The Governance of Private Security
eBook - ePub

The Governance of Private Security

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

The Governance of Private Security

Book details
Book preview
Table of contents
Citations

About This Book

This book offers new insights and original empirical research on private military and security companies (PMSCs), including China's negotiation approach to governance, an account of Nigeria's first engagement with regulatory cooperation under the threat of Boko Haram, and a study of PMSCs in Ebola-hit Western Africa. The author engages with concepts and theories from IR, Political Economy, and African studiesā€”like regime, forum shopping, and extraversionā€”to describe what shapes state choices in national and international fora. The volume clarifies and spells out the needed questions and definitions and proposes a synthesis of how regime formation is shaped by ideas, interests, and institutions, starting from the proposition that regulatory cooperation consists in facilitating the acceptance and use of a single identifier for private military and security companies.

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access The Governance of Private Security by Marco Boggero in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & National Security. We have over one million books available in our catalogue for you to explore.
Ā© The Author(s) 2018
Marco BoggeroThe Governance of Private Security https://doi.org/10.1007/978-3-319-69593-8_1
Begin Abstract

1. Introduction

Marco Boggero1
(1)
School of Advanced International Studies, Johns Hopkins University, Washington, DC, USA
End Abstract
The proliferation and influence of private security is often hailed as one of the most significant changes in international politics and it animates periodically debates ranging from the privatization of foreign policy to the ethics of contracting, from the cost effectiveness of companies to the tensions between private contractors and government military personnel, from democratic accountability to the relations between state and non-state actors.
This book addresses the question of how social norms produce or prevent state choices in contemporary private security governance structures. What drives change in regulation and what norms shape global initiatives and individual state choices? This is the central inquiry of the book. The politics of private security governance are not explained by conventional theories that claim that all global issues reflect underlying military and economic capabilities. Reflecting the realist tradition in international relations, analysts find it difficult to explain how regulation evolved in spite of conflicting national interests and cannot explain the involvement of states that had no strategic interest in cooperation (Avant 2016). Yet, constructivist approaches are challenged as well. Assuming the existence of private security norms is simplistic if these cannot be shown to be determinants of state behavior. There is a gap in our understanding of the relation between norms and their varying influence on state and interstate policymaking that this book aims at filling. From the start, which body of norms guides states in their relations to private security and what remains of the influence of the anti-mercenary norm, the most critical of all? Has the anti-mercenary norm been reformulated and limited? What shapes severe regulatory responses at the state level, including prohibition private security? These are the questions that the book aims at illuminating.
In the developing countriesā€”where the stateā€™s monopoly on violence is particularly lackingā€”and the urgency of modernization and subsistence is greatest, the questions are particularly relevant. In these contexts, the stateā€™s monopoly of legitimate force is increasingly enmeshed in networks and relations that cannot always be contained within the boundaries of the national state (Abrahamsen and Williams 2010). Since Abrahamsen and Williamsā€™ seminal contribution, other trends have characterized the developing world. I offer an original account both of the growth of Chinese private military and security contractors (PMSCs) in Africa1 and of Chinese participation to regulatory processes. How does Beijing promote or inhibit regulatory cooperation on matters of private security? The answer proposed in the book lies both in the history of the anti-mercenary norm and in distinct path of state formation of Chinese state (Chap. 10). The book explores Chinese participation to expert meetings and state conferences, and the policy choices made by a major player in the African continent.2
Finally, an intense evolution in Information and Communications Technology, including social media, has impacted international politics. The trend was acknowledged and identified earlier, as it initially revolved around CCTV and alarm systems with abstract systems and institutions reinforcing the expertise of private authority (Abrahamsen and Williams 2010, pp. 221ā€“222). Since then, non-state actors with decentralized networks have challenged the boundaries of activism and rebellion against the state, with the phenomenon of radicalization gaining dramatic notoriety. Against these challenges, both PMSCs, and the private sector in general, are harnessed in support of a technologically complex and virtual conflict (Carmola 2010, pp. 167ā€“170). What are then the normative basis to connect manned private security and technologically evolving private security? This book also aims at answering these evolving questions and uses the exploration of social norms and state choices, to help create bridges for international cooperation in the digital age.

1.1 The Complexity of Naming

1.1.1 Definitions

Having recognized the lack of a framework for PMSCs activities, states engaged in multiple initiatives that increasingly used the same definition: the Montreux Document (hereinafter Montreux or the Document) and the International Code of Conduct (hereinafter ICoC or the Code), the UN Draft Convention, as well as national legislations governing PMSCs. First and foremost, agreement converged toward the use of a shared identifierā€”that is, PMSC. Moving from conflicting definitions to an agreed one is an important step of regime construction, as indicated in Table 1.1. Thus, the first definition for this book is ā€œPMSCsā€ or private military and security companiesā€”private business entities that provide military and/or security services, irrespective of how they describe themselves. Military and security services include, in particular, ā€œarmed guarding and protection of persons and objects, such as convoys, buildings and other places; maintenance and operation of weapons systems; prisoner detention; and advice to or training of local forces and security personnelā€ (This is the definition in the Montreux Document, p. 9. Also cf. Chap. 2.) The primary business of PMSCs is not the production and procurement of hardware, typical of the defense industry, but the procurement and delivery of services both in peace and in conflict zones.
Table 1.1
Regime construction
../images/446770_1_En_1_Chapter/446770_1_En_1_Tab1_HTML.gif
The tractability of the issue-area has necessitated a disassociation from the categories of mercenarism and privateering , as the book is going to elucidate; and regulatory cooperation still consists in leadingā€”or facilitatingā€”the acceptance of the term PMSC, the invention of which I see as akin to a ā€œpermanent inherited patronym.ā€
In fact, an extraordinary variation in regulatory choices has characterized the last two decades. Some governments allowed PMSCs, others banned them altogether (cf. Chap. 6). In maritime security, several countries have changed policy recommendation almost overnight, from strongly advising against private security to recommending their use (cf. Chap. 7). In Spain , the government chose to authorize and subsidize the fishing industryā€™s use of PMSCs. The largest Iranian tanker operators, as well as Chinese shipping firms, now use PMSC services for their fleet. How can we then account for heterogeneity in state choices and what explain shift?

1.1.2 ā€œWho Is It That Can Tell Me Who I Am?ā€

The analysis begins by identifying the actors and choosing the appropriate terms. De Nevers recalled an episode involving AFRICOMā€™s first commander. He stated in January 2010 that ā€œAFRICOM does not use private military contractors.ā€ Yet, De Nevers continues: ā€œIt is important to note, however, that many of the companies contracting with AFRICOM and AFRICAP fall within the broad rubric of PMSCs ā€ (De Nevers in Kinsey and Patterson 2012a, p. 71). This episode reflects the reticence in the use of the term private security and military company. It is indeed not a coincidence that all studies and accounts of PMSCs begin with the problem of simple definition, as Carmola writes, ā€œthat they are ambiguous or polymorphous entitiesā€”a mix of old and new, public and private; slippery, and hard to pin down analytically ā€ (Carmola 2010,...

Table of contents

  1. Cover
  2. Front Matter
  3. 1.Ā Introduction
  4. Part I. Ideas, Interests, and Institutions
  5. Part II
  6. Back Matter