, and cooperative practices. Furthermore, not only do identities and interests evolve, they also have the potential to converge." Moreover, as several authors point out, and as John Ruggie articulates, territoriality 'has become unbundled'.12 For example, international regimes and common markets occupy a 'nonterritorial functional space'.13 Epistemic communities, social movements, and issue-networks not only inhabit this space, but are actively involved in determining its boundaries. More importantly, state authority in the realms of security, economic welfare, and human justice (human rights) is increasingly being distributed across these international functional cognitive spaces.14 Ruggie is right to say that international society is anchored in this nonterritorial space,15 and societal relations regarding global issues, such as the environment, do take place in what Ronnie Lipschutz perceives as a primitive 'global civil society'.16 However, what some people are tenuously starting to perceive as 'home' and 'insideness'," is not the whole 'Planet Earth', but a transnational region where they imagine sharing a common destiny and identity.18 People who share ethnic or national identities and organise themselves into states imagine boundaries that separate 'us' from 'them'; as citizens occupying the space within state boundaries, they give expression to community life. When, however, for reasons referred to above, their self-identification
*I I t I
Imagined (Security) Communities
343
and loyalties begin to change, their identities will be directed to (and boundaries will be imagined to run between) ( a ) territorial regions or locales within states, ( b ) newly formed territorially-based (super) states, or (c) transnational nonterritorial regions constituted by peoples' shared values, norms, and practices. It is this last kind of imagined human con~munitythat has trail-blazing potential for international and transnational relations. It suggests an evolution towards socially constructed and spatially differentiated transnational community-regions which national, transnational, and international elites and institutions, sometimes under the leadership of outstanding individuals, help to constitute. Community-regions are regional systems of meanings (an interdependent group of meanings among individuals or collectivities), and are not limited to 3 specific geographic place." They are made up of people whose common identities and interests are constituted by shared understandings and normative principles other than territorial sovereignty and (a) who actively con~n~unicate and interact across state borders, ( b ) who are actively involved in the political life of an (international and transnational) region and engaged in the pursuit of regional purposes, and (c) who, as citizens of states, impel the constituent states of the community-region to act as agents of regional good, on the basis of regional systems of governance."' Within comn~unity-regions,people give their cultural allegiance to nations (here broadly referring to cultural community) and their political allegiance to states as political entities. At the same time, people institutionalise commonalities running through the whole region, including shared perceptions of external threats, and promote reciprocally non-threatening practices. Postwar Western Europe is the most advanced con~munity-regionso far. People of the 1.5 Western European states have started to organise themselves into, and to join in the practice of, a supranational system of rule, which Ruggie calls a 'multiperspectival polity'." However, only in a formal political union would people give political allegiance to a centralised regional government. For example, this would be the case if people in the countries of the European Union would give political allegiance primarily to Brussels. While community-regions possess a territorial dimension, they are not merely a physical place. Instead, we may view them as cognitive regio~zsor cognitive structures that help constitute the interests and practices of their members, whose meanings, understandings, and identities help keep the region 'in place'.'2 The social construction of a cognitive region out of intersubjective understandings, values, and norms enables people to achieve a community life that transcends the nation-state and indeed any territorial base. According to this interpretation, the United States and the European Union inhabit the same cognitive space." Australia and Canada are also part of this space. Tel Aviv is 'closer' to London and New York than it is to Riyadh or Amman, and closer to Warsaw than it is to Jericho (now under the Palestinian Authority). In special circumstances, and within the cognitive boundaries of the community-region, the people of these communities may acquire mutual
344
Widening Security
responsiveness, that is, they may gain the ability to more or less predict one .~~ another's behaviour and come to know each other as t r ~ s t w o r t h yWithin some community-regions, then, people, while organised into states may nevertheless be able to exploit this mutual trust to develop pluralistic systems of intra-regional governance that minimise or even eliminate the threat of war in that community-region. We may refer to such fortunate communityregions as 'security communities'.
Security Communities
In a pioneering 1957 study, Deutsch and his associates introduced the concept of security community, that is, a group of people who have become integrated to the point where there is a 'real assurance that the members of that community will not fight each other physically, but will settle their disputes in some other ~ a ~ ' . ~ ~ A c c o r to d i Deutsch, ng security communities may be either 'amalgamated' or 'pluralistic'. In an amalgamated community, two or more (sovereign) states formally merge into an expanded state. On the other hand, a pluralistic security community retains the legal independence of separate states but integrates them to the point that the units entertain 'dependable expectations of peaceful change'.26 A pluralistic security community develops when its members possess a compatibility of core values derived from common institutions and mutual responsiveness - a matter of mutual identity and loyalty, a sense of 'we-ness', or a 'we-feeling' among states.27 More recently, Michael Barnett and I have redefined the concept of pluralistic security communities as those 'transnational regions comprised of sovereign states whose people maintain dependable expectations of peaceful change'.28Furthermore, we used the following criteria for distinguishing between loosely and tightly coupled pluralistic security communities: the depth of trust between states, the nature and degree of institutionalisation of the governance system of the region, as well as whether states reside in formal anarchy or are on the verge of transforming it. A 'loosely coupled' pluralistic security community maintains the minimal definitional properties just mentioned. 'Tightly coupled' pluralistic security communities, on the other hand, possess a system of rule that lies somewhere between a sovereign state and a centralised regional government. This system is something of a post-sovereign system, comprised of common supranational, transnational, and national institutions, and some form of a collective security system.29 Deutsch, Barnett, and I agree that the existence of security communities does not mean that interest-based behaviour by states will end, that material factors will cease to shape interstate practices, and that security dilemmas will end. Nor do we argue that security communities transcend the mutual dependence between regional orderly security arrangements and stable economic transactions.
\iiliii
Imagined (Security)Communities
345
To date, according t o these criteria, there are only a few pluralistic security communities. These include the European Union, which is tightly coupled, and the Atlantic community, which is partly tightly coupled. Scandinavia as well as the United States and Canada also form security communities. In the future, perhaps, the states that comprise the North American Free Trade Agreement (NAFTA), and the incipient regional communities in South America and in Southeast Asia (revolving around the Association of South East Asian Nations (ASEAN))may hecome such communities. Given that we are discussing collective cognitive phenomena, there may be controversy about boundaries and membership. These controversies arise because states may be members of more than one community-region as a result either of their 'liminal' status (e.g., Turkey) or of concentric circles of identity."' For example, citizens in the states of the European Free Trade Association (EFTA) 'inhabit' a shared cognitive space with citizens of the European Union, who, in turn, share some core constitutive norms with citizens of Canada and the United States. All of these states together constitute the North Atlantic security community. Since the end of the Cold War, the states of Eastern Europe, including Kussia, have been knocking a t the doors of the institutions that symbolically and materially represent this North Atlantic community - the European Union, the North Atlantic Treaty Organization (NATO), the Council of Europe, and even the Western European Union (WEU). These countries are seeking an avenue through which they can exert an influence o n politics in the 'West', as well as reap the benefits of Western markets by becoming full members of a political community 'where the very fact of such membership empowers those included in it t o contribute to the shaping of a shared collective destin),'." From the perspective of the states already organised in this North Atlantic security community, however, new members can be admitted only after the 'applicants' have learned and internalised their norms. For the original members, 'it's not enough t o behave like us, you have t o be one of US'. The status of '~artnership',invented by the European Union, the Council of Europe, and NATO, intends t o provide a probationary status t o states that wish t o join the North Atlantic security community. Besides testing the intentions and institutions of applicant states, this probationary s t a t ~ is ~ sintended t o enable members of the security community to distinguish whether applicants are making instrumental choices or are adopting the shared identity." In addition, their partnership in common economic and security enterprises is meant t o play a major role in changing the identities of the applicants to make them 'more like us'. The OSCE has taken a different approach. Rather than waiting for 'the other' t o change its identity and interests before it can be admitted t o the security community-building institution, the OSCE has incorporated, from the outset, all states that express a political will t o live up to the standards and norms of the security community, hoping to transform their identities and interests. Thus, the OSCE is building security by means of inclusion rather than exclusion or conditional future inclusion. According t o Paul
346
Widening Security
Schroeder, since the end of World War 11, international order increasingly depends on 'associations' based on a normative consensus that 'certain kinds of international conduct ... had to be ruled out as incompatible with [states] general security and welfare', and on the power of these associations to offer and deny ' m e m b e r ~ h i p ' . ~ ~
Liberal Pluralistic Security Communities In principle, we could conceive of community-regions that might be constituted around (to give an extreme example) fascist or Nazi ideologies. However, such communities are likely never to become security communities. In communities where ideologies consecrate state goals and condone every possible means that can lead to the achievement of these goals, individuals and states know that one day their fellow community members might stab them in the back, just as they themselves, given the chance, would do. Thus, the mere fact that people in different territorial spaces share knowledge does not lead them to feel safe from organised violence. In other words, while people within totalitarian communities may achieve shared understandings, they are most unlikely to develop mutual The quality of the relationship between people is crucial. Accordingly, security communities are socially constructed and rest on shared practical knowledge of the peaceful resolution of conflict^.^^ Moreover, security communities are socially constructed because shared meanings, constituted by interaction, engender collective identities? They are dependent on communication, discourse, and interpretation, as well as on material environments. Practical shared knowledge of the peaceful resolution of conflicts goes a long way in explaining why the majority of existing security communities developed out of liberal community-regions. This knowledge, however, characterises only parts of the world, is associated to collective historical experiences, and is related to British hegemony in the nineteenth century and American hegemony in the twentieth century, which helped diffuse and institutionalise liberal values.37 Practical liberal knowledge of the peaceful resolution of disputes is not just institutionalised in the memories of elites, but it is also being continually reconstituted through the dense networks of relationships among civil societies and their members. This knowledge becomes an identity marker that helps to create the boundaries between 'us' and 'them'. In other words, liberal community-regions become security communities because of intersubjective understandings among people, their shared sense of identity, and their common notion that they inhabit a non-territorial region, or space, where, being at home, they can feel safe.38Accordingly, in theory, it is possible to identify a liberal community-region without it being a security community, but it is very likely to become a security community. However, since security communities are socially constructed, non-liberal community regions may develop into security communities. First, liberal
I
Imagined (Security)Communities
347
international institutions may socialise non-liberal states into adopting and institutionalising 'selected' liheral practices. Second, non-liberal ideologies for example, a shared ideology of development perhaps similar to that pursued by Southeast Asian states - may promote a joint project characterised by increasing interdependence and the development of common institutions. Such a project might conceivably promote collective purposes around which emerge a shared identity and, thereafter, dcpcndablc expectations of peaceful change.'" However, liberal and non-liberal community-regions cannot become security communities ~mlesstheir shared knowledge of the peaceful settlement of disputes is institutionalised in some kind of rule of law o r regulation structure that generates trust - 'the expectation that another's hehaviour will he predictably friendly'.4" In liberal dctnocracics, for cxample, this practical intersubjective knowledge is part of a 'civic culture','" whose concepts of role of government, legitimacy, duties of citizenship, and the rule of law constitute the identities of individual^.^' The behaviour of member-states in a pluralistic security coninlunity reproduces this civic culture, which, in turn, constructs a comrnunityregion civic culture. This culture further helps t o constitute the identities and interests of the individuals, elites, and organisations whose interactions form the community. Unstable democracies and non-democracies are characterised by an absence of these shared understandings." In a liberal community-region, people learn the practices m d heliaviour that differentiate aggressive states from peaceful states. In other words, each side develops a common knowledge of 'the other's dovish~less'." r11 this sense, the democratic nature of a state becomes an indicator of its 'dovisl~ness'.~'It follows that the process of socialisation and social integration that enters into the building of a security community provides policy-makers, in Harvey Starr's words: w ~ t hoverwhelm~ilg~ n f o r m a t ~ ownh ~ c hallow\ them to have full confidence In how they separate states. Those state5 w ~ t hwhom they form a securlty communltp 1 ~ 1 twhom h they begm t o share a common ~ d e n t ~1t p are doves, averse to the use of force. All the members of the securlty conimunlty have learned t h ~ P Furthermore, liheral denlocracies and their civic cultures encourage the crcation of strong civil societies - and of transnational networks and processes that promote community bonds and a coninion identity through the relatively free interpenetration of societies, particularly with regard to the movement and exchange o f people, goods, and ideas.-'- For example, strong civil societies greatly facilitate the spread and strengthening of practices that promote human rights and environmental protection." These, in turn, help produce and reinforce community bonds and common identity.-'%oreover, social networks constituted around liberal norms facilitate the transfer of democratic norms and practices t o societies that lack them."' I believe that a socially constructed civic culture may help to explain, more than anything else, the findings of studies that deal with the last two centuries of warfare,
348
Widening Security
which have more or less conclusively shown that democracies do not fight each other and create among themselves a 'separate peace'.jl Flows of private transactions in conjunction with transnational institutions (such as epistemic communities and non-governmental organisations (NGOs))and community law (such as European Union law) can play important roles in transmitting and diffusing shared normative and causal beliefs of a civic culture (beliefs or knowledge about, e.g., that CFCs cause depletion of the ozone layer and, therefore, that the use of them should be regulated). International institutions - which provide a forum in which state and non-state representatives debate and bargain about their understandings and interests, and in which ideas flow back and forth between the domestic and international arenas - can play similar, if not, indeed, more important roles than civic cultures.j2
Knowledge, Power, and Community
Power plays a crucial role in the development and institutionalisation of security communities, a fact that Deutsch did not overlook. According to Deutsch, 'larger, stronger, more politically, administratively, economically, and educationally advanced political units [are] the "cores of strength" around which in most cases the integrative process de~eloped'.~"or decades, realist scholars have defined power exclusively in terms of material capabilities.j4 Steve Lukes' analysis which divided power into three dimensions - sheer power, power to set agendas, and ideological, Gramscian-type power - went a long way to problematise power and make the concept more amenable to a constructivist project.j5 However, we have neglected the power of norms and rules to frame and redefine reality and thereby determine the range and value of political choices.j6 While I do not entirely disregard the presence of Lukes' three dimensions of power in the social construction of cognitive regions, power can also be understood as the authority to determine the shared meanings that embody the identities, interests, and practices of states, as well as the conditions that confer, defer, or deny access to 'goods' and benefits. Since social reality is a result of imposing meanings and functions on physical objects that do not already have those meanings and functi~ns,~'the ability to create the underlying rules of the game, to define what constitutes acceptable play, and to get other players to commit themselves to those rules, because these rules are now part of the self-understandings of the players, is, perhaps, the most subtle and most effective form of power.FXThis means that there is a very strong relationship between knowledge and power. Knowledge is rarely valueneutral, but frequently enters into the creation and reproduction of a particular social order that benefits some at the expense of others. In this reading, power is primarily the institutional power to include and exclude, to legitimise and authorise." Also, in this sense, international organisations are related to power, because they can be sites of identity and interest formation,
I
:r
Imagined (Security)Communities
349
and because states and sometimes individuals and other social actors can draw on their material and synlbolic resource^.^" It is important to keep in mind, however, that if (as I argue) social reality is a result of imposing meanings and functions on physical reality, then material and technological (economic and strategic) resources are also needed to get some actors to accept or internalise the sets of meanings and rules of other actors. N o t o n l y d o matcrial resources facilitate the reproduction of institutional activities,"' they may also provide incentives for outside members to choose an identity. As I h v i d Laitin holds, the choice o f an identity 'is often guided by instrumental reasoning, based on the potential resources available for identifying yourself'.i" Furthermore, recent technological developments actually contribute to the construction of security communities, making possible interactions between agents 'who are not physically co-present' and turning national communities into transnational 'imagined security communities'." Technology (e.g., the Internet) and economic interdependence (e.g., trade, finance, and aid) may also contribute to the thickening of social relations between domestic civil societies. For instance, they facilitate the work of environmental and humanrights movements and NGOs that diffuse understandings from country to country, and help in the creation of a regional civil society. Material structures, such as economic well-being and technological advances, also empower communities since they elicit the formulation of images of political, economic, and social domestic organisation that come to be associated with the material progress of the comn~unity.These images, of, for example, democracy and a market economy, are coupled with normative understandings that define legitimate regional behaviour and create the basis for the development of the shared civic culture o n which a pluralistic security community is based. Economically and technologically weak states, thus, associate positive images of material progress with 'successful' or states or regions, such as the European U n i ~ n . " ~ [Plower can he a magnet; In a communlty tormed around a group of strong powers, weaker members wdl expect to share the securlty and (potent~ally)other benet~tc~ s o c ~ a t ewd~ t hthe stronger ones. Thus, those states that helong to the core of strength do not create securlty, per se; rather, because of therr posltlve Image, securlty comrnunltles develop around them. T h ~ s1s clearly the c x e of Europe, where the former Commurust m t e s , rdther than b e ~ n g~ n v ~ t eto d form part of the securlty communlty, ~ssuedt h e ~ rown m v ~ t a t ~ c m s . ~ ' Thus, provided that domestic political resistance against the idea of community is overcome, successful or strong states may empower this idea with the material and normative resources that are necessary to realise shared purposes and interests. In this way, power provides practical meaning to regional governance systems, that is, to the shared values, expectations, and practices of member states.""
350
Widening Security
Although the above interpretation of power may be amenable to a Gramscian explanation, there is, nevertheless, a subtle but still significant difference between the concept of Gramscian hegemony and that of security communities." First, although cultural hegemony may be exerted without the existence of a shared identity, the latter is a necessary condition for a pluralistic security community. When Eastern European states attempt to become part of the institutions and organisations of Western Europe, not only are they not being coerced or lured by Western states, but they also express their identity-affinities with them. Second, whereas Gramscian hegemony is based on a thin concept of society, class domination, and on the language of cultural dominance, and does not require direct interaction for its existence, pluralistic security communities are endowed with a thick concept of society, shared identifications, many-sided and direct or indirect interactions, and the language of community ('we' and 'they'). In the case of Gramscian hegemony, the disregard of norms may result in material or political sanctions. In the case of pluralistic security communities, however, states that disregard norms may undermine their self identity and sense of belonging to the community.68
The Social Construction of Pluralistic Security Communities Common ldentity a n d t h e Construction of Cognitive Structures
Communities exist on the basis of commitments, duties, and obligations, and, more generally, on expectations held collectively by the group.6y To grasp the process by which mutual responsiveness develops in pluralistic security communities, we must understand community not as a matter of feelings, emotions, and affection, but as a cognitive process through which common identities are created.'O In other words, the sense of 'we-ness', of belongingness, which indicates that we are dealing with a community, does not arise from 'social cohesion' or mutual a t t r a ~ t i o n . ~On ' the contrary, the 'first question determining group-belongingness is not "Do I like these other individuals?", but "Who am I?" What matters is how we perceive and define ourselves and not how we feel about others'.72 In this sense, a social category, such as being a democrat, defines persons 'by systematically including them with some, and excluding them from other related categories. They state at the same time what a person is and is not'.73 Following this line of thought, when a state assumes a particular social identity - for example, democratic, law-abiding, respectful of human-rights people in this state will be able not only to answer, in part, the question 'who am I?' but also to guess or know the identities of individuals from other similar states. This knowledge does not merely constrain the state. In a positive sense, it empowers it to act in the world and contributes to the
Imagined (Security)Communities
35 1
development of mutual respons~veness.In t h ~ scase, mutual responsibenes develops more trom h o w ~ n g'who I am' and 'who the other IS' t h a i from some mutu,ll 'feelmg' that people In 'Western-style' democracies m,Iv have towards one other. There IS m u ~ hev~denceIn the soc~alpsycholog\ literature that coopermve behavmur between ~ n d ~ v ~ d uisa lmed~ated s by the perception of membersh~p m ,I c o m m o n ~ a t e ~ o r )A. -d ~ c l ~ t ~ o n a lwl ~l t, h ~ nLomlnunlties we help others, apparently seltlessly, bec'1use we percelve t h e ~ rneeds , ~ n d goal5 as those of our soc~alcategory and hence '15 our very own. Soc~al categorizations w h ~ c hextend self-def~n~t~oii he\ond the ~ n d ~ v ~ d perual son prov~dea s ~ m p l em d elegant mechan~smfor hypassmg the supposed 'egot~sm'of human beings.-'
To sum up this discussion about common identity, when people define their state as belonging to a group of states - 'the den~ocracies',for example - they internalise certain norms that go with that self-definition. Certain behaviours such as concern for human rights - become appropriate, while others - such as torture - become inappropriate or illegitimate. Henceforth, the state follows democratic norms not just because its people believe in democracy, but because the category 'democratic state' now defines, in part, their identity. The key point to remember, when we seek to explain peaceful change, is that the identity factor allows peoples from different states to know each other better. This reduces the uncertainty spawned by the anarchic nature of the international system and increases mutual responsiveness. The corollary to this argument is that when it comes to democratic norms, states not only can know each other better, but they can know each other as states that tend to soll~ctheir inter~laliznd external problems hy pcizrefid n~eans. Is there something in the national identities of peoples that hinders the evolution fro111states to security communities? Social psychology and studies of nationalism do not deny this possibility. Indeed, the notion of concentric circles of allegiance stands on firm empirical '[Hlowever dominant the nation and its national identification, human beings retain a multiplicity of allegiances in the contemporary world.. .. Under normal circumstances, most human beings can live happily with multiple identifications and enjoy moving between them as the situation requires'.-The notion of concentric circles of identity fits well with the argument that while 'nations are not "transient phenomena" ',-%other and broader regional communities o f common identity may develop. For example, events in Western Europe show that, n o t w i t h s t a n d i ~ lthe ~ fact that new and more encompassing identities are developing (such as a European identity), national identities remain strong. Barry Buzan underscores this point when, borrowing from Ferdinand Tiinnies, he describes two processes for the development of international societies - Gcmeinschaft, in which international society develops from a common
352
Widening Security
culture, and Gesellschaft, which takes international society as created by a contractual act of ~ o l i t i o n . ' Buzan ~ rightly points out that while Gemeinschaft is too 'civilisational' to act in the short run, Gesellschaft omits the notion of common identity. 'The development of common norms, rules, and institutions', Buzan notes, 'must eventually generate, as well as be generated by, a common identity'.80 He adds, however, that people are quite capable of holding several identities in parallel. 'One can, for example, be English, British, European, and Western all at the same time'.81 Pluralistic Security Communities a n d t h e 'Agent S t a t e '
When pluralistic security communities, such as the European Union, become tightly coupled, can sovereignty still remain the constituting and legitimating principle that 'differentiates units in terms of juridically mutually exclusive and morally self-entailed domains?'82 Do states still have the same authority over their own territory? Outside the European Union, the intersubjective understanding on which sovereignty is based gives countries almost unlimited authority to treat their own citizens as they deem necessary and to act in the international system as independent units, waging war or making peace when required.83 Within the European Union, too, political authority remains essentially in the hands of the state. States are still free to act in the world - but as agents rather than solely as sovereign states. In other words, states also act as the local agents of a regional Thus, within tightly coupled security communities, authority and legitimacy - the conditions under which states view each other as part of the community and give each other certain rights, obligations, and duties - are contingent on their ability to abide by the cognitive normative structure of the cognitive region. My reasoning here is structurationist: cognitive structures like games whose constitutive rules give meaning to the moves - constitute identities, interests, and behaviour, but are, in turn, also constituted by them. Thus, agents (states, or more accurately individuals acting on behalf of states) and structures (pluralistic security communities) socially co-construct one another.85 This means that states can express their agency insofar as they meet and reproduce the epistemic and normative expectations of the community. States remain 'free agents', acting on the basis of their own preferences, as long as these preferences are cognitively framed by the shared understandings of the community. In the European Union, the thirteen judges of the European Court of Justice (ECJ) 'quietly working in Luxembourg, managed to transform the Treaty of Rome ... into a constitution. They thereby laid the legal foundation for an integrated European economy and polity'.86 In less developed or even incipient pluralistic security communities, however, liberal democratic norms need not necessarily be converted into a formal legal framework of obligations. Instead, they may bind its members politically, when, in the wake of the concerted or coordinated political decisions of the agent-states,
\
+
I
Imagined (Security)Communities
353
these norms become a matter of practice and public policy in each memberstate and thus, de facto, a system of regional g o v e r n a n ~ e . ~ ' This conceptual framework makes it easier to understand why people acting on behalf of their states can nevertheless decide to identify their security with that of other states. According to the classical intersubjective understanding of sovereignty, states defend their 'local' points of view, ~n security cornrnunitics, howinterpretations, and ~ l o r m s . ~ Vpluralistic ever, states come to defend a regional point of view - where 'regional' is defined in cognitive terms." People may still be able to imagine themselves as belonging to cultural-national communities, organised as states endowed with agency. However, people, as memhers of security communities, also imagine that, with regard t o their security and economic wellbeing, borders run more or less where shared understandings and common identities end. Within tightly coupled security communities, then, states perceive insecurity not only when their authority is challenged or their existence is endangered, but also when the basic understandings that constitute the community are threatened."' (In turn, this may threaten the shared knowledge of the peaceful resolution of conflict.) Again, the European Union clearly exemplifies this notion. The 'constitutive processes whereby each of the twelve [now fifteen] defines its own identity ... increasingly endogenize the existence of the other eleven. Within this framework, European leaders may be thought of as entrepreneurs of alternative political identities'.')' Ruggie's claim, however, raises an ontological problem in addition to a theoretical one. If, in tightly coupled security communities, the community is the structure and its fifteen members are agent statcs, why d o we say that leaders or institutions, too, may be agents in the community region? The answer is that, although leaders and institutions rely on a territorial base and are empowered by states, their identity, roles, and interests are increasingly being shaped by the cognitive community rather than by the particular states.": Thus, in principle, state agency (which people and their political elites reproduce) represents the interests, not just of states, but also, and at t y agent states. the same time, of the c o n ~ n ~ u n i of A crucial question arises now. Can the concept of citizen be carried over from the agent state to the pluralistic security community? Can people fall within the jurisdiction of several authorities, have multiple identities, and possess rights of participation in supranational structures, and thus, be citizens both of their own state and the security community?" In principle, if people are engaged in the political life of their state and their security community, the answer is 'yes'. 'Citizenship', as Dennis F. Thompson writes, is not meant to suggest merely those rights possessed by a passive subject by virtue of residing under a particular territorial jurisdiction. Nor is it meant mainly to connote patriotism or loyalty to a nation-state. 'Citizenship' ... refers to the present and future capacity for influencing politics. It implies active involvement in political life."4
354
Widening Security
Institutions, Legitimacy, and Identity: The Pluralistic Security Community-Building Mission of the OSCE In the last 50 years, a new type of institution - a security community-building ity institution - made its appearance on the world s ~ e n e . ~ ~ e c u rcommunitybuilding institutions are innovators, in the sense of creating the evaluative, normative, and sometimes even causal frames of reference. This type of institution may also play a critical role in the diffusion and institutionalisation of values, norms, and shared understandings. Finally, by establishing norms of behaviour, monitoring mechanisms, and sanctions to enforce those norms, all of which encourage, and also depend on, mutual responsiveness and trust, security community-building institutions may help shape the practices of states that make possible the emergence of security communities. The OSCE provides a clear illustration of a security community-building institution. Being a pan-European security organisation that spans three continents, from Vancouver to Vladivostok, the OSCE encourages the elites and peoples of its 55 member states to imagine that they inhabit a shared cognitive region, increasingly being referred to as 'the OSCE region'. Thus, regardless of its accomplishments, or lack thereof, we cannot understand what the OSCE is or is trying to do unless we embed this understanding in the concept of pluralistic security communities. The CSCE, also known as the 'Helsinki Process', was constituted in August 1975 by the Helsinki Final Act, which 35 countries signed, including Canada, the United States, and all European states (as well as the Soviet Union) except Albania. This act - supplemented over years by a series of follow-up conferences, such as Belgrade (1977-1979), Madrid (1980-1983), and Vienna (1986-1989), as well as by expert seminars and conferences - establishes ten basic principles of behaviour as well as three broad areas (or 'baskets') of activity (security, economics, and the human dimension). As such, the Helsinki Final Act provides a normative framework for its member states, based on adherence to multi-party democracy, the rule of law, human rights, and liberal economic systems. The effectiveness of the CSCE depended on the way in which the three baskets were tied together in political dialogue and processes of negotiation, which became the foundation of the 'cooperative security' of the CSCE system. Until 1990, the CSCE operated as an institutionalised diplomatic conference with no permanent organisational structures. With the end of the Cold War, however, the CSCE began a rapid transition to a full international organisation. In 1992, with the dissolution of the Soviet Union and Yugoslavia, the membership of the CSCE rose to 53 states and later to 55.96 The Charter of Paris for a New Europe marked a turning point in the history o f the CSCE. With the addition of important injunctions on democracy, the rule of law, and human rights, what had been a regional code of conduct turned into the normative structure for a security community that OSCE leaders expected to evolve in the CSCE region. In addition, the new CSCE institutions created in Paris actively encouraged the normative structures to develop
;illc
:
Imagined (Security) Communities
355
in the region. These institutions include the Secretariat and the Council of Foreign Ministers, the Conflict Prevention Center, and the Office of Free Elections, which later became the Office for Democratic Institutions and Human Rights (ODIHR),along with other institutions that were added in the following years, such as The Forum on Security Cooperation and the High Commissioner on National Minorities (HCNM). They improved the decision-making and enhanced monitoring capabilities of the future OSCE. The CSCE institutions also extended the reach of democratic pluralism, the rule of law, human rights, and market systems eastward, and they promoted the peaceful settlement of disputes. In addition, the CSCE became a regional arrangement, in the sense of chapter VIII of the UN Charter. It established early warning, conflict prevention, and crisis management practices and expanded peacekeeping activities, especially in Nagorno-Karabakh and Bosnia. At the Budapest follow-up meeting, the newly renamed OSCE settled for its present institutional structure, consisting mainly of the Summit of Heads of Government (meeting every two years), the Ministerial Council, the Senior Council, the Permanent Council, the Forum for Security and Cooperation, the Court of Conciliation and Arbitration, and the OSCE Parliamentary Assembly. In addition, the OSCE is administered by a Chairman-in-Office (CIO), a Troika (made-up of the immediate past, present, and future CIOs) and a Secretary General (and Secretariat). Particularly noteworthy is the role the OSCE has been playing in the management of the post-conflict situation in Bosnia-Herzegovina; the approval of a Code of Conduct on PoliticoMilitary Aspects of Security (1994); and the Lisbon Declaration on a 'Common and Comprehensive Security Model for Europe for the Twenty-First Century' (1996)- a politically binding document that outlines the future of the OSCE.'? The OSCE fulfills seven community-building functions: (1) it promotes political consultation and bilateral and multilateral agreements among its members; (2) it sets liberal standards - applicable both within each state and throughout the community - that are used to judge democratic and human rights performance, and monitors compliance with them; ( 3 ) it attempts to prevent violent conflict before it occurs; (4) it helps to develop the practices of peaceful settlement of disputes within the OSCE space; ( 5 )it builds mutual trust by promoting military transparency and cooperation; (6) it supports the building of democratic institutions and the transformation to market-based economies; and (7)it assists in reestablishing state institutions and the rule of law after conflicts. More generally, the OSCE aims to shape new transnational identities based on liberal values and serves as a conduit for the transmission of liberal values, norms, and practices to Eastern Europe, thereby helping create new vested interests in a pan-European cognitive space.'x Three notions are crucial for understanding how the community-building practices of the OSCE work. First, the same practices that offer a means of dealing with specific problems, such as early warning, conflict prevention, and the protection of human rights and minorities, also fulfill the role of
356
Widening Security
'building a secure and stable CSCE [now OSCE] community, whole and free'.99 For example, when the OSCE performs tasks - such as sending a mission to Tajikistan or to Estonia, organising a seminar on military doctrines or confidence-building measures (CBMs), or, as part of its CBMs regime, requiring states to open up their military activities for inspection what matters most is not the short-range success of the project, but the construction of a foundation for community practices and behaviour. These practices, together with the normative structure embodied in OSCE documents, institutionalise a new way of cognitively framing regional problems and solutions around liberal ideas. These documents include the 1975 Helsinki Final Act; the 1990 Copenhagen Declaration on democracy, the rule of law, and human rights; and the 1990 Charter of Paris, with its blueprint for a democratic Europe, whole and free. They also help to constitute new vested interests in, and generate the material and institutional resources for, reducing human rights violations, helping minorities, preventing conflicts that can endanger newly created and feeble democratic institutions in Eastern Europe, and facilitating the resolution of secessionist conflicts by peaceful means. Second, to create shared values and mutual responsiveness, the OSCE has cleverly exploited expectations of international legitimacy and fundamentally transformed the constitutive norms of the OSCE region.loO In other words, changing the identities and interests of former communist countries entails setting, promoting, and diffusing two ideas. The first is the expectation that international legitimacy depends on the democratic nature of domestic regimes. This implies that peaceful change is predicated on the knowledge that member states and societies have of one another as liberal democracies, that is, as 'doves'. The second is the accountability norm, according to which OSCE states are accountable to one another and to the OSCE community for what they do to their own citizens. This means that trust and peaceful change are predicated on replacing the non-intervention norm with the mutual accountability norm.lO' Third, developing a 'we feeling' (based on cognition rather than affection) within a region requires institutional resources, incentives, and encouragement. This is why the OSCE has adopted the view that it must first let the largest possible number of states believe that they are part of a cognitive region. Only then, when member states have formally and instrumentally accepted the shared institutional normative structures and practices, does the OSCE socialise state elites by means of continuous diplomatic interaction and a wide range of community-building practices. Thus, the rationale for the crucial 1992 decision to bring all the successor states of the Soviet Union into the OSCE could be phrased as follows: 'we know you are not "us". Let us pretend, however, that you are, so we may teach you to be "us". The far worse alternative - to leave you "outside" and not let you become one of us is most likely to turn you into "them", and against us'. lo2 Me cannot understand the role the OSCE plays in security communitybuilding without taking a closer look at 'cooperative security'. This is the
,\dii%i Imagined (Security) Communities
357
OSCE 'demilitarised' security concept that has resulted in imbuing security with political and human dimensions, and in basing security on confidence and cooperation, the elaboration of peaceful means of dispute settlement between states, the consolidation of justice and democracy in civil society, and the advancement of human freedom and rights, including n a t ~ o n a lminor~tyrights."" According to the classic notion of security, no weapon or political intention of an adversary may be beyond the reach of concern of another state."'" According to the OSCE original notion of cooperative security, however, 'no domestic institution or norm is beyond the jurisdictional reach of the CSCE'.'"' Indeed, the constitutive norms, associated institutions, and practices of the OSCE may be conceived as a crude governance system, relying for compliance on a shared identity that creates and maintains public order within the cognitive region. Thomas Buergenthal caught the subtle but crucial essence of the OSCE when he asserted that its 'instruments can be compared ... to those domestic constitutions which are not legally enforceable in national courts'.10h A plethora of new practices, institutions, and mechanisms give the OSCE 'governance system' its practical meaning. For example, the Human Diniension Conference (all Basket 111 issues, such as human rights, human contacts, and other humanitarian issues, grouped together since 1989), together with the High Commissioner on National Minorities (HCNM) (which tries to investigate, mediate, and prevent minority conflict), are superficially intended only to prevent ethnic conflict and to monitor the implementation of minority rights provisions.107In practice, however, they also aim at reconstructing the identities of OSCE members and, thus, their preferences. Moreover, the Office for Democratic Institutions and Human Rights (ODIHR) ~ r o v i d e ssupport for free elections and civil society-related programmes. Additionally, it reviews the implementation of Human Dimension provisions and the results of expert missions, and it also organises expert seminars on a variety of issues. Equally important for community-building are the innovative practices of the OSCE in arms control and peaceful settlement of disputes. In the early 1970s, the CSCE created ex nihilo the practice of CBMs, now diffused around the world.'0x Originally thought (in political and academic circles) to be merely a variant of arms-control measures aimed at enhancing transparency so as to reduce the danger o f surprise attack, CBMs have become a communitybuilding mechanism based on the social construction of mutual trust. Because trust is closely related to the legitimacy of a government 'and the way it treats its people','0" military cooperation and trust, and, more generally, peaceful change in the OSCE region, depend on the compliance of memher states to OSCE norms. Thus, the right to request information and to make representatmns on human r~ghtsare the other s ~ d of e the com of CBMs. As part of t h ~ smutual trust-bu~ldmg~nstrument,'mechan~sms'as they are and convening of b~lateral called, ,dlow for: (1)the exchange of ~nforniat~on and m u l t ~ l a t c r ~ meetlngs l on human r~ghtsv ~ o l a t ~ o n(the s Human D ~ m e n s ~ o n
358
Widening Security
Mechanism); (2) the querying of other states about their military activities (Unusual Military Activities); (3) the facilitation of peaceful resolution of disputes by a group of third-party experts (the Valetta Dispute Settlement Mechanism, followed by the 1993 Convention on Conciliation and Arbitration); (4) the holding of emergency meetings at a high political level (the Emergency Meeting Mechanism); and ( 5 )fact-finding, rapporteur, long-term, and sanctions-assistance missions. The Forum for Security Cooperation coordinates CBMs and other arms control activities with security enhancement and conflict prevention activities. The Code of Conduct on security matters sets standards of behaviour for the democratic control of armed forces and the activities of internal security forces of member-states.l1° The institutional processes and attributes of the OSCE,ll' frequently criticised for their lack of coherence and teeth, are, in fact, compatible with the task of community building. First, the fact that most OSCE injunctions are politically rather than legally binding makes 'adherence to stated intentions a test of political credibility rather than an invitation to search for legal loopholes', which promotes mutual trust.l12 Furthermore, politically binding instruments lead to changes in practices, political interests, and public policies, rather than in legal instruments. In other words, politically binding instruments can sometimes be as effective at producing change as legal instruments. OSCE processes work less by constraining political behaviour through law than by promoting public policies that are congruent with regional norms. Second, the accountability norm is particularly important for a system of governance that works through legitimation and de-legitimation. Third, the informality of the Helsinki process, especially in its first stages, has prevented the development of huge bureaucracies. Instead, it has empowered individuals, NGOs, social movements, and other civil-society actors to act on behalf of their rights.l13 In other words, informality helped to generate the dense web of transnational relations throughout the region that is essential for the development of a transnational community.'14 Fourth, the consensus rule, only recently modified to consensus-minus-one in the event of gross violations of OSCE norms, means that once consensus is achieved, 'it has higher moral credibility and greater political weight'."j It also generates the need to persuade other members by peaceful means, thus structurally promoting socialisation and learning processes. Fifth, institutionalised learning also results from OSCE follow-up conferences, which review the effectiveness of previous documents, decisions, and measures. 'This review of practices', Alexis Heraclides maintains, 'was novel not only in the Helsinki process, but also in the history of diplomacy'.l16 Moreover, the follow-up practice breeds the need to define the notion of success and failure, promoting both self-correcting and goaloriented behaviour.l17 Sixth, the Helsinki process promotes and makes prevalent a new type of diplomacy that integrates academic and diplomatic discourse and practice. For lack of a better word, I call it 'seminar diplomacy'. The practice, now widespread in other security organisations, such as the North Atlantic Cooperation
:
Imagined (Security) Communities
359
Council of NATO and the Partnership for Peace,'l5nstitutionalises the diplomatic practice of teaching norms and legitimises expertise as the basis for common agreement."" More importantly, however, seminar diplomacy, as in the case of the 1990 and 199 1 CSCE seminars on military doctrine, helps to generate not only causal understandings about specific technical issues, but also a measure of 'we feeling' and mutual trust among seminar members.""
Conclusions
Merely to imagine security communities does not make them all-pervasive. Balances of power, alliances, hegemonies, and deterrence still are - and probably will continuc to he - part of the international political landscape, not only in areas riven by interstate or inter-ethnic conflict, such as the Middle East, but also in areas where security communities exist, such as in Western Europe, or are in the process of developing, such as in Southeast Asia. The architects of security communities still must compete with and fight against power-political practices and conflicting identities. Moreover, as we look at the institutional map of international relations, it becomes apparent that many contemporary multilateral institutional activities - for example, the international trade, monetary, and nuclear nonproliferation regimes - although themselves the result of processes of social construction, are only indirectly linked to community-building. Instead, to a large extent, they respond to the instrumental logic of self-interested states that coordinate their policies - and thus construct a thin version of society on the basis of consensual principles of conduct."' Regardless of power politics, strong conflicting identities, and the ahove 'weak' version of multilateralism, a 'strong' kind of multilateralism has evolved in the postwar international system. This strong multilateralisni refers to the social construction and institutionalisation of security conlnlunities by means of multilateral dialogue and community-building practices, on the basis of collective normative knowledge forged through new andlor pre-existing institutions. Strong multilateralism - which is partially replacing power politics in parts of the world - and, more generally, the workings of security community-building institutions are, nevertheless, indicators that international security is increasingly associated with the establishment of a security community. They are evidence 'that regions themselves are socially constructed and susceptible to redefinition'."' A constructivist approach is helpful in identifying this phenomenon, as well as discerning the many 'strong' multilateral institutional attributes, processes, and consequences that could otherwise escape our attention. Importantly, constructivism sheds light on the way in which norms constitute identities and, concomitantly, the effect that these socially constructed identities have on the places that people are comfortable calling 'home'. This is why the concept of pluralistic security communities, coupled with a constructivist approach, offers a way to reorder our thinking about
360
Widening Security
international security in the post-Cold War period, shifting the focus of security studies away from states and towards transnational social, political, economic, ecological, and moral forces. However, this concept cuts much deeper, because a pluralistic security community suggests not merely a group of states that, thanks to increased communication, have abandoned war as a means of social intercourse. It also implies the social evolution of a community-region in which people have mastered the practice of peaceful change. Hence, pluralistic security communities suggest a social theory of international relations according to which shared international and transnational understandings, identities, and norms play a crucial role in the social construction of national interests, international practices, and regions. According to this theory, security communities are transnational cognitive regions whose people possess collective identities, and share other normative and regulatory structures. Shared cognitive structures, such as liberal civic cultures, provide purpose, meaning, and direction to material structures and power resources, and help to constitute and reproduce common interests. Powerful states, or cores of strength, are necessary for the development of security communities because, like a magnet, they attract weaker states that expect to share the security and welfare associated with them. Economic and social transactions also play a role by encouraging increased communication. Communication helps to thicken the social environment of cognitive regions and, thus, promotes the development of shared identification. In addition, security community-building institutions, such as the OSCE, nurture the development of shared normative structures, facilitate the channelling of material resources in the direction of shared transnational goals, promote political, economic, and social transactions, and play a role in fostering the development of transnational identities and 'we feeling'. Indeed, the positive and dynamic interaction between these variables undergirds the process of collective identity formation and trust which, in turn, drives dependable expectations of peaceful change. This constructivist theory explains how intersubjective understandings, through socialisation and learning processes, help 'frame' international social reality and lead to the development of shared practices and institutions. At the same time, it also explains how the purposeful and sometimes innovative action of individual and institutional agents constitute intersubjective structures. The theory may also be of help in explaining why and how states establish shared political purposes or interests only after their elites and, more generally, their people articulate a common identity within cognitively and spatially defined regional communities.
Acknowledgements I thank Hayward Alker, Michael Barnett, Richard Bilder, Beverly Crawford, Raymond Duvall, Ernst Haas, Arie Kacowicz, Peter Katzenstein, Ann-Marie Burley Slaughter, Alex Wendt, and Crawford Young for useful comments and Jeff Lewis for research assistance. I also thank the
c,' ii, I
Imagined (Security) Communities
361
Davis I n s t ~ t ~ of ~ t Ien t e r n a t i o n ~ lRcl,it~onsa t the Hebrew U n i v e r s q of Jerusalem for financul assistance. A draft of this paper was presented a t the Annual Meeting of the American I'olitical Science Assoc~ation,N e w York, 1-4 September, 1994. Another draft was published as Working Paper 2.28 of the Series: l'olitic~l Relations a n d Institut~ons Research Group, Center for German a n d European Studies, University of Calitorni,~a t Berkeley, J a n u a r y 1995.
Notes I. Italo Calvi~io, In~,rsrOlc(:ities, trans. W. Weaver (S.in Ihego, CA: Harcourt Ur,lce J o v a n o v ~ c h ,19741, p. 82. 2. F.m,in~~el Adler a n d h l i c l i ~ e lRarnett, 'Chverning Anarchy: A Research Agend'l tor the Study o t Security (:ornrn~~nities',Ethics and Itrtcrtz~~troir~d il/jnrs (Voi. 10, 1996), pp. 63-98, ng in International ,ind J o h n G. Kuggie, 'Territoriality and Beyond: P r o h l e ~ i i ~ i r i r ~Modernity Relations', I~rlerriiitronizl 0);yLrrrr;17tr~~ir (VoI. 47, N o . I , 199.3), p. 1.57. 3 Renedict i\nclerson, Iim~rrrcd(:onztizcrnrtirs: Rrflrctrorrs on the Orrgzn m d S p r e d of NLiti(~ncrlrstir(I.otidon: Verso, 19831, p. 15. 4. Z d r a v k o M l ~ n a r ,' I n d i v i d i ~ ~ ~ t.ind ~ o nG l o b a l i r a r ~ o ~ Ti :h e Transformation of Terr~torial S o c ~ a l Org:inu,~t~on', in Z d r a v k o hllin'lr (ed.). <;lol~nl~;~rtrr~;r and Terrrtorrd Iiiei~trtr's (Aldershot: Avebury, 19921, p. 24-25, 5 . Until December 1994, the OSCX was the Conference o n Security a n d <:ooperar~on 111 Europe (CSCE). 6. D a w J Sible), 'Outsiders in Soc~etya n d Space', In Kay Anderson '~ntl 1'~y G i l e (eds.), In~~cvrtrng Plirccs: Strtdres in (:~~ltzrr~11 G e ~ g r a p h y(Melbourne: I.ongman Chesire, 1992), p. 107. 7. J o h n Agnew, 'The 'Ierritorial Trap: T h e Geogr,~ph~calAssumptions of Intcrn,ttion,il Rel,~tionsTheor! ', Ker~irtuof lrrtcrrr~ztionalPoliticd Erot~unry(Vol. 1, No. 1, 1994), p. 54. For the conventional view, see Kenneth F. Waltz, Mniz, the State 'uid W ' u ( N e w York. NY: C o l u m l i i University I'ress, 1'359). 8. Agnetv, op. (.it., in note 7 , pp. 60-61. Alexmder Wendt, 'Collective Identity F o r m a t ~ o n;~ncl the International State', Arizcwc-aw i'olrtrc~rl.krcwce R e l ~ i c ~(Vol. ~ j 88, No. 2, 19941, pp. 384-96. 9. Agnew, op. (.it., in note 7. p. 62. For counter arguments of the conventional vlew, \ee D a v ~ dM ~ t r a n y .A LVorkrn~P ~ CSCy s t ~ t n(Chic'igo, 11.: Quadrangle Books, 1966). 10. For a n euaniple of this, see H ~ n J.s Morgenthau, Polltrcs Among N~ltions:T h Strrrggle for l ' i ~ t ~nw~ i dI'cwre ( N e w York, NY: Knopf. l948), and E.k1. Carr. The T w ~ i z t yY ~ L I YC:rrsis. S' 19 10-I0 39: All Irrtrodt~~~tio~z to ~ I J CStudy i l f Internc~tionc~l R~l~ztrl~tzs ( N e w York, NY: Harper and lio\v, 1964). (:orporare identity reters t o 'the intrinsic self-org,~n~zingqual~tiesthat constitute actor i ~ i d ~ v i d u a l iFor t ~ . hutnan beings. this means the body , ~ n deuperlence of consciousness; for organizations it means their cotistituent ind~viduals,physical resources, and the sh.~redbeliefs ~ t i d msritutions in virtue of which ind~vidualsfunction ,is ,I "we"'. So&l identity is the 'sets ot meanings that a n actor attributes t o ~tseltwhile taking the perspective of others, tlint is, as a social object. ... [ S l o c d ~rientitieslare] .it once cognitive s c h e n i x th'it enable a n actor t o determine "who I amlwe are" In a situ.1tion and pos~tionsin a social rolc \tructure of \hared understandings and expectat~ons',Wendt, O / J . clt., In note 8 , p. ,385. In other words, for a state, corporate d e n tity refers t o its con\tituent ~ndividuals,physical resources, a n d ~n
362
Widening Security
14. Wendt, op. cit., in note 8, p. 392. 15. Ruggie, op. cit., in note 2, p. 165. 16. Ronnie D. Lipschutz, 'Reconstructing World Politics: The Emergence of Global Civil Society', Millennium: Journal of International Studies (Vol. 21, No. 3, 1992), pp. 389-420. 17. Lee Cuba and David M. Hummon, 'Constructing a Sense of Home: Place Affiliation and Migration Across the Life Cycle', Sociological Forum (Vol. 8, No. 4, 1993), p. 549. 18. See, for example, William Bloom, Personal Identity, National Identity and International Relations (Cambridge: Cambridge University Press, 1990); Ruggie, op. cit., in note 2; Iver B. Neumann, 'A Region- Building Approach to Northern Europe', Review of International Studies (Vol. 20, No. I, 1994), pp. 53-74; Walker, op. cit., in note 12; and Wendt, op. cit., in note 8. See also Alexander Wendt, 'Anarchy Is What States Make of It: The Social Construction of Power Politics', International Organization (Vol. 46, No. 2, 1992), pp. 391425. 19. Leo R. Chavez, 'The Power of the Imagined Community: The Settlement of Undocumented Mexicans and Central Americans in the United States', American Anthropologist (Vol. 96, No. 1, 1994), pp. 52-73. 20. A region is 'a set of countries that are more markedly interdependent over a wider range of different dimensions - and usually also transactions - than they are with other countries. In many ways, therefore, regions are made by culture, history, politics and economics rather than by geography alone'. Karl W. Deutsch, 'On Nationalism, World Regions and the Nature of the West', in Per Torsvik (ed.), Mobilization, Center-Periphery Structures and Nation-Building: A Volume in Commemoration of Stein Rokkan (Bergen: Universitetsforlaget, 1981), p. 54. An interpretation of community, closer to that used in the present study, emphasises meaning and symbolic interaction. It refers to 'a system of values, norms, and moral codes which provides a sense of identity within a bounded whole to its members'. Peter Hamilton, 'Editor's Foreword', in Anthony P. Cohen, The Symbolic Construction of Community (New York, NY: Tavistock, 1985), p. 9. Deutsch defined a political community as social groups with a process of political communication, some machinery for enforcement, and some popular habits of compliance. Karl W. Deutsch, Sidney A. Burrell, Robert A. Kann, Maurice Lee, Jr., Martin Lichterman, Raymond E. Lindgren, Francis L. Lowenheim, and Richard W. Van Wagenen, Polltical Community and the North Atlantic Area (Princeton, NJ: Princeton University Press, 1957), p. 3. See especially Andrew Linklater, 'The Problem of Community in International Relations', Alternatives (Vol. 15, No. 2, 1990), pp. 135-53, and Andrew Linklater, 'Citizenship and Sovereignty in the Post-Westphalian State', European Journal of International Relations (VoI. 2, No. 1, 1996), pp. 77-103. See also Haskel Fein, Normative Politics and the Community of Nations (Philadelphia, PA: Temple University Press, 1987). 21. A 'multiperspectival polity' refers to a system of rule where national, supranational, and transnational identities share the same cognitive space. Hence, it is at odds with the 'single point', state-centred, Westphalian geographic perspective. Ruggie, op. cit., in note 2, p. 172. 22. John A. Agnew and James S. Duncan (eds.), The Power of Place: Bringing Together Geographical and Sociological Imaginations (Boston, MA: Unwin Hyman, 1989); Agnew, op. cit., in note 7; Cuba and Hummon, op. cit., in note 17; and Sibley, op. cit., in note 6 . For two very useful studies connecting the notion of place to politics, see Walker, op. cit., in note 12, and Ivo D. Duchacek, The Territorral Dimension of Politics: Within, Among, and Across Nations (Boulder, CO: Westview Press, 1986). 23. Michael N. Barnett, 'Identity and Alliances in the Middle East', in Peter J. Katzenstein (ed.), The Culture of National Security (New York, NY: Columbia University Press, 1996), pp. 4 0 0 4 7 . 24. Bruce Bueno de Mesquita and David Lalman, War and Reason (New Haven, CT: Yale University Press, 1992), Chapter 4, and Harvey Starr, 'Democracy and War: Choice, Learning and Security Communities', Journal of Peace Research (Vol. 29, No. 2, 1992), pp. 210-11. 25. Deutsch et al., op. cit., in note 20, p. 5. 26. Ibid., p. 6. 27. Ibid., pp. 36 and 66-67. By 'we-feeling', Deutsch refers to cognition rather than affection. 28. Adler and Barnett, op. cit., in note 2, p. 73. See also Emanuel Adler and Michael Barnett (eds.), Security Communities (Cambridge: Cambridge University Press, forthcoming 1998).
{I(
*
Imagined (Security)Communities
363
29. Adler and Karnett, op. crt., In note 2, p. 7 3 30. Karry Buzan, 'From Intern,ltional System t o International Society: Structural Realism and Regime Theory Meet the English School', lnternatron~zlOrgznizatron (Vol. 47, No. 3, 1992), p. 339. 31. Ronald Beiner, W / ~ i z t >I / J ~ M~zttcr With I.~~~erirlisrn (Berkeley, CA: Llniversity of California Press, 1992), p. 105. See also Linklater, 'Citizenship and Sovere~gntyin the PostWestphalinn State', op crt., In notc 20. 12.With respcit t o NATO, scc Jozepl, I.epgold, 'The Ncvt Step Toward ,I More Securc Europe', Tlw jotirnnl of Strategic .Studies (Vol. 17, No. 4, 19941, pp. 7-26. 33. Paul W. Schroeder, 'The New World Order: A H~storicalI'er5pective', T l ~ cWasl~rrt~ton Qurzrterly (Vol. 17, No. 2, 1 994), p. 30. 34. See Rarh,~raA. Miszt;ll, Trust rn Modern Soc-rrties (C:arnhridge: Polity Press, 1996). 35. Constructrursm denote\ the view that social reality IS constructed when individu.ils conie into contact with each other and interact. Constructivists assert that to ~ ~ n d e r s t a nthe d soc~al world, one must begin with shared understandmg and knowledge cind, in particular, practices, and investigate how they help t o detine the rnstirutional and rnater~alworlds. Cognitive and institutional structures give meaning to the material world. They provide people with reasons for the way things are and ttidicdtion\ '1s to how they should u\e their ~ n a t e r ~capabilit~es ~ll and power. In rurn, changes in the identities and interests ot the agents involved continually transform cognitive and instrtutional structures. C.onstructivists d o not deny the realit): of the material world. The): merely point out that the manner in w h ~ c hthe mater~alworld sh;ipes, modifies, and affects human mteracrlon, whtch in rurn affects ~ t depends , on prior dynarn~cepisternic and norniative interpretations of the rn,iterial world. See Ernariuel Adler, 'Seizing the Middle Ground: Constr~rcrivism in World I'ol~tics', Europeim ]orirwizl of Internatronal Relirtrons (Vol. 3, No. 3, 1997). pp. 3 19-63: Friedrich Kratochwl, Rules, Norms, and Decrsrons (Cnmbridge: Ccirnbridge University Press, 1989); Ruggie, op. cit., in note 2; and Wcndt, op. rit., 111 note 1 X. For nn alternative vlew o n the construction of securlty conimunities, see Ole Weaver, 'Insecurity, hecurit); and Asecurity in the West Furopean Non-War Community', in Adler m d Barnett (eds.),op. rit., in note 28. 36. Wendt, op. crt., in note 8 . 37. For the ideational effect of American hegemon); sec John G . Ruggie, 'Multilateralism: The Anatomy of an Institution', In John G. Ruggie (ed.), Mrrltilatcnzlrsrn Matters: TI7e Theory nnd PYIIXIS of 1111 Instrtlrtronul Form (New York, NY: Colurnb~aUniversity Press, 199.3), pp. 3 4 7 . 38. For the 'democratic peace' thesis, see Mrchael W. Doyle, 'Kant, Liberal I.cgacres, and Foreign Atfa~rs:1'art I' I'hilosophy ~zndI ' u h l ~Affairs (Vol. 12, No. 3, 1983), pp. 20.5-35, and Bruce Russetr, Grirsplrzg the l)c~wocriztrc~ Peare (Princeton, N J : l'rinceton University I'ress, 1993). 39. See A m ~ t a vAchary,~,'Collective Identity and ( h t l i c t Resolution In Southeast A,ia', in Adler and thrnett (eds.), op. crt., In note 28. 40. Konald Inglehart, (;rt[turr Shrft n z Advanced Indusrriul Societzes (l'rinceton, N J : Princeton Univers~tyI'ress, 19901, pp. 196-97. See a l w Dtego Gambetta (ed.), Trtrst: M n k ~ r r ~ rzttd Breaking C h ) p e r a t i ~ IZclrzt~ons ~e ( N e w York, NY: Blackwell, 1988). 41. G a h r ~ e lA. Almond and Sidney Verha, Tile C i t w Crrltnr~:Political Artitudcs drtd I)en~ocraryrn F ~ I YNatrons (Boston. MA: L~ttleand Brown, 196.3). 42. Robert I). I'utnnm, Mrzkrn~Dcvnocrmy Work: Ci~lic-Trirditions in Modern Italy (Princeton, NJ: Princeton Un~versit>I'ress, 199.3). 43. lhid. 44. Starr, o p . ~ i t .in , note 24, p. 210. 45. Ibrd., and Uueno de Mescl~litaand Lalrnan, op. cit., in note 24. 46. Starr, op. cit.. in note 24, p. 21 I . 47. See, for example, I'atr~c~aChilton, 'Mechanisms of Change: Social Movements, Transnational Coalrtions, and the Transformation Processes in Eastern Europe', in Thomas RisseKappen (ed.), Bringing Tunnsmtional Relations Back In: Non-Stizte Actors, Dornestrc Strrictures and International Instrtutrons (Chnbridge: Cambridge Unrversity Press, 1995), pp. 189-226. 48. I.ipschut7, op. cit., in note 16. 49. Kathryn Sikkink, 'Human Rights Issue-Networks in 1.3t111America', lnterrzational Organizatron (Vol. 47, No. 3, 19931, pp. 41 1-42, and Margaret E. Keck and Kathryn Sikkink,
364
Widening Security
Activists Beyond Borders: Transnational Advocacy Networks in International Politics (Ithaca, NY: Cornell University Press, forthcoming). 50. Chilton, op. cit., in note 47, and Daniel Thomas, 'Social Movements and International Institutions: A Preliminary Framework' (paper presented at the annual meeting of the American Political Science Association, Washington, DC, 1991). 51. See Doyle, op. cit., in note 38, and Russett, op. cit., in note 38. 52. Emanuel Adler and Michael Barnett, 'A Framework for the Study of Security Communities', in Adler and Barnett (eds.), op. cit., in note 28. 53. Deutsch et al., op. cit., in note 20, p. 38, emphasis added. 54. See, for example, Kenneth Waltz, Theory of International Politics (Reading, MA: Addison-Wesley, 1979). 55. Steven Lukes, Power: A Radical View (London: Macmillan, 1974). 56. For an exception, see Stefano Guzzini, 'Structural Power: The Limits of Neorealist Analysis', International Organization (Vol. 47, No. 3, 1993), pp. 443-78. 57. John R. Searle, The Construction of Social Reality (New York, NY: Free Press, 1995). 58. Adler and Barnett, op. cit., in note 2, and Michael C. Williams, 'The Institutions of Security', (paper presented at the annual meeting of the International Studies Association, San Diego, 16-21 April, 1996). 59. Williams, op. cit., in note 58. See also Michel Foucault, PowerlKnowledge: Selected Interviews and Other Writzngs. 1972-1977, ed. C. Gordon (New York, NY: Pantheon Books, 1980), and Richard Price, 'A Genealogy of the Chemical Weapons Taboo', International Organization (Vol. 49, No. 1, 1995), pp. 73-103. 60. Adler, op. cit., in note 35, pp. 336-37. 61. Ira J. Cohen, 'Structuration Theory and Social Praxis', in Anthony Giddens and Jonathan Turner (eds.), Social Theory Today (Stanford, CA: Stanford University Press, 1987), p. 287. 62. David Laitin, 'Political Culture and Political Preferences', American Political Science Review (Vol. 82, No. 2, 1988), p. 591. However, instrumental reasoning may be the first stage of a socialisation process that leads people to internalise an identity. 63. Cohen, op. cit., in note 61, p. 297. 64. For the role of positive images of material progress, see Ernst B. Haas, Nationalism, Liberalism and Progress: The Rise and Decline of Nationalism (Ithaca, NY: Cornell University Press, 1997). 65. Adler and Barnett, op. cit., in note 2, p. 83. 66. Guzzini, op. cit., in note 56, p. 471. 67. See Antonio Gramsci, Selections From the Prison Notebooks of Antonio Gramsci, trans. Q. Hoare and G. Nowell Smith (New York, NY: International Publishers, 1971). See also Robert W. Cox, 'Social Forces, States and World Orders', Millennium (Vol. 10, No. 2, 1981), pp. 126-55, and Stephen Gill, American Hegemony and the Trilateral Commission (Cambridge: Cambridge University Press, 1990). 68. Adler and Barnett (eds.),op. cit., in note 28. 69. R. Tuomela, 'Actions by Collectives', in the annual publication Philosophical Perspectives, ed. J.E. Tomberlin, Philosophy of Mind and Action Theory (Atascadero, CA: Ridgeview Publishing Company, Vol. 3, 1989) pp. 471-96. 70. See, for example, John C. Turner, 'Towards A Cognitive Redefinition of the Social Group', in Henry Tajfel (ed.), Social Identity and lntergroup Relations (Cambridge: Cambridge University Press, 1982), pp. 15-40. 71. Turner, op. cit., in note 70. 72. {bid., p. 16. 73. Ibid., p. 18. 74. See Henri Tajfel, Human Groups and Social Categories: Studies in Social Psychology (Cambridge: Cambridge University Press, 1981); Henry Tajfel (ed.), Differentiation Between Social Groups: Studies in the Social Psychology of lntergroup Relations (London: Academic Press, 1978); Henry Tajfel and John C. Turner, 'The Social Identity Theory of Intergroup Behavior', in Stephen Worchel and William G. Austin (eds.), Psychology of Intergroup Relations, Second Edition (Chicago, IL: Nelson-Hall, 19861, pp. 7-24; and Jonathan Mercer,
itiiiv
Imagined (Security) Communities
365
'An'lrch) and Idcnr~ty',lnterniztronizl Orgartr~atzotz(Vol. 49, No. 2, 1995), pp. 229-52. kor the view that genuine conflict of interest generates intergroup competition, see Muzafer Sher~f, G~OLI[J Conflirt izntf Co-opcrizt~on:Their So~.raIPsyrhology (Imidon: Routledge and Kegan Paul, 1966). For the importance, as well as limitations, of soci,ll-psycholog~ilalexpl,ln,ltions, see Herbert C. Kelman, Intert~atrorralHehavror: A Social-Psyc.hologica1 Analysis (New York, NY: Holt, Kinehart m d Winston, 1965). 75. Turner, op. cit.. In notc 70, p. 31. 7 h . James S. Colem.l~~, N i g r r ; , ~ .D,zc-kgrotrnd to h'izt;<,r~nl;srn(Rcrkclcy, CA: linivers;ty o f Cal~forniaPress, lL).58),~ l n dRichard A. H ~ g g o t ra n d Kim R. No\\el, 'Australia and the Search for Security Community in the 1990s' in Adler and Barnett ( e d ~ . )o, p rit., in note 28. 77. Antlion) D. Srn~th,'N,lrional Identity and the Idea of Fi~ropeanUnity', Interniitri~nr~l Affiws (Vol. 68, No. 1, 1992), p. 59. 78. Anthony Black, 'Nation and Comrn~lnity in the International Order', R ~ Y ~ I of CII~ Interrtattot~~ll St~cilres(Vol. 19, No. I , 1991), p. 87. 79. Buzan, op. C-it.,in note 30. Thc reference I S t o F e r d ~ n , ~ nTiinnies, J Cotnnzltrzity amf Assoctatron [Gentcwschofr ~ u t dG~sells~htzftl, trans. C.P. I.oo~nis,(London: Routledge ,lnJ Kegan Paul, 19.55). 80. 13uzan, op. cit., in notc 10, p. 336. 8 I. I/~tii.,p. ,339, 82. John C;. Ruggie, '<:ontinuiry dnd Tr:instor~ii,ltiotl In the World Polity: Toward ,I Neorealisr Synthes~s',World IJo/itics (Vol. 3.5, No. 2, 1983), p. 280. 83. For wveretgnry, see Thomas J. B~erstekerand C y n t l i ~ Weher ,~ (cds.), St~ltc. S ~ ~ w e r g ? ~ t y as Socral Constrrrrt (Canibnclge: (:amhr~dgeUniversity I'rc\s, 1996). 84. Linklater, o p rit.. in note 20, p. 145, and Hedley Bull, 'lbr Arznrchiu7l Soi-icty (New York, NY: (:olumh~,l University Press, 1977). 85. Anthony G ~ d d e n s Thi. , C:onstrtt~t~i~n of Sor~et?.(Berkrlel, CIA: University o f ( h l ~ f o r n ~ , l Press, 19X4), espectally Chaptet- 1. 86. Anne-M,1r1e Burley and Walter M,lrtli, 'Europe Before the Court: A I)olitic.ll 'l'hcory of Legal Integration', lntertrntror~~zl Orgnnrmtlon (Vol. 47, No. I, 19931, pp. 41-42. 87. Thomas Buergenrhnl, I'rofessor in International I.nw (George Washington U11ive1-sity) .~nd US delegate to the CSCE negotiat~ons,iliterv~ewwith authol; October 1993. See also Thorncis Buergcnthal, 'The CSCE K~ghtsSystem', George WLishlrzgton/ o ~ ~ r t zof a l lrzternLztronilll.aro '2nd Ecotzott~ics(Vol. 2.5, No. 2, 199 1 ), p. 3.52. 88. See F.1-l. Hlnsley, So~ierrrgrzty,Second Edition (C..1mbrldge: Canihridge Un~versity Press, 1986). 89. David J,lcohson, Krghts Ac-ros Bordrrs: Irrtrrzrgrtltri~rri l r ~ r fthe D~clirzeofCrt~zer2~~11/1 (Baltimore, MD: The Johns Hopkins Un~versiryI'ress, 1996). YO. Tho11las M. Franck. 'The 1:merging R ~ g h rt o I)eniocr,lr~c(hvernance', 'Thc AtrrerrC-iztz /oarr~zalof lntrrrzirtir~nalLi~zr~ (Vol. 86, No. 46, l992), pp. 46-9 1 . 9 1 . Kuggie, op rit., in note 2, p. 172. 92. Adler and Karnett, op. cit.. in note 52. 93. I.inklater, '(.itizensh~p.lnd Sovereignty in the I'o~t-WestphalunStarc', up. itt., In note 20, pp. 97-98. 94. Dennis t. l'hompson, T l ~ cL)cwzorrotrc Citizen (C:,lmbr~dge: Camhridge l l n ~ \ e r ~ i t ) Pre\s, 1970), p. 2. In\tead, J e a n Bodin argues that w h ~ 'make\ t J m,ln a citizen 11sI the r n ~ ~ t u a l obligation between suhlecr and sovereign'. Je~11iRoiltn, .%I>-lI(r~oksO H t 1 (:otnnzi~rz~~~ei~lt/~ ~ (London: Blackwell, 1967), p. 21. 95. Examples of t h ~ sare the OSCE, the European Union, the (huncil of Europe, AS well as, lately, NATO and ASEAN. 96. For some recent studies on the CSCE/OSC'E, see Sret,ln l.ehne, The CSCE in the I9YOs: (;orntizorz Eurol~eanHo~tscr~ J YPotemkin Vi//izge? (Vienna: Ikaumuller, 199 1); Michael h c a s (ed.), TIM C S C t rtz the 19')Os: (:onstnii.trng E u r o p e m S ~ i ~ i r arntd~ Cooperatlr~n(BadenBaden: Nomos, 1993); Vojtech Mastny, TIIP tfclsirtki Process m d tlw Relntegratron of Ezrrop~ 19x6-1991: Analys~satzd 1)oirorzcntatioiz ( N e w York, NY: New York Un~versityPress, 1992); Alexis Heraclides, Seczrr~tya r ~ dCooperiltror~rn Ertropc: T/JC11~1tmrtzDimension, 1972-1 992
366
Widening Security
(London: Frank Cass, 1993); Arie Bloed, The Conference on Security and Cooperation in Europe: Analysis and Basic Documents, 1972-1993 (Dordrecht: Kluwer Academic Publisher, 1993); Victor-lves Ghebali, L'OSCE duns /'Europe Post-communiste, 1990-1 996: Vers une Identite Paneuropeenne de Securite (Brussels: Bruylant, 1996); and Diana Chigas, with Elizabeth McClintock and Christophe Kamp, 'Preventive Diplomacy and the Organization for Security and Cooperation in Europe: Creating Incentives for Dialogue and Cooperation', in Abram Chayes and Antonia H . Chayes (eds.), Preventing Conflict in the Post-Communist World (Washington, DC: The Brookings Institution, 1996), pp. 25-97. 97. For additional information on the CSCEIOSCE, see Conference on Security and Cooperation in Europe, Charter o f Paris for a New Europe (Paris: CSCE, 1990);Conference on Security and Cooperation in Europe, The Challenges of Change: CSCE Helsinki Document 1992 (Prague: CSCE Secretariat, 1992);Conference on Security and Cooperation in Europe, Toward A Genuine Partnership in a New Era: Budapest Document 1994 (Prague: CSCE Secretariat, 1994); Organization for Security and Cooperation in Europe, Lisbon Document 1996 (Lisbon: OSCE, 1996);and Chigas et al., op. cit., in note 96. 98. See James E. Goodby, The Diplomacy o f Europe Whole and Free', in Samuel F. Wells, Jr. (ed.),The Helsinki Process and the Future o f Europe (Washington,DC: The Wilson Center Press, 1990),p. 59. Note that I do not claim that there is already a security community, or that the OSCE would ultimately succeed in establishing a security community, in the entire OSCE region. 99. Conference on Security and Cooperation in Europe (CSCE),'Toward a Genuine Partnership in a New Era', Budapest Document, 1994 (Budapest:CSCE, 1994). See also a statement made by the head o f the US delegation to the CSCE, Ambassador John Kornblum, at the CSCE Seminar on Early Warning and Conflict Prevention, Warsaw, January 20, 1994, to the effect that CSCE practices 'are designed to be part o f a process o f community building'. 100. Marianne Hanson, 'Democratization and Norm Creation in Europe', Adelphi Papers 284 (London: Brassey's for the International Institute for Strategic Studies ( I I S S ) , 1994),p. 34. 101. Ibid. 102. Heraclides makes a similar point. See Heraclides, op. cit., in note 96, p. 15. 103. Janie Leatherman, 'Conflict Transformation in the CSCE: Learning and Institutionalization', Cooperation and Conflict (Vol. 28, No. 4 , 1993), pp. 413-14. Transparency, the absence o f nuclear deterrence, intensive and regular communications, diffusereciprocity, and a set o f interlocking security, human rights, economic, and environmental organisations characterise a fully developed model o f cooperative security. For cooperative security, see Janne E. Nolan (ed.), Global Engagement: Cooperation and Security in the 21st Century (Washington, DC: The Brookings Institution, 1994). 104. See, for example, Arnold Wolfers, Discord and Collaboration (Baltimore, MD: The Johns Hopkins University Press, 1962), Chapter 10. 105. Buergenthal, op. cit., in note 87, p. 382, emphasis added. 106. Ibid., pp. 380-81. 107. Lehne, op. cit., in note 96, p. 5. For the Human Dimension the reader may refer to Heraclides, op. cit., in note 96, and Arie Bloed and Pieter van Dijk (eds.),'The Human Dimension of the Helsinki Process: The Vienna Follow-up Meeting and its Aftermath (Dordrecht: Martinus Nijhoff, 1991). O n the HCNM, see Alexis Heraclides, Helsinki-11 and its Aftermath: The Making of the CSCE into an International Organization (London: Pinter Publishers, 1993). 108. Lehne, op. cit., in note 96, p. 62. 109. Ibid., p. 15. 110. For OSCE institution building the reader may refer to Heraclides, op. cit., in note 107. 111. For a critical account o f OSCE institutional processes, see Richard Weitz, 'Pursuing Military Security in Eastern Europe', in Robert 0. Keohane, Joseph S . Nye, and Stanley Hoffmann (eds.),After the Cold War: International Institutions and State Strategies in Europe, 1989-1991 (Cambridge, M A : Harvard University Press, 1993), pp. 342-80. 112. Mastny, op. cit., in note 96, p. 2. 113. US Commission on Security and Cooperation in Europe, Beyond Process: The CSCE 's Institutional Development, 1990-92 (Washington, DC: 1993). For social movements, see Thomas, op. cit., in note 50.
lti1i?*
Imagined (Security)Communities
367
1 14. h i d . 115. For the quote, see L,ehne, op. cit., in note 96, p. 73. The 'conse~~sus-minus-one' provision fro111 1992 reters only to thc human d~mensionand not to ,111 the co~nmitmentsand princ~ples o f the OS(:E. However, in prxtice, the provision has heen used more widely. O n paper, at least, there also exists a ' C O I ~ S ~ ~ S U S - I ~ ~ I ~ prov~sion L I S - ~ ~ V ~In' the case of directed concihation procedure, d~rectingtwo disputants to \eek concil~arionirrespective of t h e ~ rwill. Heraclides, o p . clt.. In note 107, pp. 179-80. 1 16. Hrt-acl~des,op. c-rt., tn n o t e 96, p. 5 1. 117. Mastny, o p . cit., in note 96, p. 3. 1 1 8. Mantred Woerner, 'NATO Transformed: The S i g n ~ t ~ w n oc fe the Rome Summit', NATO R e l m ~ o(Vol. 39, N o . 6, 199 I), p. 5. The North Atlantic Cooperation Council was replacrd and upgraded by the Euro-Atlantic Partnership Council in May 1997. i 19. Martha Finnemore, 'International Organ~zarionsas Te.lchers of Norms: The United Nations Education,~l,Scientific, and Cultural Organization , ~ n dScience Policy', Intrrr~atrond Orgnizlzntron (Vol. 47, N o . 3, 19931, pp. 56.5-97. 120. Conceptually, semn,ir diplomacy 3tands o n s ~ r n ~ l hut a r broader grounds than Herlicrt Kelman's social-pychological 'Problenl-Solwng Workshop' dpproach for settling international confl~cts.See Herhert C. Kelman and Stcphan I? Cohen, 'The Problem-Solv~ngWorkshop: A S o c ~ a l - l ' s y c h o ~ ~ gContribution ic~~~ to the Resolutioil o f Internat~ond( h f l i c t ' , /otcrrzal of Peme Resmrch (Vol. 13. N o . 2, 19761, pp. 79-90. 12 1. See Kuggie (ed.), op. cit., in note 37. 122. Adler and Rarnett, o p . rlt., in note 2, p. 77.