Securitization and Desecuritization Processes in Protracted Conflicts
eBook - ePub

Securitization and Desecuritization Processes in Protracted Conflicts

The Case of Cyprus

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Securitization and Desecuritization Processes in Protracted Conflicts

The Case of Cyprus

Book details
Book preview
Table of contents
Citations

About This Book

Using the Cyprus conflict as a case study, this book examines how the securitization process in protracted conflict environments changes, as it becomes routinized and potentially even institutionalized. Furthermore, the process is not limited to the mainstream top-down path, as it also follows a horizontal and even bottom-up direction, which inevitably has an impact on the goals and securitization options of both the mainstream securitizing actors and the audience(s). Lastly, on a theoretical level it examines how the multi-directional securitization forces have an impact on the elite and audience-driven desecuritization efforts and ultimately on the prospects for conflict resolution. The book's case study, the Cyprus question, offers an alternative reading of the forces dominating the specific conflict, while concurrently offers a useful framework for the study of similar protracted and deeply securitized conflicts.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Securitization and Desecuritization Processes in Protracted Conflicts by Constantinos Adamides in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & National Security. We have over one million books available in our catalogue for you to explore.
© The Author(s) 2020
C. AdamidesSecuritization and Desecuritization Processes in Protracted ConflictsRethinking Peace and Conflict Studieshttps://doi.org/10.1007/978-3-030-33200-6_1
Begin Abstract

1. Securitization

Constantinos Adamides1
(1)
University of Nicosia, Nicosia, Cyprus
Constantinos Adamides

Abstract

This chapter provides an overview of the mainstream reading of securitization and presents the main challenges and limitations of the theory. The chapter commences with a brief synopsis on how and why securitization is used by political and other elite, followed by the challenges raised against the theory, with particular attention on the under-explored role of the audience(s) and the under-focused importance of the social context in the emergence and perpetuation of securitization. The last part of the chapter provides a brief overview of the five sectors of the theory, namely the military, economic, societal, political and environmental sectors.

Keywords

SecuritizationSpeech actsMultiple audienceSocial contextSecuritization sectors
End Abstract

Securitization as a Political Practice Analysis Tool

At the heart of critical security theories lies the notion that security and threats are the outcome of social constructs, predominantly shaped by prevailing discourses. When threats are processed through a specific security format, the ‘discussion of security is a discussion of threat’ (Wéver 2011: 472–473, emphasis in original) and the issue at hand, having been securitized, merits emergency attention and extraordinary measures (Buzan et al. 1998; Wéver 1995). Thus, securitization is the process where issues turn into matters of security through political intervention; these ‘security matters’ are then taken outside the boundaries of normal politics and the mainstream ‘rules of the game’ and are subsequently treated as special kinds of politics or beyond politics, therefore potentially justifying actions that fall out of the ordinary political procedures (Buzan et al. 1998: 23–24). The ‘handling’ of the issue no longer takes place in the sphere of normal politics as it is moved in the realm of emergency politics and if these (alleged) threats are not dealt with urgently and accordingly—even outside the realm of normal politics—then everything else will become irrelevant (Wéver 1995: 104).
The study of securitization is essentially a mechanism to help us analyze political practice. Vuori’s (2008) work helps elucidate why this is the case by separating securitization into four strands, where each one is used to achieve one of the following four goals:
  1. a.
    To raise an issue on the agenda.
  2. b.
    To act as deterrence.
  3. c.
    To legitimize past acts or reproduce existing securitization.
  4. d.
    To acquire more control.
In the first case—raising an issue on the agenda—securitization is used as a warning mechanism aiming to bring an issue to the attention of the appropriate decision-makers in a position to take the relevant measures to handle a specific perceived threat. In this case therefore, the actors who initiate the process are not necessarily the ones asking for access to, or tolerance for, extraordinary measures; they are rather the ‘messengers’ who bring the issue to the appropriate agents (e.g. political elite) who can actually do something about the said potential threat (ibid.: 77).
The second strand—deterrence—refers to securitizing acts aimed at legitimizing activities that have not yet occurred, but are likely to occur in the future. The goal therefore is to ‘justify actions that would otherwise be judged illegitimate by the evaluators of legitimacy’ (ibid.: 79–80). In this case, the ‘evaluators’ are audiences such as journalists and voters, while the actors are usually the decision-makers and political or military elite who can take action to handle a perceived threat, but still require the legitimacy for the necessary tolerance or access to measures to carry out the actions they deem necessary.
The third strand—legitimization of past actions and reproduction of ongoing securitization—is not about the future but about the past and the present. The goal in this case is to legitimize past actions that were deemed as illegitimate by the ‘evaluators’ (ibid.: 84–85). This is particularly useful for securitizing actors who, as discussed later, would like to portray themselves as the most ‘suitable agents’ to handle a particular kind of threats. This is even more important in cases where threats are part of the people’s routines and are thus constantly repeated.
The final strand—acquisition of control—refers to securitizing acts aimed at granting the actor more control. In this case the actor is someone in a formal position with the ability to ‘authorize compelling directives’ (ibid.: 88). The aim of the actor in this case is ‘to get the audience to do the acts required by the actor or to forbid them from doing certain acts’ (ibid.).
The four strands analyzed above provide a more lucid picture of the motivations behind the different ‘kinds’ of securitizing actors, and equally importantly, even though it is not explicitly stated in Vuori’s specific work, they also refer to the presence of multiple audiences. By incorporating several different audiences in the analysis, the theory becomes much more coherent in regards to identifying ‘who’ the specific audience is for each kind of securitizing act, and what it would take, in terms of audience approval, for an act to be successful.
Given the aforementioned broad approaches for securitization as a political practice analysis tool, it is not surprise that the theory has been used to study security-related issues and processes in several areas such as terrorism (Buzan 2006), immigration (Bigo 2002, 2005; Bigo and Walker 2002; Alexseev 2011), human security (Floyd 2007), environment (Wishnick 2010) and women’s rights (Hansen 2000). It is also used to explain inter-state security relationships, with a central role in the literature of Regional Security Complexes (RSC), which are defined as ‘a set of units whose major processes of securitization, desecuritization or both, are so interlinked that their security problems cannot be reasonably analyzed or resolved apart from one another’ (Buzan et al. 1998: 201).
At the core of securitization lies the idea that security is J. L. Austin’s (1967) notion of speech act; thus, by labeling something as a security issue, something is done. In other words, ‘the utterance itself is the act’; ‘the word “security” is the act’ (Wéver 1995: 55, emphasis in original). For an act to be considered successful the securitizing actor needs to convince a significant audience—one that would grant the actor the access and legitimacy it requests. The securitizing move—that is, the labeling of an issue as an existential threat for a specific referent object—does not necessarily constitute securitization. For the latter to happen the audience must accept the securitizing move, or at least tolerate it (Buzan et al. 1998: 25). As Watson notes, ‘an issue is securitized only if and when the audience accepts it as such, and securitization is not decided by the securitizer, but by the audience’ (2012: 284). Thus, the securitizing act is a negotiation between the securitizing actor and the audience (ibid.: 26) and security, in the securitization theory, is the derivative of a discursive process where ‘threats are represented and recognized’ (Williams 2003: 513). Subsequently, securitization success lies in the production of a ‘security label’ that will be supported or tolerated by an audience (Wéver 1995: 50). This approach connotes that the presence of a ‘real’ or actual threat is not a prerequisite for a successful securitizing act and the access to the subsequent extraordinary measures required to deal with the perceived threat.
While securitizing attempts (acts) are easily observable, especially in the era of phobia for immigration and Islam, the ‘acceptance’ or not of the act by the necessary audience is much more difficult to determine with high confidence. Buzan et al. (1998) argue that if an act gains enough ‘resonance’ it should be seen as a form of acceptance. But as the authors admit even resonance is difficult to assess (ibid.: 25). An equally important challenge is determining who constitutes the audience for each securitizing act. According to Buzan et al. (1998: 41) the audience is ‘those the securitizing act attempts to convince to accept exceptional procedures because of the specific security nature of some issues’. But as Leonard and Kaunert (2011: 59) point out there is no criteria to ‘identify who exactly constitutes the audience in practice’. Perhaps a more important gap, which is discussed in greater detail later, is that theory does not recognize the presence of multiple audiences for each issue and act. The role of audience(s) in the theory is an issue that receives growing attention in the literature and is discussed in detail later in the book.
Unsurprisingly not all securitizing acts are successful and, equally unsurprisingly, unsuccessful cases are rarely analyzed and theorized in the literature. One of the notable exceptions is Salter (2011) who used counter-terrorism programs in the US as a case study to offer three approaches of why failure occurs, namely “normal failures” (the outcome of competing bureaucracies in a complex society and that of accidents that could occur in such societies; “internal failures” (those moves that fail to meet the grammatical conditions of the act, namely to portray the threat as political and as existential); and “external failures” (the acts that meet the grammatical conditions, but are rejected by the audiences) (ibid.: 122–126). What is missing from the literature—and is discussed at a later stage—is how routinized and resilient securitizing acts may oscillate between success and failure in terms of how much resonance they enjoy by the relevant audience.

Securitization Challenges

This section highlights some of the criticisms leveled against securitization, focusing more on those that are more directly relevant to the main premise of the book. One of the primary criticisms of the theory is the danger of broadening the security agenda, emphasizing the risk of diluting the meaning of security and the danger of not being able to differentiate between existential and ordinary risks Huysmans (2006: 500). This is indeed a very interesting criticism and more relevant in the era of populism and the use of social media. The counter-argument to this criticism is that security is tied to a specific figure or fixed form, namely that of the speech of securitization, thus avoiding the everything-becomes-a-security trap (Wéver 2011: 469). For this book, the issue of ‘what is an existential security threat’ is central, not because the security agenda was broadened—as was the aforementioned criticism—but rather because in protracted conflict environments the existential threat may also become an ‘ordinary’ risk in the sense that the audience(s) become accustomed to the existential and treat it as ordinary and ‘expected’. In such cases, where there is a conflation of the ‘existential’ and the ‘ordinary’ risks, the theory faces analytical and practical challenges. For instance, at what point does the request for extraordinary measures, if it is repeated enough, become a routine or ‘ordinary’ political procedure? Similarly, do repetitive security-oriented speeches aiming to securitize become ordinary political discourses at some point, and not securitizing acts? Furthermore, one should consider the impact on the intersubjective process between the actors and the audience(s).
The latter issue is linked to one more relevant criticism, namely the under-explored role of the audience, or audiences to be more precise. Specifically, there a challenge to identify ‘who’ the audience is and equally importantly, its role in the process. Vuori, in line with the mainstream reading of the theory, argues that an audience qualifies as an audience only if it is in a position to provide access to what the actor wants (Vuori 2008: 72). This approach to audience(s) is very clear and useful when the securitizing actor’s request is tangible and requires a specific action. For instance, if an actor claims the need to declare a region a state of emergency and requests the use of troops and a budget to deal with the issue. In this case if the Parliament is the body that could authorize such measures, then the audience is clearly the Parliament as it is the only one tha...

Table of contents

  1. Cover
  2. Front Matter
  3. 1. Securitization
  4. 2. Protracted Conflicts: A Fertile Environment for Routinized Securitization
  5. 3. Cyprus: A Textbook Case of an Intractable Conflict
  6. 4. Securitization in Protracted Conflict Environments: A Theoretical Perspective
  7. 5. The Cyprus Conflict Through the Lens of Securitization Processes
  8. 6. Desecuritization in Protracted Conflicts
  9. 7. Energy Securitization in a Protracted Conflict Environment
  10. Back Matter