Professional Documents
Culture Documents
INTERNATIONAL
SECURITY
VOLUME I11
Widening Security
ite
Barry Buzan and Lene Hansen
@SAGEPublications
Los Angeles London New Delhi Singapore
Introduction and editorial arrangement 0 Barry Buzan and Lene Hansen 2007
Every effort has been made t o trace and acknowledge all the
copyright owners of the material reprinted herein. However, if
any copyright owners have not been located and contacted at
the time of publication, the publishers will be pleased to make
the necessary arrangements at the first opportunity.
P
rinciples or definitions of security are a well-established institution of
international politics. They are of great importance, in particular, to the
ceremonials of reconstruction after large international wars. When
Descartes died in Stockholm in the winter of 1650, he had recently completed
the verse text for a ballet called "The Birth of Peace," which was performed
at the Swedish court in celebration of the Treaty of Westphalia, the birthday
of Queen Christina, and the "golden peace" that was to follow the Thirty
Years' War.' All the great postwar settlements of modern times have since
been accompanied, at Vienna in 1815, at Versailles in 1919, and at San
Francisco in 194.7, by new principles of international security. One principle
has been thought to echo to the next, across the turbulent intervening times.
Harold Nicolson set out in 1919 for the Conference of Paris with a "slim and
authentic little volume" about the Congress of Vienna; he addressed his own
account of the Versailles proceedings, some years later, to "the young men
who will be in attendance upon the British Commissioners to the Conference
of Montreal in 1965." '
The Cold War was also a large international conflict. Like the two world
wars and the French Revolutionary and Napoleonic Wars, it came to an end
with momentous changes in the political configuration of Europe, and it, too,
has been followed by a new political interest in principles of security. The prin-
ciples of the incipient post-Cold War settlement have no Woodrow Wilson (or
no Castlereagh) and n o imposing Congress. But they already have an epigram
in the idea, much discussed since 1989, of the security of individuals as an
object of international policy: of "common security" or "human security."
This essay will look at the proposed new principles in a historical and critical
perspective. They are not conspicuously new, as will be seen, and they suggest
troublesome questions about what it means to have (or to act on) a "principle
of security." They are neither concise statements of received wisdom (like
Castlereagh's "just equilibrium"), nor inspirational (like the self-determination
for "well-defined national elements" of Woodrow Wilson's Four Principles);
they have not been embodied in new international organizations (like the
Source: Dadrrlus, 124(3 ) ( 1995): 5 3-98,
2 Widening Security
Extended Security
The new security ideas of the early 1980s were the reflection, in turn, of
many earlier discussions. "Over the past decade or so a vast array of public
interest organizations have begun to put forward alternate conceptions of
national security," Richard Ullman wrote in 1983 of the debate in the United
States over extended or redefined security.13 Such proposals were indeed an
intermittent feature of the entire Cold War period, and even of the preceding
postwar settlement. The historian E.H. Carr had thus argued in 1945, in
Nationalism and After, for a "system of pooled security" in which "security
for the individual" was a prime objective, and in which it would become pos-
sible to "divorce international security and the power to maintain it from fron-
tiers and the national sovereignty which they represent." Carr's view of the
previous 1919 settlement as "the last triumph of the old fissiparous national-
ism" - "we shall not again see a Europe of twenty, and a world of more than
sixty, 'independent sovereign states"' - was hardly prescient; nor was his con-
fidence in the diminution of national sentiment in existing "multinational"
states (the United States, the British Commonwealth, and the Soviet Union).
But his "social" or "functional" internationalism is strikingly close, nonethe-
less, to the extended security of the 1990s: its premise is a "shift in emphasis
from the rights and well-being of the national group to the rights and well-
being of the individual man and woman ... transferred to the sphere of inter-
national organization. " l 4
Principles of Security
The new political preoccupation with these old ideas corresponds, in the
1990s, to new political interests. "It is not profitable to embark on the fine
analysis of a definition unless we have decided on the purpose for which the
definition is wanted," John Hicks once said of the economists' dispute over
the definition of capital.ls One purpose of principles or definitions of secur-
ity is thus to provide some sort of guidance to the policies made by gov-
ernments. Principles of security may be derived or described by theorists,
but they are followed or held by officials. This is what could be described
as the "naive" view of the debate over principles of security, in that it
assumes that principles are indeed important in the organization of policy.
It is this view that was dismissed with condescension by Castlereagh in his
famous State Paper of 1820 about the "principles" of intervention by one
European power in the internal affairs of another (in this case, the consti-
tutional revolution in Spain). Great Britain, Castlereagh said, "is the last
Govt. in Europe which can be expected, or can venture to commit Herself
on any Question of an abstract character. ... This country cannot, and will
not, act upon abstract and speculative Principles of Precaution."16
A second purpose of principles of security is to guide public opinion
about policy, to suggest a way of thinking about security, or principles to be
held by the people on behalf of whom policy is to be made. Castlereagh
gave as the reason for his prudent "maxims" the peculiar circumstances of
r \ i ~ i l i ~ l i iWhat
i ( ~ is Security? 5
include officials of organizations (such as the United Nations and its devel-
opment agencies, or humanitarian, nongovernmental organizations) that
would benefit from changes in international policy towards expenditure on
civil objectives. They also include academics who have benefited from the
fairly resilient support by US and European foundations for projects on
extended security (including the projects for which this essay was pre-
pared); several of these foundations, in turn, have had the objective of influ-
encing or contesting existing security policies.20
The main concern of this essay is nonetheless with the first purpose of prin-
ciples of security, as described above: with the naive, or naive idealist, position
that principles, including abstract principles, do matter to international policy.
Castlereagh himself, in speaking of the maxims of British prudence, was
setting out the principles of a policy that repudiated abstract or systematic
principles. Such principles are perhaps especially important to a government
whose "general political situation" depends (in Castlereagh's words) on the
"public mind." One of the presumptions of eighteenth-century liberal thought
was that people tend to think in principles; Adam Smith suggested to states-
men that they "will be more likely to persuade" if they evoke the pleasure that
people derive from beholding "a great system of public police."21As Friedrich
Gentz wrote in 1820 of Castlereagh's memorandum, it was well suited to a
government, such as England's, which "owes an account of its conduct to
Parliament, and to a nation which is not satisfied with an order of business in
the gazettes, which wants to know the why and the wherefore of everything
('le pourquoi du p o u r q ~ o i ' ) . " ~ ~
"Politics would be led into frequent errors, were it to build too confi-
dently on the presumption, that the interest of every government is a crite-
rion of its conduct," Gentz himself wrote a few years earlier. One reason was
that "the true interest of a nation is a matter of much extent and uncertainty;
the conception of which depends greatly upon the point of view in which it
is contemplated, and of course upon the ability to choose the proper one."
Another was the intertwining of the public and the private: "it must likewise
be confessed, that even the immediate interests of states are oftener sacrificed
to private views and passions, than is generally imagined."23There is a naive
realism that is at least as misleading as the naive idealism of the unending
search for principles, including principles of security.
What is Security?
The idea of security has been at the heart of European political thought since
the crises of the seventeenth century. It is also an idea whose political signifi-
cance, like the senses of the word "security," has changed continually over
time. The permissive or pluralistic understanding of security, as an objective
of individuals and groups as well as of states - the understanding that has
been claimed in the 1990s by the proponents of extended security - was char-
acteristic, in general, of the period from the mid-seventeenth century to the
t ' What is Security? 7
The security of individuals in this sense - the sense of freedom from the
prospect, and thus the fear, of personal violation - has been of decisive import-
ance to liberal political The word "security" in fact assumed a new
public significance in the early, liberal period of the French Revolution. The
natural rights of man, in Tom Paine's translation of the Declaration of the
Rights of Man of August 1789, consisted of Liberty, Property, Security, and
Resistance of Oppression. Security - or "szirete"' - was still a condition of indi-
viduals: it was a private right, opposed, during the Terror, to the public safety
(salut) of the Committee for Public Safety. In Condorcet's outline of a new
Declaration of Rights in 1793, "security consists of the protection which soci-
ety accords to each citizen, for the conservation of his person, his property,
and his rights." Security was conceived, still, in terms of freedom from per-
sonal attack; the constitutional scholar Alengry explained Condorcet's con-
ception of security, in 1904, as "close to the Anglo-Saxon idea of habeas
corpus."32It was to be ensured, henceforth, by society: by the "social pact" or
the "social guarantee" of a universal civil society.
The guarantee of security was extended, in the reform proposals of the
same period, to include protection against sudden or violent deterioration in
the standard of living of individuals. Leibniz had urged the rulers of Germany
after the Peace of Ryswick in 1697 to turn, once the (military) "security" of
their countries was ensured, to a project of social insurance against accidents,
an "Assecurations-Casse"; a republic or a civil society, he said, was like a ship
or a company, directed towards "common welfare."33 Condorcet's project of
social security, almost a century later, had a wider political objective. The new
schemes for social insurance, to be provided either by public or by private
establishments, were intended to prevent misery by increasing "the number of
families whose lot is secured," to bring about a different sort of society, or
"something which has never before existed anywhere, a rich, active, populous
nation, without the existence of a poor and corrupted class."34 The economic
security of individuals was itself of political significance, as the condition for
an active political society. The central idea of liberalism, in Judith Shklar's
description, is that all individuals should be able to take decisions about their
lives "without fear or favor."35 Fear, and the fear of fear, were for Condorcet
the enemies of liberal politics. If people were so insecure as to live in fear of
destitution, in his scheme, then they were not free to take decisions, including
the decision to be part of a political society.
Individual security, in the liberal thought of the Enlightenment, is thus
both an individual and a collective good. It is a condition, and an objective,
of individuals. But it is one that can only be achieved in some sort of collect-
ive enterprise. It is quite different, in this sense, from the inner and intro-
spective security of Roman political thought. It is different, too, from the
security with which individuals can be endowed, by a benevolent or char-
itable or humanitarian authority. It is something that individuals get for
themselves, in a collective or contractual enterprise. The enterprise is in turn
something to be endlessly revised and reviewed. Security is not good in itself,
without regard to the process by which it is achieved. The state (together
Gothit hitl What is Security? 9
International Security
The new security principles of the end of the twentieth century constitute a
rediscovery, of sorts, of this late eighteenth and early nineteenth-century poli-
tics. One of the celebrated political metaphors of the post-Cold War period is
Gunter Grass's, of the unfreezing of the germs of European nationalism, con-
served for half a century in the ice of Cold War confrontation. But there is
another, less biotic metaphor, in which it is the politics of liberal internation-
alism that has been unfrozen: not after half a century, but rather after two
centuries of confrontation, between militant (and military) revolution and mili-
tant conservatism. "It was the Revolutionary power more particularly in its
Military Character," Castlereagh said in 1820, that was for the Alliance the
"object of its constant solicitude," and against which, exclusively, "it intended
to take precaution^."^^ The identification of revolution with its military char-
acter, or with its prodigious and offensive military success - the memory of
Custine's and Napoleon's armies, and the transposition of this memory into
the identification of Revolutionary France and Soviet Russia - has been a con-
tinuing preoccupation of subsequent politics. It is only with the final disinte-
gration of Soviet military power, or rather with the disengagement, in the early
1990s, of Russian military power from the Soviet rhetoric of revolution, that
the long militarization of continental political confrontation has come to an at
least temporary end.
It was "the problem of peace and war," for Franqois Furet, that in the
course of the French Revolution "prohibited, in people's minds and in
events, any liberal solution to the political cri~is."~' The political prospects
of 1791 are poignantly incongruous in the retrospect of two centuries
of militarized or militaristic revolution: the proposed governments, for ex-
ample, in which Condorcet was to be Minister of Finance, and Talleyrand
Minister of Foreign affair^.^^ But the liberal solutions envisaged in the early
1790s are perhaps more convincing now, at least in international relations,
than they have been for much of the intervening period. This seems to be
the opinion, in any case, of liberalism's opponents, if not of its (character-
istically) muted supporters. "Liberalism is the real enemy" was the title of
an article in 1992 by the English conservative critic Peregrine Worsthorne, in
which he recounted the "regimental reunion" in East Berlin of "the remain-
ing old guard of Encounter": the conclusion, he said, was that "worrying
about communism intellectually - as against militarily - was a gigantic red
i\ i What is Security? II
post-Cold War period. The effort to make sense of them, and in particular
to make them less inclusive, is thereby of continuing importance. The changes
that led in the late eighteenth century to a new preoccupation with inter-
nationalization - the increase in news, in economic and cultural interdepend-
ence, in the effectiveness of international intervention, and in the consequent
political recognition of distant events - are also the preoccupations of the
end o f the twentieth century. There is very little, still, that corresporlds to
an international politics in which distant individuals are co-citizens, or co-
participants. But there is an international political society, of sorts, and it
imposes some form of reflection on the principles of international justice.
Policies for the prevention of violent conflict provide one illustration. The
idea of the prevention of nuclear war, as distinct from the deterrence of
nuclear offense, was of central importance to the Palme Commission's idea
of common security. A similar distinction can he made now between the
cooperative enterprise of prevention and the frightening or forceful enterprise
of deterrence: the deterrence of injustice or insecurity, or the enforcement of
rights. The discussion of new policies for collective security has been con-
cerned to a considerable extent, since 1991, with principles of "intervention":
with the circun~stancesunder which (in Condorcet's terms) governments
should employ force to establish principles in foreign countries. If there are
well-trained international forces, it is argued, prepared to intervene at the
early stages of crises, then military conflicts will he less likely to begin; if con-
flicts do begin, they will end earlier and with less ~ i o l e n c e . ~
This
' is deterrence,
of a new, enlightened, and internationalist complexion. But it is not the same
enterprise as prevention, or as the effort to ensure, whether with military or
nonmilitary instruments, that there will be no need to intervene.
One of the distinctive characteristics of prevention is that it takes place
under conditions of imperfect information, or before one knows with certainty
that a particular conflict (or a particular disease, in preventive public health)
will occur. This makes it a very difficult objective for international coopera-
tion. It is easier, often, to agree that a particular international problem is intol-
erable - that something must be done about it - than to agree either on
predictions as to the probability of future problems, or on general principles
of international policy. There are different explanations for the interest of
people in one country in "doing something" about injustice or insecurity in
other countries: that the problem is something they know about, for example;
that it is something they care about or identify themselves with; that there is
something they can do about it. But these explanations, or criteria, are difficult
to describe in a circumstanceless, universal idiom. One does not know that one
cares about something, or reflect on what one has it in one's power to do, until
one knows about some particular injustice or crisis: until the crisis, that is to
say, has already been described, or until (as Castlereagh said) it is no longer a
question of venturing to commit oneself on an "abstract" question, and there
is something "intelligible and practicable" to be done.
It is particularly difficult, therefore, for countries to agree in advance o n
the "resort to force" by the international community. As Castlereagh also
16 Widening Security
War I, for about seven years before and during World War 11, and for
twenty-three years, intermittently, during the Revolutionary and
Napoleonic Wars; the Cold War mobilization lasted for more than forty
years, and it is correspondingly difficult to undo. But in other respects the
present postwar period is strikingly different. The Cold War was indeed a
long international conflict, but it was not a conflict that ended in the
exhaustion, celehration, and revulsion from rhc use of military fol-ce that
was characteristic of 18 1.5, I91 9, and 1945.
The God of War is defeated in Descartes' ballet of 1649, and the personi-
fication of Earth, whose limbs have been torn apart in an early scene, re-
appears restored and renewed. The Cold War has been followed, in contrast,
by a rediscovery of military force - by a demobilization of certain (principally
nuclear) forces, and by remilitarization of international relations. On the one
hand, the military forces of the two superpowers are more "usable" (in the
Gulf, or in Chechnya). On the other hand, military conflicts within or between
other, lesser powers are uninhibited by the prospect of an eventual superpower
confrontation. The promise of the end of the Cold War has been understood,
since the earliest negotiations for nuclear disartlianient, as the promise of
7 -
a world of peaceful political competition." It is the demilitarization of the
long conflict between a proto-revolutionary "Left" and a proto-reactionary
"Kight" that has made possible the revival of liberal internationalism. But the
post-Cold War conflicts have turned out to be at least as violent as the many
snlall wars of the previous generation. They are newly visible to (Western)
public opinion, at least in the case of the wars in Croatia and Bosnia; they con-
stitute a new challenge to the incipient institutions of international order in
that they have demonstrated the powerlessness of even a relatively united
international cornmunit); undivided by the superpower competition.
The process of demilitarization is, under these circumstances, of high
priority for policies of human, individual, o r common security. It is of par-
ticular importance in states that are themselves at peace, but that are the
source of means of violent destruction elsewhere. lnclividuals in Russia, the
United States, France, or the United Kingdom "bear a relation" to distant
wars (in Hunie's phrase) in that they are residents of states that license or
encourage very large-scale arms exports. One way to make conflicts less
violent is thus to sell and produce less military equipment. Both Somalia
and the fornier Yugoslavia have been important locations, for many years,
of military-industrial transactions. Yet the effort to reduce transfers of con-
ventional arms is of strikingly little political interest in the post-Cold War
world. "The right inherent in society to ward oft crimes against itself by
antecedent precautions," for John Stuart Mill, included a right to impose
precautions on the sale of articles, such as poisons, of which both proper
and improper use could be made (or which are "adapted to be instruments
of crime"). The seller, he says "might be required to enter in a register the
exact time of the transaction, the name and addrcss of the buyer, the pre-
cise quantity and quality sold; to ask the purpose for which it was wanted,
and record the answer he re~eived."'~There are similar precautions in
18 Widening Security
The most troublesome illustration of the new policies has to do with non-
governmental organizations, or with what has been described rather grandly
as the "civil society strategy."77The dislike of government power has been at
the center of all liberal thought. Its "historic beginning," in L.T. Hobhouse's
description, is to be found in protest, even in "destructive and revolutionary"
protest, against the "modern State."78 Condorcet's idyll, at the height of his
revolutionary career in 1792, was of the "virtual non-existence" of govern-
ment, or of "laws and institutions which reduce to the smallest possible quan-
tity the action of g ~ v e r n m e n t . "This
~ ~ dislike has been accompanied, for many
liberals, by a liking for that which is not government, and in particular for
elective or voluntary associations, for the "professions," "divisions," "com-
munities," and "callings" that the not notably liberal Adam Ferguson
described in his Essay on the History of Civil So~iety.~~' (The electiveness,
at least for early liberals, was more important than the nonidentity with gov-
ernment. For Adam Smith, as for Turgot and Condorcet, the coercive non-
governmental organizations of the eighteenth century - apprenticeship guilds
and corporations, for example - were even more insidious than government
itself.81)
Relations between nongovernmental organizations (and nongovernmen-
tal individuals) have been of central importance to the internationalization
of political life in the late twentieth century, as in the late Enlightenment.
The increase in news and information is the work of nongovernment, of
very large private companies, very powerful individual proprietors, profes-
sional societies with their codes of conduct, public relations companies, and
so forth. So also, to a great extent, is the increase in economic and cultural
influence. The power of individuals in one country to cause economic and
social change in other countries is the work of private companies (includ-
ing the companies that export military equipment) far more than of gov-
ernments: much as it was, indeed, at the time of Grotius's defense of the
(Dutch and English) view "that private men, or private companies, could
occupy uncultivated territory."s2 The increased effectiveness of policy is
itself a characteristic of the policies of nongovernmental organizations as
much as of governments and international organizations. There are private
organizations who negotiate cease-fires and hostage exchanges: private
charities (and large airlines) deliver emergency humanitarian relief, and
compete with government agencies for public (or government) funding to
do so.
The novel aspect of nongovernmental organizations in the 1990s is their
new political self-consciousness, or self-importance - the beginning of a
,I 1 What is Security? 19
The presumption of this essay has been that the idea of an international
politics is, if not straightforward, at least recognizable in a general sense. But
the connotation of the political - and thereby of the "political conditions" that
Judith Shklar refers to as the overriding aim of liberalism - is the subject of
familiar, persistent disagreement. In one sense, the political is indeed the
domain of organizations, individuals, and their political discussions. This is
the sense asserted in the new theories of civil society; it is Cicero's sense, too
(or one of Cicero's senses), of society as a place of teaching, learning, commu-
nicating, discussing, and reasoning, and of citizenship as a matter of public
places, temples, streets, laws, voting rights, friendships, and business con-
tracts.lOl In a different sense, however, the political is the domain of formal
(and coercive) political arrangements, of the "formal democracy," which in
the civil society strategy is "not enough," and of the state more generally, with
its laws, treaties, and declarations. In a further sense, the political is the
domain of political power, or the extent of what states can do, or can arrange
to have done.
A great deal of modern political thought is concerned, as it was between
the 1770s and the 1820s, with the relations between these three domains:
with the circumstance that the different domains of politics are not co-
extensive, but change in extent over time. The fundamental characteristic of
the state is as the location of political homogeneity; the nation is defined by
homogeneity of birth, race, blood, culture.102But political homogeneity is a
matter of (political) culture, of discussing and reasoning, as well as of for-
mal political arrangements. The extent of political power is very much less
than the extent of formal political arrangements, for some states, and very
much greater for others. Condorcet's prospect of governments that impose
principles by force in other countries was made possible by the new polit-
ical power of several European governments. This power had rather little to
do with formal political engagements. It was instead a consequence of tech-
nologies (such as canals), economic circumstances (such as the power to
raise taxes or borrow money), and political and military conditions (such
as the absence, at the time, of powerful opponents). Castlereagh proposed
to limit Britain's policies of intervention - her ~oliciesbeyond the domain
of formal political arrangements - to the "intelligible and practicable." The
intelligible corresponds to the political in Cicero's sense, of the subject of
discussion and concern within a political society. The practicable is the
political in the sense of present power, or of that which corresponds to the
circumstances of political power, at the present time and as understood by
the presently powerful.
The great liberal theory of the nineteenth century assumed a more orderly
relation between these three domains of the political. John Stuart Mill argued,
in support of "free and popular local and municipal institutions," that "the
management of purely local business by the localities" should be subject only
to the most general superintendence by "general government," including the
provision of information and the residual power of "compelling the local offi-
cers to obey the laws laid down for their guidance"; the result should be "the
greatest dissemination of power consistent with efficiency." Formal political
arrangements were to be organized in an orderly hierarchy of interests and
duties, and the domain of these arrangements was co-extensive with the
domain of political power. The wider political culture, too, was both influ-
enced by and an irlfluence on formal political arrangements. Mill was uncom-
promisingly opposed - and in this he followed closely Condorcet's arguments
on public instruction - to the idea of political education. But he saw in the
practice of local politics the source of the "llabits and powers" that are the
foundation of a "free constitution." ""
Mill's conception of political order has been o f profound importance to
subsequent liberal thought. It is even reflected, in the European law of the
1980s and 1990s, in the idea of "subsidiarity." There is an orderly and lib-
eral core to this turgidly obscure notion: there are different levels of govern-
ment, of differing generality, and each political function is to be undertaken
at the lowest (or least general) level that is compatible with efficiency or prac-
ticability.'""t is this hierarchy of political processes that has broken down in
the new international politics of the 1990s. There are two reasons, in English
political thought, to respect some version of the principle of subsidiarity. One
is the Burkean or historicist respect for convention; certain functions have in
the past been performed by certain levels of government, and the costs o f con-
stitutional change are likely to be prohibitively high. The other, which is
closer to Mill's, is founded o n reason: the functions of government should be
subject to continuing review in the light of changing circumstances, and they
should be assigned to the least general level that is efficient in these condi-
tions. The rationalist view of subsidiarity is the more compelling one. Rut it
imposes an unending reflection on constitutional principles, much as Leonard
Woolf's system of conferences imposed an unending reflection on the delin-
eation of the international. It also imposes a great deal of reflection on chang-
ing international circun~stances;on the circumstances that have changed so
prodigiously in the 1980s and 1990s.
The politics of individual securit); inside and outside Europe, is a case in
point. O n the one hand, because of the increase in international informa-
tion, the general interest in the security of distant individuals is great;
people know about distant horrors while they are still happening, or while
there is still rime to prevent them from happening. O n the other hand,
because of increased information, again, and because international inter-
ventions are no longer inhibited by the prospect of intercontinental military
conflict, the power o f distant states is also relatively great in relation to
these horrors. The power of local states, meanwhile, is very much dimin-
ished in many modern local conflicts. The distant states may therefore he
more "efficient" in protecting personal freedom, to use Mill's term, than the
local, formally constituted political authorities. The counterpart of the
mulier civilis (the new political woman of civil society) provides a dismal
illustration. If one is a Bosnian Muslim woman, then one's security is n o t
protected by virtue of one's political identity as a resident of a local con>-
munity, as a citizen o f the old Yugoslavia, or as a citizen of the new Bosnia.
26 Widening Security
a new disrespect for the prior wisdom of states and their officers. When
Castlereagh speaks of different policies as "practicable" or "impracticable" -
o r when Mill speaks of the "efficient" dissemination of power - the tone is of
privileged insight into government finances and opportunities. This tone of
effortless self-confidence has been repressed, perhaps beyond recovery, in the
past decades of criticism of all the nonmilitary activities of the state (at least
in England, the United States, a n d the former Soviet Union). The state is also
a largely and increasingly feminine institution a t the end of the twentieth
century. The traditionally masculine functions of collecting taxes and organ-
izing wars have heen conspicuously in retreat. It is the traditionally feminine
state functions of local government, education, and social security that are
most resilient; it is these functions, too, that would be reproduced in the new
institutions of international government.
The international politics of individual security would be more orderly,
in some respects, if the institutions o f formal political commitment were
extended in this way. Rut the international political society will still impose
a new and prodigious tolerance for political disorder. There is some inter-
est, among the theorists of civil society in the 1990s, in the Stoic metaphor
of political identity as an array of concentric circles, in which the individ-
ual feels progressively less committed to her progressively more general
political identities (as a member of a family, a local community, a region, a
nation, an international community, and so forth). Adam Smith took some
interest in this metaphor, too, a t least a s a way of questioning the Stoic idea
of universal political benevolence.'"' B u t the modern identities with which
we have been concerned suggest that the array of commitments is very
much less orderly than the metaphor would indicate. I t is a set of ellipses,
perhaps, o r a n Epicurean universe, in which the location of the "I" swerves
and lurches over time. It leads t o a politics, in turn, that is subject in a quite
novel respect to whim and t o chance.
"Men are vain of the beauty of their country, of their county, of their
parish," Hunle says in his account of the relation hetween objects and pas-
sions; they are also vain of climate, of food, "of the softness o r force of their
language," of the qualities of their friends, of the beauty and utility of dis-
tant countries (based o n "their distant relation t o a foreign country, which
is formed by their having seen it and lived in it"). But the modern politics
of relatedness is more disordered, or more accidental, than in even Hume's
imagination. For Hume, "a beautiful fish in the ocean, an animal in a
desert, and indeed anything that neither belongs, nor is related to us, has n o
manner of influence on our vanity.""'Vn the modern theory of inter-
national (environmental) security, even the beautiful fish is related t o inter-
national politics. It is quite plausible, for example, that the individual
participants in the new civil society should feel related, and even passion-
ately related to far-off fish in distant oceans. It is plausible, too, that these
voluntary passions should come and g o with the accidents of information.
One joins the society for the protection of fish because one happens t o
have lived, as a child, near the zoo. O r one votes for a party that supports
28 Widening Security
application to any state o f things anterior to the time when mankind have
become capable of being improved by free and equal discussion."'12 We have
very little idea, still, o f what free and equal discussion amounts to, between
groups and societies as well as between individuals. But we are in the process
of finding out.
Notes
1 . Earlier verslons o f thi\ p.lper were presented at the initi'll meeting of the Cornmon S e c u r q
Forum in 1992, and at the 1993 Oslo meeting of the <:ommis\ion o n Global Governance. I am
grateful for comments fronl James C:ornford, A~nartyaSen, arid (iareth Stedman Jones. m d for
discuss~o~is with Lincoln Chen, Marianne Heiherg, Mary Kaldor, and the late Johan Jdrgcn Holst.
I would a l w l ~ k eto thank the John I).and Catherine T. MIicArth~1rFoundat~onfor wpport to
the Centre for History and Fconomics and to the Common Secur~tyForum.
2. (:hLlrles Ad;im, "Vie de Descnrres." in i:li,~rlcs Adam, ed., O c u ~ w stie L)escnrtes.
vol. u ~ (Paris:
i I.6opold Cerf, 19 IO), ,542-44.
3. Harold N~colson,I'alcc~ninkrn~191'1 (1.ondon: C o n ~ t ~ ~ h19331, le, 32.
4. St,lnley Hoffmann, "The Cr1si5o f 1.iheral Intern,ir1onal1\111,"Foreign Policy ( 9 8 ) (Spr~tig
199.5): 163.
5. M ~ c h a e lIg~utieff,"On <:rvil Soc~ety," Forri,y~lAfjLlirs 7 4 ( 2 ) (MarchiApril 199.5):
l i.5-36.
6. Henry A. Kis\inger, 11 \Yrorld Restored ( N e w York: (;ros\rr and Dunlap, 19641, 3.
7. Viclav H.~vel,Sunrn~c~r M c d ~ t i ~ t i o n(New
s York: Alfred A. Knopf, 1992), 33. hlill t ~ l k s
of "the sovereignty of the ind~wdu,tlover himself," a n d of thc condition t h ~ "over t Ii~mself,
over his own hody .lnd mrnd, the i~idividu,il is sovereig~i." Sec John S t ~ ~ aMill. r t O w /.ihwt?'
(1.ondon: Pengu~n,1 Y74), h9,14 1.
8. See, for e u m p l e , tlie \peeell hy President Clinton at the United N a t ~ o n so n 2 7 September
19'1.3, and speeihe\ hy Under Secretary of State Timothy F.. W~rtlia t the United N,lrion\ o n 30
March 1994, and at the N,ltionc~lI'rcss <:lub in WSlsh~ngton,I).(.. on 12 July 1994.
9. The <:ornmiss~ono n (;loh,ll <;overn,lnce, O ~ r (r ; l o / ~ lNcighbourhood (Oxford: ( ~ h f o r d
Lln~versityI'rcss, 1995), 78.
10. Ilnired S.lt~ons1)evclopnlent Progr.lrn, t-11trm711I ) ~ ~ l o p n i c 1094 ~ i t (Oxford: Ouforci
University Press, 1994), 3. 22-2.3.
I I. "The Ut~ltrdNations was founded 50 year5 go to ensure the territorial wcurit) of
nie~nherstates. ... What i\ now under \lege is so~netli~tig d~ttcrenr,"or "personal security" -
Boutros Koutro\-<;hali, "l.ct3s get togetlicr to halt tlie unr.lvelling o f society." lntc~rrii~trort~rl
H e r ~ ~ lTrrhurw,
ti I 0 Febr~1.1ry1 995.
12. The Independent <.onimis\ion o n Ihs,lrlnamenr and e c u r ~ t yIssues, Commor7 Srrrlrrty:
A B l ~ r r p ~ r nfor
t S~irtvviil(New York: S~iiionand Schusrcr, 1982), ix, xvi, 4, 1 .?9. The word
"survival" was evidently t h o ~ ~ g htot h'ive partict~ldr~ p p e in ~ l the United States, slnce the
eci~rionpublished In Engla~itihad ,I different title: Conrnzori Sr(-ztrity: A I'rogri7mme f;)r 111s-
izrmirwtcnt (I.ondori: Pan Kooks, 19831.
1.3. R i c h ~ r d H. Ullman, "Redefining Security," 111 Sean M. Lynn-Jones ,lnci Steven
E. Miller, eds., (;lobnl Dizn,qtvx (,'hilnging D r n ~ m s i o n sof Irrtr~~rmtional S ~ c r ~ r i (C~~rnhridge,
ty
Mass.: MlT Pre\s. 1995), 38.
14. E. H. Carr, N~ltio?ztz/rs~~~ mii Aftrr (London: hlr~crnillan,I94.5), 36, 5 8 , .5 I, 67-7 I .
15. John Hicks, "Maintaining (:.ipiral Intact: a F ~ ~ r t h Suggest~on,"
er Economics IX (New
Ser~es)( 3 4 ) (May 1942): 175, a Begrrffsgc~sc/~irhtr,or a history o t concepts, is also ,I hi\tory
of w h o it IS who Ihs the concepts.
16. Lord Castlereagh's <.onfidenr~.llStatc Paper ot May itli, 1820," in Sir A.W. W,lrd and
G.I? Gooch, cds., T l ~ rC'ln~brlri~c.Hlstory of British F o r c i g ~Policy ~ 178j-1919. vol. I1
((:alnhridge: C,imhrrdge U n ~ v e r s i tPress,~ 19231, app. A. 632.
17. Il)~d.,627-29, 632.
30 Widening Security
18. Sir J.A.R. Marriott, Castiereagh: The Political Life of Robert, Second Marquess of
Londonderry (London: Methuen, 1936), 299.
19. Michael Howard, "Reassurance and Deterrence," Foreign Affairs 61 ( 2 ) (Winter
1982-1983). Common security, too, was presented as a "slogan," a "way of thinking about
security," or as a source of "the words that convince and reassure"; see Emma Rothschild,
"Common Security and Deterrence," in Stockholm International Peace Research Institute,
Policies for Common Security (London: Taylor and Francis, 1985), 92, 101.
20. See Stephen J. Del Rosso Jr., "The Insecure State: Reflections on 'the State' and
'Security' in a Changing World," Dadalus 124 (2) (Spring 1995): 187-93.
21. Adam Smith, The Theory of Moral Sentiments, ed. D.D. Raphael and A.L. Macfie
(Oxford: Clarendon Press, 1976), 184.
22. Letter of 15 June 1820, in DipGches intdrtes du Chevalrer de Gentz aux Hospodars de
Valachie, vol. I1 (Paris: E. Plon, 1877), 62-63.
23. Friedrich Gentz, On the State of Europe before and after the French Revolution, trans.
John Charles Herries (London: J. Hatchard, 1804), 386.
24. Letter of 1705 in Die Werke von Lezbniz, vol. IX, ed. Onno Klopp (Hannover:
Klindworth, 1864-1873), 143.
25. Montesquieu, De l'esprit des lois (1748), bk. XII, chap. I1 (Paris: Garnier, 1973),
vol. 1, 202.
26. "securitatem autem nunc appello vacuitatem aegritudinis, in qua vita beata posita est" -
Cicero, "Tusculan Disputations," V. 42; Lexicon Taciteum, ed. Gerber and Greef (Leipzig: 1903).
Tacitus does also use "securitas" in something closer to the modern, collective sense when he
speaks of giving "safety and security" to Italy ("salutem securitatemque Italiae"): Hist.III.liii.
27. Smith, The Theory of Moral Sentiments, 156, 290; Adam Smith, An Inquiry into the
Nature and Causes of the Wealth of Nations, ed. R.H. Campbell and A.S. Skinner (Oxford:
Clarendon Press, 1976), 412.
28. Civil government, so far as it is instituted for the security of property, is in reality insti-
tuted for the defence of the rich against the poor, or of those who have some property against
those who have none at all." Smith, Wealth of Nations, 715. It is interesting that Condorcet,
writing in the same year, had a different view: "It is not only to defend those who have some-
thing against those who do not that the laws of property are made; it is above all to defend
those who have a little, against those who have a lot." Condorcet, Reflexions sur le commerce
des bles (1776), in Oeuvres de Condorcet, vol. XI, ed. A.C.OIConnor and M.F. Arago (Paris:
Didot, 1847-1849), 189.
29. Smith, Wealth of Nations, 689. Smith does say later, in discussing expenditure on just-
ice, that when defense becomes very costly, it becomes necessary "that the people should, for
their own security," contribute through taxes to the sovereign's costs. Ibid., 718.
30. "The security which it gives to the sovereign renders unnecessary that troublesome jeal-
ousy, which, in some modern republics, seems to watch over the minutest actions, and to be at
all times ready to disturb the peace of every citizen." Ibid., 707. The individual security of the
sovereign is again a Roman preoccupation: Seneca, addressing the Emperor Nero in De Clementia,
commiserates with Nero for his misfortune in not being able to walk in the city unarmed, but
assures him that he would be better protected by the love of his fellow citizens than by moun-
tains and turrets; a policy of clemency would provide "more certain security," or the security
that comes from a mutual contract in security ("securitas securitate mutua paciscenda est") -
Seneca, De Clem., I.viii.2-6, I.xix.5-6.
31. As Stephen Holmes says, "security was the idee maitresse of the liberal tradition." See
Stephen Holmes, Passions and Constraint: On the Theory of Liberal Democracy (Chicago, Ill.:
The University of Chicago Press, 1995), 245.
32. "Projet de Diclaration des droits naturels, civils et politiques des hommes" (1793), in
Oeuvres de Condorcet, vol. XII, 418-19; Franck Alengry, Condorcet Guide de la Rkvolution
Francaise (Paris: Giard and Briere, 1904), 405.
33. "Patriotische Aufsatze in Folge des Ryswycker Friedens - Assecuranzen" (1697), in
Leibniz, Werke, vol. VI, 231-33.
i What is Security? 31
A t first glance, it may seem a platitude to state that the use of chemical
weapons (CW) is a particularly reprehensible and morally unaccept-
able means of conducting armed conflict.' Yet how is it that among
the countless technological innovations in weaponry that have been used by
humankind, CW aln~ostalone have come to be stigmatized as morally illegit-
imate? Why have they been denied the legitimacy that is implied by the cate-
gorization of some means of warfare as "conventional," and conversely, how
have those conventional weapons avoided the stigma of lasting moral oppro-
brium? Finally, what do these discrepancies in legitimacy mean for the prac-
tice of violence in world politics?
Throughout history, numerous weapons have provoked cries of moral
protest upon their introduction as novel technologies of warfare. However, as
examples such as the longbow, crossbow, firearms, explosive shells, and sub-
marines demonstrate, the dominant pattern has been for such moral qualms
to disappear over time as these innovations became incorporated into the
standard techniques of war. As Alfred Mahan has put it, "the objection that
a warlike device is barbarous has always been made against new weapons,
which have nevertheless eventually been adopted."l Are CW just another
example of this process, and are the moral protests against this weapon
doomed to fade? O r is there something unique about the proscription of CW?
This article examines the sources of the C W taboo and investigates
whether there are any grounds to suspect that the norm proscribing the use
of C W differs from past restraints on other weapons - restraints that over
time have yielded to the ineluctable embrace of technology. I demonstrate
that neither of the usual answers to the C W conundrum - namely, the view
that CW are militarily useless and the assumption that the taboo is simply
No issue has attracted more attention in the CW literature than the import-
ant question of why CW were not used on the major fields of battle in World
War 11, a conflict in which few other restraints were observed and, indeed, in
which most existing prohibitions were violated. There is a virtual consensus
in this literature that the nonuse of CW in World War I1 is attributable to
three major factors: as summarized by one study, "the two sides warned each
other not to use chemical weapons at the risk of strong retaliatory action in
kind; a general feeling of abhorrence on the part of governments for the use
of CB [chemicaVbiological] weapons, reinforced by the pressure of public
opinion and the constraining influence of the Geneva Protocol; and actual
unpreparedness within the military forces for the use of these weapons.""
It is of signal importance that while some authors have privileged indi-
vidual factors over others for different stages and aspects of the story, none
of the major studies has dismissed the prohibitionary norm as irrelevant in
the overall explanatory e q ~ a t i o nThus,
.~ while some authors have argued
that legal and moral restraints did not directly affect decisions not to use
CW, they also recognize that the unpreparedness of the military establish-
ments cannot be taken as an unproblematic variable, but itself must be
explained. Here, normative and legal opposition to CW take their place in
explaining why CW were not used in World War 11, since these restraints
were vital in preventing the assimilation of CW.S
Many factors contributed to the failure of military establishments to be
adequately prepared for chemical warfare in the years leading up to World
War 11: moral and legal constraints that stigmatized CW, the uncertain mili-
tary value of CW, the resistance of tradition-bound military cultures, and the
extra logistical burden of CW, to name a few.6 The argument I make here is
not that the CW prohibition was an all-powerful norm that by itself deter-
mined the outcomes of nonassimilation and nonuse. Rather, I argue that the
existence of a stigma against using CW was a necessary condition for the
nonuse of CW. The stigma combined with those other factors to retard both
the political and the military acceptance of CW and ultimately to prevent
CW use during World War 11. Similar kinds of resistances often accompany
new weapons technologies, but rarely do they result in total abstention from
iJri i c Chemical Weapons 37
using the weapons in battle. In the absence of a taboo that politicized the use
of C W at the highest levels, these other restraints would likely not have been
sufficient t o prevent chemical warfare during World War 11.
The way in which the unattractive political implications of using CW
tipped the scales in allocation decisions against such armaments is but one
example of how this peculiar understanding of C W worked to prevent their
standardization. In Britain, the advocacy of full-scale capabilities by the Air
Ministry and War Office gave way to the priorities established by the
Treasury, as it was decided (by the Air Ministry) that "it would be illogical
to reduce our offensive or defensive capacity in more important directions
in order to include an ideal scale of provision for a weapon which it is
hoped will never be used. Gas provision is therefore a direction in which
some risk may legitimately be taken."'
The conception of CW as a weapon that might not be used helped retard
military preparedness for CW because it was held in conjunction with a
determination by each of the major Allied and Axis powers that none of
them would initiate the use of CW in the major theaters of battle. And after
all, these convictions were in accordance with the international legal expres-
sion of the CW prohibition, the Geneva Protocol of 192.5, which in essence
forbade the first use of (ZW."
Moreover, at the same time as preparations were allowed to lag because
of the possibility that CW might not be used, the politicization of CW also
meant that the burden of proof of what counted as being "adequately pre-
pared" to wage chemical warfare was raised to inordinately high levels, well
beyond the level of justification required for other weapons. This phenom-
enon came into play during the German failure to employ gas during the
Allied invasion at Normandy, when, as both sides recognized, the use of CW
might well have been decisive.' The German decision has been attributed to
two major factors: the fear of Allied CW retaliation against German cities
and inadequate offensive and defensive preparations.'o The Germans made
the latter assessments even though they had a six-month supply of C W at the
time, including the Luftwaffe's half million gas b o ~ n b sand spray tanks."
These developments all demonstrate the peculiar operation of the CW
taboo. It was not the case that it was utterly unthinkable for any belligerent
to countenance chemical warfare. Violations of the taboo might well have
occurred had other circumstances arisen.I2 Rather, the stigma against CW
raised the threshold of circumstances under which one could justify a resort
to CW to situations of desperation. In 1940, for example, the British con-
sidered the possibility of having to initiate chemical warfare in the event of
a German invasion; but such suggestions were put off in large part due to
the sentiment that CW use would comprise a major departure from British
principles and traditions. This departure would have such deplorable effects
that some began to wonder "whether it really mattered which side won.""
In short, while several factors in conjunction are important to under-
stand why CW were not used, this nonevent cannot be understood without
an appreciation of the necessary role played by the taboo attached to the
38 Widening Security
and Algeria, the Vietnam War, and the Soviet intervention in Afghanistan.18
These prominent cases suggest that something else has worked to restrain
the use of CW as a standard weapon of war that is not fully captured by
the logic of deterrence.
Indeed, a case could be made that the CW stigma, by differentiating CW
as an especially politicized category of weapons, was the enabling condition
that illuminates how the lack o f assimilation and fear of retaliation could
work together to prevent the use of CW but not other weaponry.'' This is not
to argue that the fear of retaliation or military resistance to C W is wholly
reducible to the CW taboo but only to stress that thc taboo was a necessary
condition for the avoidance of chemical warfare in World War I1 that cannot
be dismissed as peripheral. In the absence of processes that stigmatized the
use of CW as anything but a routine practice of warfare - especially the inter-
national institutionalization of this prohibition - it is entirely possible or even
likely that CW would have been used during World War 11.
In short, the CW norm is one that matters in explaining important out-
comes in international politics, a finding that leads to the central concern of
this article: how is it that CW have been so successfully constituted as an
illegitimate category of "unconventional" weapons in the first place? What
are the meanings and purposes of the taboo? Have they changed over time?
What are the implications o f any such transformations for the robustness of
the taboo? Before discussing the method introduced to answer such inter-
rogations, I will deal with other attempts to explain the CW taboo.
Sources of t h e CW Stigma
have had nothing to do with the prohibition against CW. I mean simply to
point out that most if not all other weapons share comparably dubious
qualities and thus that these qualities alone do not provide a sufficient
explanation of why CW and not other weapons have been proscribed.
Few would argue that being torn apart by burning shrapnel is anything
other than horrifying and inhumane. The difference is that, in contrast to
CW, most conventional weapons have not had such a politically successful
degree of odium attached to them, as the term "conventional weapons" itself
implies.
Michael Mandelbaum has authored the sole sustained account of which
I am aware that attempts to address the question of the legitimacy of CW
in the context of attitudes toward other weapons. In an effort to understand
the differing legitimacy accorded to nuclear and chemical weaponry as tools
of politics over the last forty years, Mandelbaum has sought an answer in
deep-rooted cultural and institutional restraints. In the end, however, he
argues that the aversion to chemical weapons may be deeply rooted in
human chromosomes. Because nuclear weapons are of relatively recent ori-
gin, he argues, humankind has not had enough time to develop a genetic
aversion to them.22 While Mandelbaum's approach goes beyond many of
the scholarly treatments of the CW taboo in attempting to place it in the
context of moral attitudes toward other weapons, his explanation is so
strained and implausible as to not merit serious consideration.
The reason for this inadequate explanation is instructive, however.
Mandelbaum has made the error of searching for the origins of the taboo
in logical reasons derived from contemporary understandings of the import-
ant characteristics of CW. He is forced into the Sisyphean position of trying
to demonstrate such a rationale because of the ahistorical and apolitical
structure of his argument, which treats the CW taboo as a static variable.
He deductively tries to account for the present moral status of CW and
nuclear weapons without reference to some of the unexpected political
dynamics of the past that may have shaped subsequent attitudes. The short-
comings of these approaches suggest that factors other than some inherent
aversion to the intrinsic features of CW have played an important role in
establishing the political salience of restraints against CW.
While the prohibition o n poison does not sufficiently account for the
origins of the C W taboo, over time the association of CW with poison and
with biological weapons has become important in sustaining the CW pro-
hibition. This has developed as the ~mderstandingof CW has been trans-
formed from their initial assessment as a potentially devastating or at least
effective fruit of technological progress wielded by the advanced powers, to
the view that CW are a n insidious equalizer wielcled hy the weak. Moreover,
this comparison between the two bans brings out the truly intriguing qual-
ity of the persistence of the CW taboo: unlike poison and perhaps even
nuclear or biological weapons, nothing in the nature of CW would cause
them to be defined as a technology against which there is little means of
defense. Indeed, of all recent weapons innovations C W are probably the
most susceptible to defensive measures. Nor is it simply true, however, that
CW are therefore ineffective weapons. While the effectiveness of CW can be
reduced due to liabilities such as defensive measures or dependence on wind
conditions, CRf can be devastatingly effective in certain tactical and stra-
tegic conditions, as both sides recognized during situations in World War 11
such as the D-Day landings at Normandy. In short, it is not possible to
account for the peculiar reception of gas weapons during this period simply
by virtue of their objective characteristics.
future as well as into the past."41 The fallacy of confusing rational functions
for origins was a prominent and consistent theme in Nietzsche's writings on
the origins of morality.42 As a corrective, Nietzsche proffered the genea-
logical method, an approach that seeks to uncover the conditions under
which moral institutions are devised and to interpret the value that these
norms themselves possess.43
The analysis adopted in this article to untie the conundrum of the CW
taboo has as its main influence insights generated from this method, one
of many traditions of interpretive and constructivist social science.44 The
genealogical approach, which more recently has been popularized through
the writings of Michel Foucault, is particularly well-suited for an analysis
of the norm proscribing CW as it is a method specifically concerned with
interpreting the origins of moral interpretations. And as Nietzsche explained
with respect to his own studies of asceticism, the chief contribution of such
inquiries is on the "how" questions of meaning more so than the "why" ques-
tions of explanation:
It is my purpose here to bring to light, not what this ideal has done, but
simply what it means; what it indicates; what lies hidden behind it,
beneath it, in it; of what it is the provisional, indistinct expression, over-
laid with question marks and misunderstandings. ... what is the mean-
ing of the power of this ideal? ... Why has it been allowed to flourish to
this e ~ t e n t ? ~ "
For Foucault, as for Nietzsche, what is most often found at the histor-
ical beginnings of things is not "the moment of their greatest perfection,
when they emerge dazzling from the hands of a creator."46 Rather, the
development of institutions often consists of rationally inexplicable events,
"fabricated in piecemeal fashion" out of the vicissitudes of history.47AS a
result of the marriage of chance occurrences, fortuitous connections, and
reinterpretations, the purposes and forms of moral structures often change
in such a way that they come to embody values different from those that
animated their origins. As Nietzsche put it,
The cause of the origin of a thing and its eventual utility, its actual employ-
ment and place in a system of purposes, lie worlds apart; whatever exists,
having somehow come into being, is again and again reinterpreted to new
ends, ... and the entire history of a "thing," an organ, a custom can in this
way be a continuous sign-chain of ever new interpretations and adapta-
tions whose causes do not even have to be related to one another but, on
the contrary, in some cases succeed and alternate with one another in a
purely chance fashion.48
of the CW story - the U.S. position. The United States moved from being the
only opponent of the first CW ban (the Hague declaration) to being the pri-
mary proponent of efforts to ban CW after World War I (the Geneva Protocol),
a ban which the U.S. sought and achieved but then ultimately failed to ratify.
The genealogical stance is favorably placed to account for the interests and
identities forged out of "the events of history, its jolts, its surprises, its unsteady
victories and unpalatable defeatsn4"- a task especially apposite for the uneven
record of the norm proscribing chemical weapons.
The genealogy of the CW taboo thus seeks to remedy the deficiencies of
essentialist and deductive approaches by making the basic move of histori-
cizing the accepted moral interpretations of weapons technologies and the
place of CW within this moral domain. This operation reflects an under-
standing of the role of genealogy as an effort to find history where it is not
expected to he - within moral institutions and practices that are usually
thought to be exempt from the contingencies of historical tangles."'
Besides emphasizing the importance of historical contingency in the
social construction of norms, the genealogical method influences the fol-
lowing analysis of the CW taboo through the employment of two of the
genealogist's analytical tools: discourses and power. Discourses, the favored
analytic focus of Foucault, are theoretical statements that are connected to
social practices." These discourses produce and legitimize certain behaviors
and conditions of life as "normal," and serve to politicize some phenomena
over others. As stattd by James Keeky, discourses "also may produce
behaviour defined as deviant, which is then used to justify the maintenance
and development of the system intended to control or eliminate it.""
For Foucault, the production of disco~~rses is a form of power, which he
termed "disciplinary" power." The production ot a discourse constructs
categories that then~selvesmake a cluster of practices and understandings
seem inconceivable or illegitimate. This disciplinary power sets a field of
conceptual possibilities that defines what is normal and natural, and what
is unthinkable and r e p r e h e n s i b l e . ' ~ r o h i b i t i o n a r ynorms in this sense d o
not merely restrain hehavior hut are productive in that they constitute iden-
tities and impose meanings of what is to count as legitimate reality. Norms
as conceived in this constructivist account are closely tied to the formation
of identities, as "we form our identities hy conforming ourselves over time
to tacitly understood norms and generally accepted practices," in the words
of David Couzens Hoy. "
Using these categories of analysis to examine international politics,
genealogy injects a different dimension of power into the study of norms,
an element that often seems neglected in the attempt to distance the role
of norms and ideas from realism's focus on material power.jh While a
Nietzschean genealogy might share with realism a focus on the power rela-
tion in human affairs, the differences between these two approaches are
several and substantial. Conflicts over interpretive truths - that is, the exer-
cise of power - are located at different sites than the power relations usu-
ally examined in international relations scholarship. As James Der Derian
46 Widening Security
T h e Political Construction of T e c h n o l o g y
An analysis ot the discourse at the Hague Conferelices reveals that the initial
consideration of gas shells was fundamentally different from that of other
weapons. Limitations on a number of weapons were discussed at the confer-
ences - submarine mines, muskets, balloons, submarine torpedoes, explosives,
field guns, and so on. With the exception of durn-durn bullets and asphyxi-
ating shells, however, the limitations that were agreed upon took the form of
proscribing certain uses of certain kinds of weapons. The dominant under-
standing within which the subject of weapons linlitations was situated was an
interpretation of technology as a value-neutral phenomenon. Technologies
were not regarded as in and of themselves immoral; their moral value was
understood to depend upon how they were used. The unique aspect of the
emergent CW norm at the Hague conference of 1899 is that it did not follow
this understanding and simply ban particular uses of such shells (e.g., against
civilians), while implicitly conferring legitimacy upon their use against sol-
diers in the field. Rather, the Hague declaration took the form of a more
absolute prohibition in that any kind of first use of such weapons was to be
regarded as unacceptable. In this way, the ban served to define gas shells as a
particular and distinct category of weapon, a phenomenon that subsequently
has proved critical in the politicization of CW.
This emergent norm was unique in the sense that it anticipated the intro-
duction of a new technology of warfare.'" The protests that accompany the
introduction of a novel weapon usually represent the cries of a surprised
and technologically disadvantaged victim. The preemptive proscription of a
weapon, however, could lend unusual and more universal force to objec-
tions to their introduction, for such an act would constitute a breach of a
formal agreement of international law reached by the civilized members of
the family of nations."'
An analysis of the C W discourse during the course of World War I reveals
that this is in fact what occurred. To the extent that gas weapons were sin-
gled out and politicized ahove and beyond other new weapons, it was not
solely because they were perceived as more cruel than other weapons but
because it was understood that their use was a violation of the Hague dec-
laration.'" And quite unlike any other weapon, the use of gas weapons was
politicized even though they were used solely against combatants. This dif-
ference is indicative of the absolute quality of this carving out of a political
space for CW. Again, this is not to downplay the importance of a particular
moral revulsion toward gas in the development of the taboo but simply to
48 Widening Security
point out other crucial respects in which the CW experience departed from
the usual revulsion toward other novel weapons.
The CW experience of World War I also was anomalous in that the stipu-
lations of the Hague declaration were adhered to until well into the war.
The British development of gas weapons was fully in accord with and dic-
tated by their understanding of the legal stipulations of the 1899 declara-
tion. So, too, British employment of gas weapons was restrained by the
nascent CW norm: they only used gas weapons in reaction to German use.67
Similarly, the decision of the French to formally authorize toxic shells was
delayed for some time, as French authorities felt bound in some measure by
the Hague d e ~ l a r a t i o nNormative
.~~ constraints also were important in one
further respect. Despite the widespread use of CW during World War I,
none of the belligerents intentionally employed CW against civilians even
though civilians had been attacked by other means, such as submarine
attacks and air raids. This nonevent not only was the product of normative
restraint but it also has subsequently helped to set CW apart as a politically
potent symbolic threshold, a function these weapons have continued to
serve ever since.69 Indeed, it can be speculated that had CW been used
against civilians during the war, they would have been grudgingly accepted
as yet another inevitability of modern warfare. (Many soldiers who had
been exposed to CW resigned themselves to the similar view that CW were
just one of many new weapons introduced in the war to which soldiers
must accommodate t h e m s e l v e ~ . ) ~ ~
These developments are important because they illustrate significant
effects of the discursive definition of CW begun at the Hague conference of
1899 that have gone neglected in CW literature. This neglect is a result of
the assumption that the Hague norm could not have played any significant
role in the development of the CW prohibition, given its apparent obliter-
ation during World War I. Ann Van Wynen Thomas and A.J. Thomas,
authors of one of the most judicious studies of the CW norm, have argued
that even if there was a customary norm proscribing the use of CW by the
time of World War I, "it did nothing to restrain the use of gas" during that
conflict.71 On the contrary, the experience of CW use during World War I
demonstrates that the Hague prohibition had carved out a political space
for CW - the use of CW was seen as a violation of acceptable behavior,
a departure from civilized conduct that needed to be dis~iplined.'~
The peculiarity of this treatment of CW was remarkably in evidence dur-
ing postwar efforts to reaffirm a ban on gas weapons. At the Washington
conference of 1921-22, U.S. Secretary of State Charles Evans Hughes
pushed through an absolute prohibition on any first use of CW despite the
unanimous recommendations of a subcommittee of experts that "the only
limitation practicable is wholly to prohibit the use of gases against cities
and other large bodies of noncombatants in the same manner as high explo-
sives may be limited."73 While Hughes was prepared to accept the same kinds
of limitations on CW as on other weapons if the proposal had encountered
stiff opposition, the resolution was accepted as Article V of the Washington
Chemical Weapons 49
treaty.74 Its acceptance was made possible by the helief of the delegates a t
the conference that such a prohibition was neither new nor terribly import-
ant. O n the one hand, they saw it as merely reaffirming previous bans (the
Hague declaration, whose violation during World War I left little confidence
in such treaties, and Article 17 1 of the Versailles treaty, which was essentially
an anti-German provision). Furthermore, it was believed that such a treaty
was not terribly important as it would not prevent preparations for c l i e ~ n -
ical warfare. Even though this treaty never came into effect, the clause ban-
ning C W lived o n in the sense that it served directly as the basis and even
rationale for the Geneva I'rotocol of 1925, which in turn has operated as
the focal point of the (:W norm for almost seventy years.-' 111 genealogical
fashion, then, the invocation of an institutional tradition as a rationale for
renewed efforts t o ban <:W thus obscured a less than glorious ancestry. And
as Nietzsche wrote.
These ~ n t e r n ~ t ~ o ntreatles
'll themselves were m'ide poss~bleby an Inter-
war hysterl'i ~ h o u (t W that was created by the over7ealous lohbymg efforts
by c h e r n ~ c ~~ndustrles
~l ,lnd gas warfare dep,~rtments.Espec~,llly In B r ~ t a n
and the lJmted States, these b o d ~ e smade "tot,ill\ ~ r r e s p o n s ~ b ... l e exagger-
atlons of new weapons developments" In order to secure c h e m ~ c a lt m t t \
--
'lnd the surv~\,llof chem~c,llwarfare department\. T h e fearful x e n a r l o s
o t tuture d a n g c ~constructed around C W were \o effectwe because they
encountered n o oppooltlon ~ ~ n~tt was ~ l too late: the same d ~ a l o g u eof dread
w ~ bs e ~ n g~ n s c r ~ p t eby d the opponents o t gas w,i~-fare.-~ In t h ~ swa), a n
Iniclge of C W was constructed tar o u t o t proportion t o the a c t u ~ danger l
the\ reprewnted a t the tlme. As ,I 5IPRI report noted, "To anyone w h o was
prepared t o c o n s d e r the p o t e n t ~ a h t mof C W d~spa\s~onately, ~twould habe
heen clear that the chern~calthreat d ~ not d d ~ f f e markedlv
r from that posed by
h~gh-explos~ve weapon\. Ag,unst well-equ~ppedm d w e l l - d ~ s c ~ p l ~ ntroops, ed
the chem~calwe'ipons ot the time would never he o\erwhelmlng; 1 t anyth~ng,
thew eff~cacyh'id decl~nedsmce 19 18."'"
In short, the C W taboo was reborn trom the 'ishes of World War I not
bccausc C W were perce~vedas n i ~ l ~ t a r r luseless y - quite the opposite. But
t h ~ sd e p ~ c t ~ oofn C W reveals that the p r o h r b ~ t ~ o1sn best understood as a
p o l ~ t ~ c construction
al whose ~ n \ t ~ t u t ~ o n a l ~ zh'is
a t ~In
o nturn helped t o ener-
v legltlm17e the threat t o w h ~ c h~t was supposed t o be a
g17c p o l ~ t ~ c a l l'lnd
r e a c t ~ o n . ~The
" p o l ~ t ~ c ~ ldleyc ~ s ~ vmscrlptlon
e of that threat In part was
made poss~blebv the m ~ ~ c a l c u l a t ~ oofn sa gas lobby whose strategy back-
t ~ r e d .t v e n so, the leg~tlmacvo t ~ n t e r n a t w n a ltre'lty law would l~kelynot
habc been ~ m p a r t e dt o the Interwar CW p r o h ~ b ~ t r own~ t h o u the t legacy of
the Hague d e c l , ~ r a t ~ o nw, h ~ c hu n ~ q u e l yh ~ adl t ~ c ~ p a t ethed appearJnce o t
50 Widening Security
Since its origins, the prohibition against CW has come to function as a sym-
bol of the hierarchical relations of domination in the international system.
It was seen above that the Hague ban was in a particular sense an absolute
prohibition. It was not, however, unreservedly universal. Strictly speaking,
the declaration established a discriminatory regime insofar as its language
stipulated that the ban against asphyxiating shells was "only binding on the
Contracting Powers in the case of war between two or more of them."
Furthermore, the declaration stated that "it shall cease to be binding from
the time when, in a war between the Contracting Powers, one of the bel-
ligerents shall be joined by a non-Contracting Power." Those contracting
Chemical Weapons 51
powers were the nations that would count as the members of an emerging
society of civilized states. That is, one of the qualifications for gaining the
status of a civilized nation was to partake in the regulation of warfare that
began among the European society of states in the mid-nineteenth ~ e n t u r y . ' ~
The emerging awareness of a standard of civilization during this period
is noteworthy for this study in several respects. First, part of the larger his-
torical explanation for the origins o f the CW taboo lies in the emergcncc of
concentrated and organized attacks on the institution of warfare as immoral
and uncivilized during this period. While it generally was still believed at this
time that war was natural and inevitable, the rise of these voices of protest
led to efforts to ameliorate warfare, most notably the Hague confere~ices."
Second, the brandishing of a standard of civilization in connection with
the CW taboo recalls some earlier weapons bans in history. In particular, the
oft-cited Lateran Council decree of 1I39 outlawed the use of the crossbow,
but only against Christians; against heathens, the crossbow was deemed an
entirely appropriate weapon.xhThis tendency to permit the use of otherwise
outlawed weapons against an alien "other" has been observed by Robert
O'Connell, who has drawn a comparison to the savagery of interspecific
competition as opposed to the circumscribed rituals of intraspecific compe-
tition." To some extent, the contractual language of the Hague conterences
implicates the origins of the CW taboo in such exclusionary practices.
Nevertheless, the Hague ban differed from earlier bans since it was
reached before any nation actually had such weapons in their arsenal. This
situation permitted the circumvention of the amoral monopoly that often
accon~paniesthe exclusive possession of a novel method of warfare. That
is, the historical record indicates that moral qualms about the use of novel
technologies of destruction issue most prominently ( i f not surprisingly) from
those upon whom the weapons initially are inflicted. Moral objections may
continue oncc the monopoly is lost and the initial victim incorporates the
new weapon (as with the crossbow), but the overwhelming tendency is for
such moral concerns to fall by the wayside as the possibilities of technology
are embraced by more than one party. With asphyxiating shells this was not
the case. As alluded to earlier, the moral protests that accompanied the first
use of such weapons were not simply the usual cry of the unsuspecting vic-
tim but were an expression of outrage at the violation of mutually agreed-
upon conduct among the club of civilized nations.
The significance of this feature of the prohibition, then, lies in the fact
that such a ban is not so easily dismissed once the other attains the novel
weapon. The unique character of the effort at the Hague to institutionalize
' proh~b~t~
1 agalnst
on the e n t m category of we'Ipon5 known as asphyx~at-
mg shells thu5 comes to assume more Importance than 1s usually acknow-
ledged i n the CW I~terature.
If the symbol~cconnection of CW w ~ t hthe standard of c~vrl~zed conduct
has made ~t more d ~ f f ~ c ufor
l t advanced natmns to employ these weapons as
lust another unremarkable, u n p o l ~ t ~ c ~ z and
e d , standard means of w ~ r f a r e ,
52 Widening Security
it has also played a part in the use of CW against "uncivilized" areas. The
invocation of the disciplining discourse of civilization was in operation dur-
ing the two most significant violations of the CW taboo since World War I:
their use against Ethiopia by Italy in 1935-36 and during the Iran-Iraq War
of the 1980s.
The use of CW against Ethiopia led some to expect - and fear - that their
employment would be a matter of course during World War 11." For others,
however, the assessment was different: war among the industrialized nations
of Europe was a different matter than conflicts involving less technologically
advanced areas, such as the colonies.89 The surprising lack of gas warfare
during World War I1 can thus be understood as implicated in a process by
which the conduct of war among "civilized" nations was demarcated from
that involving "uncivilized" nations. As George Quester has put it, a stand-
ard view of world affairs after Versailles was that the arenas of European
war and colonial war might well have been separable.y0And the use of CW,
while still abhorrent, might be less unacceptable in one area than another.
This phenomenon of differentiation in the acceptability of forms of
warfare has received attention from a number of authors, most forcefully
perhaps by John Mueller. For Mueller, major war - war among developed
states - has been subject to a gradual obsolescence that has not occurred in
other areas of the globe.91The occasional ruptures of the CW taboo reflect
the understanding that modern warfare between industrialized powers is
qualitatively different from war involving an uncivilized country.y2 As the
Italians argued, the "Ethiopians have repeatedly shown she is not worthy
of the rank of a civilized n a t i ~ n . " ' ~CW signified this difference: among
advanced nations they served as a potent symbol of prohibitive levels of
modern destruction, pregnant with the possibility of a standoff maintained
at levels of destruction lower than what was technologically possible. At the
same time, they were implicated in the process of the hierarchical ordering
of international politics into the civilized and uncivilized arenas.
On these and other grounds there are significant parallels between Italy's
use of CW against Ethiopia and Iraq's use of CW during the Iran-Iraq War.
Iraq did not even admit to the use of CW until the last year of the war. Even
then, Iraq's leaders stated that they supported the general rule prohibiting
the use of CW and justified their use as the "right to defend itself and pro-
tect its territorial integrity and its homeland."94 One need not attribute too
much credence to Iraq's claims to abide by the CW norm to notice that
something significant had not occurred: a reopening of what has over time
become the humanitarian core of the CW norm.
During World War I, the Germans explicitly questioned the very purpose
and integrity of the norm prohibiting CW by arguing that gas weapons were
no less humane than the guns and howitzers, which made life in the trenches
such a "terrible helLX9'And during the 1920s, so vociferous were the argu-
ments that CW actually were more humane than other weapons that the
Geneva Protocol was rejected by the U.S. Senate. Typical of such a position
was the contention of Senator Reed that the CW ban would prevent the
I Chemical Weapons 53
United States "from using gas against the next savage race with which we
find ourselves in war, and would compel us to blow them up, or stab them
w ~ t hbayonets, or r~ddlethem and sprlnkle them w ~ t hshrapnel, or puncture
them w ~ t hmachlne-gun bullets, ~nsteadof hllnding them for an hour or so
until we could d ~ r a r mthem. That IS the 'human~ty'that IS attempted to he
worked out by the Geneva Protocol."'"
As w ~ t hthe Ital1an5 In 1935-36, however, the Ir,~q,smade no attempt to
leglt1m17etheir use of CW on the b a s ~ sof the alleged humanltar~anqual~ties
of CW. Lracl'5 u n w ~ l l ~ n g n etos ~challenge the vlem that C W are p a r t ~ c u l a r l ~
hemous is lndicatlve of a substantial strengthen~ngof the norm over tlrne.
Th15 strengthen~ng1s In turn due to the acceptance of a human~tariand ~ m e n -
slon that has hecome ~ n ~ r e a s ~ n ley5 g l y open to quewon. The foreclos~ngof
the humanltar~anchallenge to the CW taboo o n e s much to the legacy and
leg~trmacyot the CW p r o h i b ~ t ~ oemhrmed
n In ~nternat~onal
law: the G e n e ~ a
Protocol has ~nip,irted,7n ~nstttutwnalImprlrnatur to the vlew that C W are
~nhuinanethat has been denled to opponents of the taboo.
But I do not say that we are opposed to the Paris conference's objectives.
We agree with them. We just hope that parallel disarmament efforts will be
developed in both spheres - nuclear and chemical weapons."99
In short, the disciplinary implications involved in characterizing CW as
the poor man's bomb have been turned on their head. The link between the
two classes of weapons established by the analogy has been appropriated by
some nations in the developing world - the Arab nations in particular - by
situating it within a broader discourse of "weapons of mass destruction."
This discursive usurpation was notably in evidence at the Paris confer-
ence of January 1989, which had been proposed by the United States to
reinvigorate the norm prohibiting the use of CW in the aftermath of the
Iran-Iraq War.''' At this conference, representatives of Arab and other coun-
tries requested the establishment of a link between nuclear and chemical dis-
armament and declared that there could be no question of applying to CW
so discriminatory a rationale as that of the nonproliferation treaty on
nuclear weapons. They demanded that the process of prohibiting C U must
be part of a process to prohibit the entire category of weapons of mass
de~truction.~Ol As Egypt's foreign minister stated at the conference, "It would
not be logical for the international community to permit to some countries
in the most sensitive regions of the world the nuclear option without the least
international control, while the same international community demands the
total prohibition of chemical weapons. We consider that the progress in the
field of the prohibition of chemical weapons is linked to the realization of
a parallel prohibition on the level of nuclear weapons."lo2
For the industrialized world, the category of weapons of mass destruc-
tion has served as the touchstone for efforts to curb the proliferation of
advanced weapons systems in the Third World. The Arab world, however,
has appropriated this discourse in a manner that has made explicit the dou-
ble standard in the antiproliferation designs of the industrialized world:
while the Third World is re vented from acquiring deterrents such as nuclear
or chemical weapons, the Western powers are permitted to retain their
weapons of mass destruction - conventional and otherwise - as legitimate
tools of diplomacy.'03 Israel's undeclared nuclear arsenal is a particular con-
cern in this strategy of linkage, and it was on these grounds that the Paris
conference polarized opposition between a North anxious about prolifer-
ation and a South intent on redressing the selectivity and imbalance in the
international proliferation regime.lo4
This appropriation of the mass destruction discourse is a remarkable
example of an attempt at the kind of interpretive reversal that Nietzsche and
Foucault had in mind in their writings on moral discourses. As Foucault
wrote, "The successes of history belong to those who are capable of seizing
these rules, to replace those who had used them, to disguise themselves so as
to pervert them, invert their meaning, and redirect them against those who
had initially imposed them." lo5
Most important to note for the purposes of this article is the effect of this
attempted usurpation on the illegitimacy of CW. Taken to its extreme, the
Chemical Weapons 55
possessing nuclear weapons. This has become the primary axis of contesta-
tion around which revolves the acceptability of a p r ~ h i b i t i o n a rnorm
~
against CW. The resistance of the Arab world to the Chemical Weapons
Convention (CWC) is centered on this disparity.l10 By transforming the CW
norm from a taboo against use into a prohibition on possession, the con-
vention is perceived to perpetuate a discriminatory disarmament regime,
which permits the possession of nuclear weapons by some nations but denies
weapons of mass destruction to other nations.
The argument I make here is that this shift in the site of contestation of
the norm - from earlier debates over the alleged humanitarian benefits of
CW to contemporary efforts to extend the nonproliferation regime of
weapons of mass destruction - is indicative of the consolidation of the taboo
over time. Resistance to the transformation of the norm from use to posses-
sion is restricted to a small group of nations."' In addition, the main thrust
of this resistance has not challenged the unacceptability of using CW so
much as it has questioned the legitimacy of possessing other weapons of
mass destruction, including the definition of what counts as such a weapon.
Conclusion
The origins, development, and functions of the CW taboo attest to the value
of a genealogical analysis of meanings, which searches out the contingency,
domination, chance, and resistances involved in the operation of a moral
discourse. While it exhibits all of these things, the CW taboo is also testi-
mony to the genuine moral rejection of a means of modern warfare that
arose a t a particular historical juncture - one that questioned the untram-
meled technological warfare among the advanced industrialized states of
the civilized world.
In addition to the factors habitually identified in the literature as explain-
ing the CW taboo, this study has uncovered further dimensions of this pro-
hibition that are no less important in giving an adequate account of its
origins and persistence. The importance of these elements - the portrayal of
CW as a weapon against which there is no defense, its symbolic connection
with a notion of civilized conduct, the castigation of CW as a weapon of
the weak akin to poison, the genealogical legacy of the institutionalized
form of the taboo promoted and practiced by political leaders, and so on -
has varied at different moments in the CW experience. In total, however, all
have combined to constitute a tradition of practice that forbids the use of
CW and characterizes it as abnormal behavior among the society of states.
Interpretive and constructivist approaches to phenomena such as norms
in international relations can only enrich our understanding of the world of
global politics. However, the disciplinary hegemony of neopositivist modes of
inquiry in the field of international relations has in the past served to narrow
the range of what counts as legitimate scholarly activity. This methodological
I' + Chemical Weapons 57
c o n f o r m ~ tha\
~ been c'lrrled to such extremes that some scholars - In the
name of defending t h e ~ rpreferred theory - have d ~ s m ~ s s ethe d end of the cold
war as an ~ n s r ~ n ~ f ~data
c a n polnt
t that does not fals~fyw e n t ~ f theory,
~c rather
t h , ~ nallowing that other modes of lnqulry may contrrbute t o the accumula-
tlon of knowledge by the community of scholars.
The recent Influx of " p o s t p o s ~ t ~ v ~ methods
st" I \ thus a welcome devel-
o p m e n t for thc field."' On the other hand, t h e adoption o f putat~vclynovel
methods of lnqulry can all t o o e ' d y turn into a f a d d ~ s hr e p l ~ c a t ~ oofn the
very phenomenon that was to be deposed In the flrst place: the c h o ~ c eof '1
method for ~ t own s s,~ke.The startlng p o ~ n tfor drawlng from the lns~ghts
ot methods such as genealogy 1s the convlctlon that research should be
que"t")n- r,~thcr than m e t h o d - d r ~ v e n . ~ "Methociolog~esshould be judged
by t h e ~ rvaluc In openlng up ~ n s ~ g h t f uImportant,
l, and f r u ~ t f u lavenues o t
lnqulry and t h e ~ rab111n to p r o v d e appropriate 'lnswers to the questions
the) pose.
Author's N o t e
Earlier drafts of this article \vc.1-e presented at Cornell Uni~crsiry'sPeace Studies Progr,iiii; a
Social Sc~enceRewarch < ~ o t ~ ~ ~ c ~ l / M a c Aworkshop
rtliur on norms and national securit); Ithaca,
New York, February 1993; a n d the annual meeting of the American Political Science
Associat~on,Wxhington, I).(:., 2-5 Septernher 1993. I thank rhosc who comriiented o n the
pdper at those forums, as bvell .is Joseph C ~ m ~ l l e rPeter
i, Karrensrein, Stephen Krnsnet; Judith
Reppy, <:hr~st~.ln Heu-Srnir, Henr) Shue, L)anlel Thoti~as,Alexander Wendt, Mark Zaclier, and
three anonymou., re\lewer\, .ill of \vIiom provided valu:~hleconirnents on v.lrlou\ version\ of
this pu)ject. I gratefully acknowledge the support ot .I Social Sc~encesand Humanities Kese.lrcli
Council o t C d n a d ~doctornl fellowship. The epigraph is fro111 t:r~edr~ch Nietrsche, Rcyotd
(;ood iarzri t ~ ~tr,In\.
l , W,ilter K,lutmann ( N e w York: V ~ n r ~ gBook\.
c. 1 %6), apliori\m 108.
Notes
5. See SIPRI, The Rise of CB Weapons, pp. 321-22, and 334; and Brown, Chemical
Warfare, pp. 293-96.
6 . Without dismissing altogether a role for the CW prohibition, Legro offers an organiza-
tional culture explanation for the unpreparedness of militaries and the nonuse of CW. See
Jeffrey Legro, Cooperation Under Fire (Ithaca, N.Y.: Cornell University Press, 1995).
7. The quotation is from Paul Harris, "British Preparations for Offensive Chemical
Warfare 1935-1939," ]oumaI of the Royal United Sevvices Institute for Defence Studies 125
(June 1980), p. 61, emphasis mine. Similarly, the international legal restraints against CW were
at least partially responsible for the low priority given to CW allocations in Germany. See
Dr. Hans Fischer and Dr. Wirth, "What Were the Plans and Intentions of the German High
Command in the Question of Using Chemical Warfare? What Were the Reasons for Refraining
from the Use of Chemical Warfare?" Historical Office of the Chief of the Chemical Corps,
German Chemical Warfare, part 2, Civilian Aspects (Washington, D.C.: Historical Office of
the Chief of the Chemical Corps, 1956), p. 328.
8. The no-first-use pledge was not written into the protocol itself but instead resulted from
the reservations most nations attached to their accessions. These reservations stipulated that
the protocol would cease to be binding toward any power that violated it.
9. See Herman Ochsner, The History of German Chemical Warfare in World War 11, Part 1,
The Military Aspect (Washington, D.C.: Historical Office of the Chief of the Chemical Corps,
1949), p. 23; and Omar N. Bradley, A Soldier's Story (New York: Henry Holt and Co., 1951),
p. 279.
10. See Robert Harris and Jeremy Paxman, A Higher Form of Killing: The Secret Story
of Chemical and Biological Warfare (New York: Hill and Wang, 1982), p. 135; Ochsner, The
History of German Chemical Warfare in World War II, p. 23.
11. See SIPRI, The Rise of CB Weapons, p. 325; and Harris and Paxman, A Higher Form
of Killing, p. 325.
12. The maintenance of the taboo owes no small part to the fortune of history that such cir-
cumstances never arose and to the subsequent importance of the resulting abstinence (whatever
the reasons), which built a tradition of nonuse and reinforced the stigma against CW. The fact
that CW were not used during World War I1 has in and of itself become a major justification for
the CW prohibition. For example, during U.S. Senate hearings over Iraq's use of CW in the early
1980s, it was remarked that CW surely were reprehensible since even Hitler did not use them.
No one present knew why Germany refrained from employing CW during World War 11, but the
salient fact remained: "We do know it did not happen." See U.S. Congress, Senate Committee
on Foreign Relations, United States Policy Toward Iraq - Human Rights, Weapons Proliferation,
and International Law: Hearing Before the Committee on Foreign Relations, l 0 l s t Congress, 2d
sess., 15 June 1990, p. 51.
13. These are the words of Major General Henderson. See Harris and Paxman. A Higher
Form of Killing, p. 110.
14. According to a military intelligence officer, the war was expected to he "chemical prob-
ably from the very first hour." See Melissa Healey, "Chemical Attack Would Escalate Allied
Retaliation," Los Angeles Tunes, 21 February 1991, p. Al.
15. See United Nations Security Council, doc. Sl24828; and Chemical Weapons Conventton
Bulletin, no. 17, September 1992, p. 12.
16. Quoted in Healey, "Chemical Attack Would Escalate Allied Retaliation".
17. Thus, CW were not used even as other restraints against US. use of CW versus the
Japanese began to erode toward the end of the war. These included the death of President
Roosevelt, who had been staunchly opposed to CW use, and the effects of American racist
propaganda, which demonized the Japanese and made the use of gas more palatable to much
of the American public. See SIPRI, The Rise of CB Weapons, pp. 294-335.
18. Although the United States did not use lethal CW in Vietnam, it did use riot-control
agents and defoliants, maintaining that use of those agents did not constitute chemical warfare.
See ibid., pp. 162-210. Allegations of Soviet use of CW in Afghanistan, while rampant in the
atmosphere of the cold war, never have been substantiated.
I I Chemical Weapons 59
19. In a sirnil,lr ,pirir, the first volume of the SIPRI study argues that while many factors
prcvrnteci the usc of CW, "at a deeper level, there was the whole question of accepting gas as
1' weapon o f war, w ~ t h~ l the l ~ n s t ~ t u t i o nand
~ ~ lp s y c h o l o g ~ c ~disturbances
l that this w o ~ ~ l d
involve." See ihid., p. 3 3 1.
20. See, for exan~ple,Nicholas F o t ~ o nand Gerard t l f s t r o ~ n Milttciry
, Ethics: Gzlid~l~ttes
for
P C L ~ unci
C P Wtrr (London: Routledge and Kegan Paul, l986), p. 168.
21. John Haldanc, "F.thics and Biological Warfare," Arms Control 8 (May 1987) pp. 24-35.
Although ni.tdc rcgnrd;nr: h;ologic~ilweapons, Haldane's comment< are still relevant. See :ilso
Martin Van Creveld. Techtrology c7nd War (New York, Free Press, 1989), p. 72.
22. Michael M,indeIbau~n. T h e Nuclear Revoltition ((Lmbridge, England: Cnmhridge
University Press, 198 l ) , chap. 4.
23. Indeed, this taken-for-granted q u a l ~ t yof the poison t ~ h o owas In evidence at the H a g ~ ~ e
Conferences. Article 2 3 ( a ) banning poison was reached w ~ t h o u tcontroversy o r even substan-
tive discuss~on;the moral t ~ h o oagainst polson had become .in uncontested norm that needed
no rationale or j~ist~ficatioti. See William 1. Hull, T / J CTtuo H'zgue Conferences (Boston: G ~ n n
anti Co., 1908), pp. 232-3.3. This was in evidence some years earlier a t the Brusselq confer-
ence. See T.J. I,,lwrence, Pritrriples of lnt~rnat~onerl 1 . i ~(Boston: D.C. Heath, 1923),
pp. 55-56; and lames Lor~mer,T I J institutes~ of thc 1 . m ~of~ Ncrfions(Edinburgh: Blackwood
and Sons, 188.3), Appendix 1.
24. For references to the e,irly disdain for poison see Hugo Grotius, T / J I ~. ~ I Lof~ W h cznd
Peare (Ile lure Kelli ac P,ic~sLibri Tres), trans. Francts Kelsey (New York: Bobbs-Merrdl,
l925), bk. 3, c h ~ p s .15-16; Adatn Roherts and R~chardGueltt, Documents o n the 1.~710sof
War (Oxford: Clarendon I'ress, I Y82), p. 29; and A.A. Roherts, Poison in W~lrfare(1.ondon:
William Heinem;lnn, 1915), pp. 52-57.
25. C h r g Schwarzenberger, I.c~ulity of Nttclrar W ( W ~ O I(1.vndon: IS Stevens and Sons,
1958). p. 31.
26. Grot~us,I ~ t of v K<iu nnd Pmcc, hk. 3, chap. 4, sectloti 15. Vattel in 1758 offered 1'
sim~lardefense ot the p r o h i h ~ t ~ oagalnst
n poison weapons, arguing that s ~ ~ means ch only made
war more deadly without e ~ t h e rside galnlng advantage. See Fmer de Vattel, Le Droit dcs Gcns
(The law of nations) (I.eide, Fr'ince: A u s depcns de la compagnle, 1758), vol. 2, bk. 3, chap. 8,
par. 15.5-Sh. A more recent study h ~ followeds a similar line, notlng that "the rule entered into
international lam primarily because medieval nmnarchs were otrrn eliminated by r h e ~ r~r~vals
via poi\on In food or drink. Poison wac thus a very indiv~dualtcticmethod of doing awnv with
,in enemy.'' See Ann Van N'ynen 'I'hom~s,lnd A.J. Thomas, Lkveloprrzmt of Int~rrtat~ortul
Legd Li?n~tutronso n the Ilsr of (:hem~cal'znd Riologtcal Wc,rzi)o~ts,vol. 2, report prepared for
the U.S. Arms Control and 1)isarrnament Agency, 1968, p. 2.54.
27. Margaret Hallissy, Venornous W/o?itirn (Westport, Conn.: Greenwood Press, 19871,
pp. 5-6.
28. I.awrence, Principles of Interne7tionirl Laic: p. 533. 111 another formulation, it has been
argued that "a weapon will he restricted in inverse proportion, more or less, to its effectiveness;
that the more effic~etita weapon or method of warfare the less likelihood there is o f ~ t being s
restricted in actton by the rules of war." See M.W. Royse, Aerrczl Bonthardment m d thc
Inteurznt~owalRegulcitiort of \Y"rrfarc>(New York: H . Vinal, 19281, pp. 13 1-32.
29. W.T. M,lllison, "The 1.aws of War and the luridical (:ontrol of Weapons of M a \
Destruction in General and 1.1m1tedWars," George Washington I.aw Reuiew 36 (L)ecernhrr,
1967). pp. 308-46. The quotation is drawn from p. 318.
30. William V. O'Brien, "B1olog1cal/C:he111iC31Wartare and the International Law o f War,"
T h c (;eorgetou~nLaw Journal .Sl (Fall 1962), pp. 1-63,
3 1. Asphyx~at~ng shells were discussed at The Hague even though they had yet to be
developed. Isolated precursor\ of chemical warfare had appeared sporadically in the h~storyof
warfare, but their appearance was so rare that they play a negligible role in the development
of a C W discourse. The history ot such methods can he found in Rudolf Hanslian, ed., Dcr
Chemisc/~cKrreg (The chemical war), vol. I (Berlin: E.S. Mitler and Son, 1937), pp. 1-8;
Wvndham M~les,"The Ide'l o f Chemical Warfare in Modern T~mes,"Journal of the History of
60 Widening Security
Ideas 31 (JanuaryIMarch, 1970), pp. 297-304; SIPRI, The Rise of CB Weapons, pp. 125-27;
and Alden Waitt, Gas Warfare (New York: Duell, Sloan, and Pearce, 1942), pp. 6-12.
32. The conventions, declarations, and other relevant documents of the Hague conferences
are reprinted in James Brown Scott, ed., The Hague Peace Conferences of 1899 and 1907, vol. 2,
Documents (Baltimore, Md.: The Johns Hopkins Press, 1909).
33. Ibid, pp. 365-66. The declaration was the product of the Second Subcommission of
the First Commission, which was dedicated to discussions on limiting explosives.
34. A.D. White, The First Hague Conference (Boston: World Peace Foundation 1912),
pp. 82-83.
35. Suggestions to use choking smoke from ships in the Crimean War were rejected by the
British because its effects were perceived to be so horrible that no honorable combatant could use
the means required to produce it. See Miles, "The Idea of Chemical Warfare in Modern Times";
and Clarence J. West, "The History of Poison Gases," Science 49 (2 May 1919), pp. 412-17.
36. See, for example, Calvin DeArmond Davis, The United States and the First Hague
Peace Conference (Ithaca, N.Y.: Cornell University Press, 1962), p. 175.
37. Excellent discussions of this distinction can be found in Charles Taylor, Sources of the Self
(Cambridge, Mass.: Harvard University Press, 1989), pp. 202-3; Charles Cross, "Explanation
and the Theory of Questions," Erkenntnis 34 (March 1991), pp. 237-60; and Martin Hollis and
Steve Smith, Explaining and Understanding International Relations (Oxford: Clarendon Press,
1990).
38. See Stanley Hoffmann, "An American Social Science: International Relations," Daedalus
106 (Summer 1977), pp. 41-60; and Steve Smith, "Paradigm Dominance in International
Relations: The Development of International Relations as a Social Science," Millennium 16
(Summer 1989), pp. 189-206. This focus also has tended to characterize rationalist regime the-
ory of international relations scholarship, as exemplified by Stephen Krasner, "Structural Causes
and Regime Consequences: Regimes as Intervening Variables," and Robert Keohane "The
Demand for Industrial Regimes," both in Stephen Krasner, ed., International Regimes (Ithaca,
N.Y.: Cornell University Press, 1984), pp. 1-21 and 145-71, respectively.
39. On this characteristic of international relations theory, see Steve Smith, "The Forty
Years' Detour: The Resurgence of Normative Theory in International Relations," Millennium
21 (Winter 1992), pp. 489-506; and Friedrich Kratochwil, "The Embarrassment of Changes:
Neo-Realism as the Science of Realpolitik Without Politics," Review of International Studies
19 (January 1993), pp. 63-80.
40. On different styles of interpretive analysis, see David Hiley, James Bohman, and Richard
Shusterman, eds., The Interpretive Turn (Ithaca, N.Y.: Cornell University Press, 1991); Paul
Rabinow and William Sullivan, eds., Interpretive Social Science: A Second Look (Berkeley:
University of California Press, 1987); and Fred Dallmayr and Thomas McCarthy, eds.,
Understanding and Social Inquiry (Notre Dame, Ind.: University of Notre Dame Press, 1977).
On the relationship between genealogy and interpretation, see Michael Gibbons, "Interpretation,
Genealogy, and Human Agency," in Terence Ball, ed., Idioms of Inquiry: Critique and Renewal
in Political Science (Albany: State University of New York Press, 1987), pp. 137-67.
41. Nietzsche is paraphrased by Alexander Nehemas, Nietzsche: Life as Literature
(Cambridge, Mass.: Harvard University Press, 1985), p. 110.
42. See especially Friedrich Nietzsche, On the Genealogy of Morals, Walter Kaufmann and
R.J. Hollingdale, trans. (New York: Vintage Books, 1989). This concern recently has gained
adherents in the natural sciences. In his work on evolutionary theory, Stephen Jay Gould has
expounded upon his contention that "current utility may not be equated with historical
origin." See, for example, the chapter entitled "Of Kiwi Eggs and the Liberty Bell," in Bully
for Brontosaurus (New York: W.W. Norton and Co., 1991), p. 114.
43. Nietzsche, On the Genealogy of Morals, Preface 3.
44. The term "interpretive" highlights the differences between the "how" questions of
understanding meaning and the "why" questions of explaining causal outcomes, while the term
"constructivist" calls attention to the ontological assumptions and causal models that distin-
guish postpositivist methods from the naturalist premises of positivism. See Alexander Wendt,
"Anarchy is What States Make of It: The Social Construction of Power Politics," International
1'1 :I (% Chemical Weapons 61
75. At least until 1992, when agreement was reached on the Chemical Weapons Convention.
76. Friedrich Nietzsche, H I < M I All-Too-H~~n~mz,~, trans. Marion Faher with Stephen
Lmhmann Lincoln: University of Nebraska Press, 1984), p. 67.
77. Brown, (:hc~mical W'arfare, p. 180. O n these alarmist C~JIITIS, see also Tlrnes (Lmntlon),
3 April 192.3, p. 7; SIPRI, The Rise of CB Weapons, pp. 247-48; and U.S. Congress, Senate
Special Comniittw Invest~garingthe M u n ~ t ~ o nIndustry, s Mtrnltions Industry: Hearwigs Beforr
the, Sperznl Conitnittee In~wstigut~rzg the M u n ~ t i o n sI n d r t s t r ~73rd Congress, 2d sess., 1 9 . 5 , pt.
1 1 and 12, pp. 2 4 0 3 4 ~ n c l2470-71. F o r example, a N ~ I York , Times headline ( 13 M ~ r c h
192 1 , p. I ) proclaimed "W'lr's Newest and Deadliest Weapon; 3 Drops of Poison Kill A n y O n e
They Touch," based o n reports circulated by the 17,s. Chemical Warfare S e r v m .
78. The turnaround in asessments of gas wartare hy these propagandists was remarkatlle.
In contrast to earlier warriings of the catastrophic potential of CW, see the revised assessrlients
by members of the U.S. Chemical Warfare Service in New Yolk Tmes, 10 September 1926, p. 6;
and 26 November 1926, p. 12. In a ~nonienrof unsurpassed iron!: the president of the A~nerlcan
Chemtcal Soc~erydeclared thar the widespread feeling .igatn\r g ~ was s the result of hysteria and
propaganda. Ser N r w York T~rtzes,I I Decemher 1926, p. -3.
79. SIPRI, 7 h e Rise of CB Weapons, p. 247. See also Editorial, Times (London), 3 April
1923, p. 7; and Haber, Tlw Polsoiro~(sC:lotid, pp. 288, 307, and 317. By 1927, a N t w York
Tlitles editorial ( I h Fehruar) 1927, p. 2 2 ) had d ~ s m ~ s s ethe d ex,iggerated fears of C W as "sheer
romancing," noting thar the previous war had demonstr,lted that high explosives were f'lr
more destructive.
80. T h ~ sargument parallels the case made by David Camp17ell that representattons of
" o u r d e " threklts are endemic to .ill states In the ongoing process of securing national Iden-
t~ties.These depictions of danger are not simply the response t o objective condttlons but
involve the Interpretive scripting of danger through political discourse. See David Campbell,
Wrrtlng Security ( M ~ n n e a p o l ~University
s: of Minnesota Pres\, 1992).
81. Balfour is quoted in U.S. Dep'lrtrnent of State, (:orrfcrcnce o n the L.inuaztron of
Arninment, p. 7.50.
82. The quotattons are both from ]hid., p. 594.
83. Thus the llnited Sr'ltes pushed for the prohihtion at the Washington conference of
1921-22 arid the Geneva conference ot 1925 even though it recognized that I C "would
undoubtedly give up a material advantage ~f gas warfare u c r e abolished." See U.S. Congress,
Senate Suhcomniittee o n Ui\armament, Disarmament rmtf See-rrrity: A Collertiorz of Do(-urnents
191')-5Y. 84th Congress, 2d sess. (Washington, D.C.: 1J.S. (;ovcrnment Printing Office, l ').56),
p. -01.
84. The riw of the wctety of states I S associated w ~ r hthe work of Bull and Watson. See in
particular Hedle? 13~111,'~'/J(J A l l a r ~ ~ / ~Sorlety
i c ~ l / (New York: C o l u m h ~ aUniversity Press, 1977);
and Hedley Bull and Ad.im Watson, eds., The ~.Y/~ili2~11Jil of I~~ternatio?za/ Societ)' (Oxtord:
CRxendon Press. 1984).
8.5. See Gong. The S t m i l ~ r dof '(:i~~ilrzat~on' rtz I i r t c r r ~ a t r o ~Society
~ ~ i l 0 1 1 the h~storyof the
quest~oningand discredit~ngof the idea of war, see John Mucller, Retreat from hJOt?Isifdy: 'l%e
O l ~ s o l e s r ~ ~ rofi r Malor
r Wor ( N e w York: B m c Books, 1989).
86. V m Creveld, %d~ilo/og?'fltztf W~7r,11). 71.
87. O'Connell, Of Arrrls (2nd Mcn.
88. See, for example, Anthony Eden's impassioned \perch reported In the Nrzo York
T~lric~s, 2 1 A p r ~ l1936, p. 18.
89. For e x , ~ ~ n p lthe e , l1.S. military "denied that there were any lessons t o he learned trom
the use of gas as a weapon of opportunity against 1' totally unprepared enemy In 3 colonial
war." See Brown, C:h~vvrzrnl Warfare, p. 145. For J. similar German assessment, see Rolf-Dieter
Muller, "World Power Status Through the Use ot Poison <;as? German Preparation5 for
Chemical Warfare 1919-1945," in Wilhem D e ~ s t ,ed., 7'hc (;ertnan Military in the Age of
'Ii1tizl W'IY ( W ~ r w ~ c k s h i rEngland:
e, Berg Publishers, 198.51, pp. 171-209.
90. George Quester, L>etcrreirc~eRefi~rcHiroshmw (New Brunswick, N.J.: Trrlnsact~on
Kooks, 19861, p. 78. Thu5, w h ~ l ereports o f Japan's use of CW against the Chinese were
Ignored, even the suggesrlon that C W w ~ bse ~ n gcontemplated 111 Spain drew preemptory atten-
tion froni Britain. The use of tear gas by government forces w ~ reported s and the Insurgents
64 Widening Security
claimed that they, too, had gas but "refuse to break the international law which forbids its use."
See Times (London), 19 August 1936, p. 10. In response, Britain sent its diplomats to investi-
gate these allegations and convey the grave consequences that might follow from the use of gas
even in reprisal. See Times (London) 8 September 1936, p. 12.
91. Mueller, Retreat from Doomsday. Similarly, Fukuyama has drawn a sharp distinction
between the power politics behavior of the Third World and peaceful relations among industrial
democracies - the historical and posthistorical parts of the world. See Francis Fukuyama, The
End of History and the Last Man (New York: Free Press, 1992). See also Michael Doyle, "Kant,
Liberal Legacies, and Foreign Affairs," pt. 1 and 2, Philosophy and Public Affairs 12 (Summer
and Fall 1983), pp. 205-235 and 323-353; and James Goldgeier and Michael McFaul, "A Tale
of Two Worlds: Core and Periphery in the Post-Cold War Era," International Organization 46
(Spring 1992), pp. 467-91.
92. And, as Adas has demonstrated, it was the level of technological sophistication -rather
than race, religion, morality, or other factors - that served as the chief standard by which the
West judged the degree of civilization of other societies. See his exhaustive account in Michael
Adas, Machines as the Measure of Men (Ithaca, N.Y.: Cornell University Press, 1989).
93. Giornale d'ltalia (Italy) as reported in New York Times, 4 July 1935, p. 1. See also Amy
Gurowitz, "The Expansion of International Society and the Effects of Norms," manuscript,
Cornell University, Ithaca, N.Y., 1993.
94. See "Paper Interviews Aziz on Kurds, Other Issues," Kuwait AL-QABAS, 31 October
1988 (in Arabic), Foreign Broadcast Information Servlce (FBIS), 2 November 1988, p. 27; and
"WAKH Reports Khayrallah 1 5 September Press Conference," Manama WAKH, 15 September
1988 (in Arabic), FBIS 16 September 1988, pp. 23-24.
95. For examples see the German accounts as reported in "Through German Eyes," Times
(London), 29 April 1915, p. 6 from which the quotation is drawn; and James Garner, Inter-
national Law and the World War (London: Longmans, Green, and Co., 1920), pp. 274-76.
96. Congressional Record 69th Congress, 2d sess., vol. 68, pt. 1, p. 150.
97. As stated by a U.S. senator, "We all know that any proliferation of nuclear weapons
threatens humanity. Now we are learning that for other, less costly, easier-to-make weapons,
far less sophistication is required, although they may pose a threat approaching the horror of
nuclear war and nuclear arms. That is why some are calling chemical and biological weapons
the poor man's atomic bomb." U.S. Congress, Chemical Warfare: Arms Control and
Nonproliferation: Joint Hearing Before the Senate Committee on Foreign Relations and the Sub-
committee on Energy, Nuclear Proliferation and Government Processes, 98th Congress, 2d sess.,
28 June 1984, p. 34.
98. New York Times, 2 July 1988, p. A3.
99. "Paris Paper Interviews Aziz on Chemical Weapons," Baghdad INA, 18 January 1989
(in Arabic) Near East and Southeast Asia, in FBIS 19 January 1989, p. 21.
100. United Nations, United Nations Disarmament Yearbook, vol. 14 (New York: United
Nations, 1989), chap. 11.
101. Pierre Morel,"The Paris Conference on the Prohibition of Chemical Weapons,"
Disarmament 12 (Summer 1989), pp. 1 2 7 4 4 .
102. Quoted from Esmat Ezz, "The Chemical Weapons Convention: Particular Concerns
of Developing Countries," Proceedings of the Thirty-Ninth Pugwash Conference on Science
and World Affairs (Cambridge, Mass.: Pugwash Conference on Science and World Affairs,
1989), p. 216.
103. As one author has remarked, "The major nations' unwillingness to eliminate their
nuclear weapons while resisting further chemical (and nuclear) proliferation is seen in some
Third World nations as the height of hypocrisy. It sends a message that the lesser nations
aren't mature enough for the most powerful of military capabilities." See Victor A. Utgoff,
"Neutralizing the Value of Chemical Weapons: A Strong Supplement to Chemical Weapons
Arms Control," in Joachim Krause, ed., Security Implications of a Global Weapons Ban
(Boulder, Colo.: Westview Press, 1991), p. 97. See also Geoffrey Kemp, "The Arms Race after
the Iran-Iraq War," in Efraim Karsh, ed., The Iran-Iraq War (New York: St. Martin's Press,
1989), pp. 269-79.
r Chemical Weapons 65
104. Morel, "The I'aric Conference o n the Prohibition of Chemical Weapons," p. 142.
10.5. Foucault, "Nietzsche, Genealog); History," pp. 85-86. See also James Scott, Dam-
rn~ltionand the Arts of Kesrsttrncr ( N e w Haven, Conti.: Yale University Press, 1990).
106. Indeed, I i ~ g h - p r e c ~ s ~conventional
on rnun~tionshad heen defined as weapons ot mass
destruction in Soblet md~t,lry I~terature of the 1980s. See Stephen R. Covlngton, "The
Evolution of Sov~etT h ~ n k ~ no ng the Util~tvof Chemical Wartare In 3 Major European Armed
Contl~ct,"in Krauw, Sec.rrrrt!~ltnp/~c~ltions of il Glohal (:hrnrr<-irlWfvzpons Biltr, pp. 9-1 0.
107. H<]st<,r~ (;lr,hr, 17 Fcl>ru.irY 199 1, p. 2 0 .
108. This 15 not t o sav, however, that the view has not h e w expressed pr~vately In the
developing world - though not 111 official p ~ ~ b l discourseic - that t o die by cheni~calw x p o n s
1s neither more nor less horr~hlethan t o die by bullet 01-h m e . See, for example, the temlnony
of Kr,ld Roherts 111 U.S. C.ongrcs3, C/~r~mc.ir/ Wnrfi~rr.A r n ~ s( h t r o l ilnd Nonpro/ifirdtron:
101~rtHeirrrng Rrfi~rethe .Sc~mte( : ~ m t t ~ ~ ton t e cForrrgn K c l ~ r t r ~mrd
~ n ~the Stthromrnlttw on
Fnerg): Nut-lcor I'rolifcrcrtron, 'rnd < ; o l w n m m t Pro<-rssrs,98th Congress, 2d sess., 28 June
1984. pp. 60-6 I .
109. N i m T,ltinenwalJ and Richard Price, "Norm5 .lnd Ikterrence: The Nucle,lr ~rnd
Clieni~calWe'lpons Taboos," paper presented at a Social Science Research Council/MacArthur
conterence entrrled, "Norm\ ,lnd National Security," Srantord University, Stanford, Calif.. 7-8
Octoher 1994.
1 10. James F. I.eon;~rd,"Roll~ngh c k Chemic,~lP r ~ l i t e r ~ l t ~ o nArms , " Control T ) t l q 22
(October 1992). pp. 13-1 8.
11 I . At the tlme of wrltlng, 1.57 nations had s ~ g n e dthe Chemical Weapons Convent~on.
112. Joseph Lapid, "'['he Third Ikbate: O n the Prospect\ of International Theory in a
Post-posit~v~stt,:r,~," Intcrnirtional Strctlic~sQ u ~ z r t e r 33
l ~ (September 1989), pp. 23-5-54,
11.3. See Wendt, "Anarchy is W h ~ Stares t Make ot It."
Securitization and Desecuritization
Ole Waever
D
uring the mid-1980s, observers frequently noticed that the concept
of security had been subjected to little reflection in comparison with
how much and how strongly it had been used. Only a few years later,
conceptual reflections on the concept of security have become so common
that it is almost embarrassing to, once again, discuss or re-conceptualize
security. Nonetheless, in this chapter I present one possible perspective on
security, and assess its implications in terms of four different security agendas.
My primary aim here is not to provide a detailed discussion of this new
approach - a more detailed exposition can be found elsewhere1 - but to illus-
trate the contrast between this perspective and more traditional approaches,
which I intend to bring out via conceptual discussion and by addressing
selected "security debates."
I could begin by expressing a certain discontent with the "traditional pro-
gressive" or "established radical" ways of dealing with the concept and
agenda of security. The traditional progressive approach is: 1)to accept two
basic premises of the established discourse, first that security is a reality prior
to language, is out there (irrespective of whether the conception is "object-
ive" or "subjective," is measured in terms of threat or fear), and second the
more security, the better; and 2) to argue why security should encompass
more than is currently the case, including not only "xx" but also "yy,"
where the latter is environment, welfare, immigration and refugees, etc. With
this approach, one accepts the core meaning of "security" as uncontested,
pushing instead in the direction of securitizing still larger areas of social life.
Still, in the final analysis, is it all to the good that problems such as envir-
onmental degradation be addressed in terms of security? After all, in spite
of all the changes of the last few years, security, as with any other concept,
carries with it a history and a set of connotations that it cannot escape.
At the heart of the concept we still find something to do with defense and
the state. As a result, addressing an issue in security terms still evokes an
image of threat-defense, allocating to the state an important role in address-
ing it. This is not always an improvement.
Source: Ronny Lipschutz (ed.), On Security (New York: Columbia University Press, 1995),
pp. 46-86.
1 Securitization and Desecuritization 67
Why not turn this procedure upside down? In place of accepting impli-
citly the meaning of "sccurity" as given and then attempting to broaden its
coverage, why not try instead to put a mark o n the concept itself, by enter-
ing into and through its core? This means changing the tradition by taking
it seriously rather than criticizing it from the ~ u t s i d e I. ~begin by consider-
ing security as a concept and a word. Next, I discuss security as a speech
act. In the third part o f the essay, I describe four cases of securitizution and
de-securitization. Finally, I ask whether we might not want to use "secur-
ity" as it is classically understood, after all.
Widening along the referent object axis - that is, saying that "security is
not only military defense of the state, it is also x and y and z" - has the unfor-
tunate effect of expanding the security realm endlessly, until it encompasses
the whole social and political agenda. This is not, however, just an unhappy
coincidence or a temporary lack of clear thinking. The problem is that, as
concepts, neither individual security nor international security exist. National
security, that is, the security of the state, is the name of an ongoing debate, a
tradition, an established set of practices and, as such, the concept has a rather
formalized referent; conversely, the "security" of whomever/whatever is a
very unclear idea. There is no literature, no philosophy, no tradition of "secur-
ity" in non-state terms; it is only as a critical idea, played out against the con-
cept and practices of state security, that other threats and referents have any
meaning. An abstract idea of "security" is a nonanalytical term bearing little
relation to the concept of security implied by national or state security.
To the extent that we have an idea of a specific modality labelled "security"
it is because we think of national security and its modifications and limitations,
and not because we think of the everyday word "security." The discourse
on "alternative security" makes meaningful statements not by drawing pri-
marily on the register of everyday security but through its contrast with
national security. Books and articles such as Jan @berg's At Sikre Udvikling
og Udvikle Sikkerhed, Richard H. Ullman's "Redefining Security," and Jessica
Tuchman Mathews's "Redefining Security" are, consequently, abundant with
"not only," "also" and "more than" arguments6 This reveals that they have
no generic concept of the meaning of security - only the one uncritically
borrowed from the traditional view, and multiplied and extended to new
fields. Thus, it seems reasonable to be conservative along this axis, accepting
that "security" is influenced in important ways by dynamics at the level
of individuals and the global system, but not by propagating unclear terms
such as individual security and global security. The concept of security refers
to the state.
The first edition of Barry Buzan's People, States and Fear (1983) failed
to make clear how this problem might be handled. There was an obvious
tension between the title of the book and its subtitle, The National Security
Problem in International Relations. The three levels of analysis - individual,
state and international system - were central to Buzan's argument, although
national security remained, in some sense, privileged. Still, was it Buzan's
intention to make a "triple-decker" out of the concept of security, or was
he simply providing a contextualization of national security? This point
has been clarified in the second edition of the book (1991), where Buzan
argues that the state level is privileged even as national security cannot
be comprehended at the state level alone. What national security links to
at the other levels is not primarily individual security and international
security, but dynamics and political processes of various kinds at these other
levels.'
Buzan has shown powerfully that national security can neither be suffi-
ciently understood nor realistically achieved from a perspective limited to
\\ ,F'\ ~r Securitization and Desecuritization 69
National (state)level
the specific field. The concept is thus reduced to its everyday sense, which is
only a semantic identity, not the concept of security. Of course, both choices
are completely legitimate, but this question of language politics depends ultim-
ately on what we wish to accomplish. If our intent is to determine when we
are secure, the investigation can address many levels. If, however, we want
to add something new to ongoing debates on "security" (in strategic studies)
and national interests, we must begin with those debates, taking on that
problematique, so that we can get at the specific dynamics of that field, and
show how these old elements operate in new ways and new places.
The specificity, in other words, is to be found in the field and in certain typ-
ical operations within the field (speech acts - "security" - and modalities -
threat-defense sequences), not in a clearly definable objective ("security") or a
specific state of affairs ("security"). Beginning from the modality of specific
types
.- of interactions in a specific social arena, we can rethink the concept
"security" in a way that is true to the classical discussion. By working from
the inside of the classical discussion, we can take the concepts of national secur-
ity, threat, and sovereignty, and show how, on the collective level, they take on
new forms under new conditions. We can then strip the classical discussion of
its preoccupation with military matters by applying the same logic to other
sectors, and we can de-link the discussion from the state by applying similar
moves to society (as I shall show, below). With this, we maintain a mode of
thinking, a set of rules and codes from the field of "security" as it has evolved
and continues to evolve.
To start instead from being secure in the everyday sense means that we
end up approaching security policy from the outside, that is, via another
language game. My premise here is, therefore, that we can identify a spe-
cific field of social interaction, with a specific set of actions and codes,
known by a set of agents as the security field. In international society, for
example, a number of codes, rules, and understandings have been estab-
lished that make international relations an intersubjectively defined social
reality possessing its own specific laws and issue^.^ National security is simi-
larly social in the sense of being constituted intersubjectively in a specific
field,9 and it should not be measured against some real or true yardstick of
"security" derived from (contemporary) domestic society.
An alternative route to a wider concept of security is to broaden the secur-
ity agenda to include threats other than military ones. When widening takes
place along this axis, it is possible to retain the specific quality characterizing
security problems: Urgency; state power claiming the legitimate use of extra-
ordinary means; a threat seen as potentially undercutting sovereignty, thereby
preventing the political "we" from dealing with any other questions. With
this approach, it is possible that any sector, at any particular time, might be
the most important focus for concerns about threats, vulnerabilities, and
defense. Historically, of course, the military sector has been most important.10
Strategic studies often focused on the military aspects of security, whereas
the realists and neorealists of International Relations seldom a priori defined
military threats as primary. Indeed, Morgenthau, Aron, and many others took
,iti I Securitization and Desecuritization 71
the position that, to ensure its security, a state would make its own choices
according to expediency and effectiveness, and these might not always involve
military means. A state would make threats in the sector in which the best
options were available. A response (security policy, defense) would often, but
not always, have to he made in the same sector, depending on whether one
sector might overpower another, and military means simply were often the
strongest available. Logically speaking, the means to security should be sec-
ondary to the ends - that is, a conflict and the political decisions involved, as
Clausewitz pointed out - and, thus, it has seemed a viable strategy to expand
security in terms of sectors while keeping the state focus. Indeed, this is not
only an academic option, it is also, to a large degree, what has taken place in
political discourse, as the name of the field has through this century changed
from war to defense to "security."
Still, what ties all of this together as security? When Buzan moves from his
discussion of security in military terms to security in the political, economic,
ecological, and societal sectors, the logic clearly says that security begins as a
military field that is increasingly challenged by these new sectors. The ques-
tion remains, however: What made the military sector conspicuous, and
what now qualifies the others to almost equal status? While Buzan does not
squarely address this question, he does hint at an answer. Military threats
have been primary in the past because they emerged "very swiftly" and with
"a sense of outrage at unfair play"; if defeated, a state would find itself laid
bare to imposition of the conqueror's will." Such outcomes used to charac-
terize the military sector. But, if the same overturning of the political order
can be acconlplished by economic or political methods, these, too, will con-
stitute security problems."
From the discussion above, it follows that the hasic definition of a secur-
ity problem is sonlething that can undercut the political order within a state
and thereby "alter the premises for all other questions." As Buzan shows, the
literature largely treats security as "freedom from threat," both objectively
and subjectively." Threats seen as relevant are, for the most part, those that
effect the self-dctermination and sovereignty of the unit. SuruivaP4 might
sound overly dramatic but it is, in fact, the survival of the unit as a basic polit-
ical unit - a sovereign state - that is the key. Those issues with this undercut-
ting potential must therefore be addressed prior to all others because, if they
are not, the state will cease to exist as a sovereign unit and all other questions
will become irrelevant. This, then, provides us with a test point, and shows
what is lost if we "de-compose" the state by individualizing security. With the
approach I have suggested here, even if challenges can operate on the differ-
ent components of the state, they must still pass through one focus: Do the
challenges determine whether the state is to be or not to be?15
When a specific issue is turned into a test case, everything becomes con-
centrated at one point, since the outcome of the test will frame all future
questions. This logic is spelled out most clearly, perhaps, by Clausewitz, who
shows that, although politics has to be prior to military, the logic of war -
the ziel of war, victory - replaces the logic of politics - the specific zweck.
72 Widening Security
To enter a war is a political decision, but once in, one has to play according
to the grammar of war, not politics, which would mean playing less well and
losing the political aim, as well. Rousseau put it thus: "War is not, therefore,
a relation of man to man but a relation of state to state, in which individuals
are enemies only by accident, not as men or even as citizens, but as soldiers,
not as members of the homeland, but as its defenders."16 Rousseau's argu-
ment is presented here in terms of literal war, but the observation applies to
"metaphorical war" that is, to other "tests of will and strength."17
The inner logic of war follows from its basic character as an uncon-
strained situation, in which the combatants each try to function at max-
imum efficiency in relation to a clearly defined aim. During war, a state is
confronted with a test of will - testing whether it is still a sovereign unit -
in which the ability to fend off a challenge is the criterion for forcing the
others to acknowledge its sovereignty and identity as a state.18 It is, in fact,
not the particular means (military) that define a situation as war, it is the
structure of the "game." Logically speaking, therefore, it is a coincidence
that military means have traditionally been the ultimo ratio.
The basic logic of Clausewitz's argument thus follows from the situation of
an ultimate test: what then is logically to be done? "War is an act of violence
pushed to its utmost bounds; as one side dictates the law to the other, there
arises a sort of reciprocal action, which logically must lead to an extreme."19
The loser is forced to submit, and the outcome is defined in polar terms:
victory-defeat. From this, it follows that the first logic for each party is: "Throw
forward all forces" (therefore the inherent tendency for escalation in war); sub-
sequently, various specific mechanisms intervene to modify this injunction.
War, then, is "an act of violence intended to compel our opponent to ful-
fil our and, therefore, "War, insofar as it is a social act, presupposes
the conflicting wills of politically organized c~llectivities."~~ It is in this
struggle for recognition (Hegel) that states establish their identity as states.
Nonetheless, this struggle can take place in spheres other than the mili-
tary one; the priority of military means is a contingent, technical feature.
Consequently, the logic of war - of challenge-resistance(defense)-escalation-
recognitionldefeat - could be replayed metaphorically and extended to other
sectors. When this happens, however, the structure of the game is still derived
from the most classical of classical cases: war.
And because the End of this Instltutlon [the Levlathan, the Sovereign], is
the Peace and Defense ot them all; and whosoever has r g h t to the End,
has r ~ g h tto the Means; ~t belongeth of Klght, to whatsoever Man, or
Assembly that hath the Sovera~gnty,to be Judge both of the meanes of
Peace and Defense; and 'ilso of the hmdrmces, and d~sturbancesof the
same; and to do whatsoever he shall thmk necessary to be done, both
betore hand, for the preservmg of Peace m d Secur~ty,by prevention of
Lhscord ~t home and H o s t ~ l ~from
t y abroad; and, when Peace and Securlty
are lost, for the recovery of the same."
Thus, that those who administer this order can easily use it for specific, self-
serving purposes is something that cannot easily be avoided.
What then is security? With the help of language theory, we can regard
"security" as a speech act. In this usage, security is not of interest as a sign that
refers to something more real; the utterance itsclf is the act. By saying it, sorne-
thing is done (as in betting, giving a promise, naming a ship)." By uttering
"security," a state-representative moves a particular development into a spe-
cific area, and thereby claims a special right to use whatever means are neces-
sary to block it."
The clearest illustration of this phenomenon - on which I will elaborate
below -occurred in Central and Eastern Europe during the Cold War, where
"order" was clearly, systematically, and institutionally linked to the survival
of the system and its elites. Thinking about change in East-West relations
and/or in Eastern Europe throughout this period meant, therefore, trying to
bring about change without generating a "securitization" response hy elites,
which would have provided the pretext for acting against those who had
overstepped the boundarm of the perm~tted.
< onsequently, to ensure that t h ~ mechan~srn
s would not be triggered, actors
hcid to keep t h e ~ challenges
r below a certaln threshold and/or through the pol~t-
~ c aprocess
l - whether n a t ~ o n or
~ ~~nternat~onal
l - have the threshold negot~ated
upward. As Egbert Jahn put it, the task was to turn threats Into challenges; to
move developments from the q h e r e of exlstent~alf e x to one where they could
be handled by ordmary means, a5 politics, economy, culture, and so on. A5 part
of t h ~ exercise,
s a cruc~alpolitical and theoret~calIssue became the d e f m t ~ o nof
"intervention" or "lnterterence In domestlc affairs," whereby change-orlented
agents tried, through ~nternationallaw, d~plomacy,m d varlous kmds of polit-
~cs,to rase the threshold and make more mteractlon possible.
74 Widening Security
Through this process, two things became very clear. First, the word "secur-
ity" is the act; the utterance is the primary reality. Second, the most radical
and transformational perspective - which nonetheless remained realist - was
one of minimizing "security" by narrowing the field to which the security act
was applied (as with the European ditente policies of the 1970s and 1980s).
After a certain point, the process took a different form and the aim became
to create a speech act failure (as in Eastern Europe in 1989). Thus, the trick
was and is to move from a positive to a negative meaning: Security is the con-
servative mechanism - but we want less security!
Under the circumstances then existing in Eastern Europe, the power
holders had among their instruments the speech act "security." The use of
this speech act had the effect of raising a specific challenge to a principled
level, thereby implying that all necessary means would be used to block that
challenge. And, because such a threat would be defined as existential and a
challenge to sovereignty, the state would not be limited in what it could or
might do. Under these circumstances, a problem would become a security
issue whenever so defined by the power holders. Unless or until this opera-
tion were to be brought to the point of failure - which nuclear conditions
made rather difficult to imagine2" - available avenues of change would take
the form of negotiated limitations on the use of the "speech act security."
Improved conditions would, consequently, hinge on a process implying "less
security, more politics!"
To put this point another way, security and insecurity do not constitute
a binary opposition. "Security" signifies a situation marked by the presence
of a security problem and some measure taken in response. Insecurity is a
situation with a security problem and n o response. Both conditions share
the security problematique. When there is no security problem, we do not
conceptualize our situation in terms of security; instead, security is simply
an irrelevant concern. The statement, then, that security is always relative,
and one never lives in complete security, has the additional meaning that, if
one has such complete security, one does not label it "security." It therefore
never appears. Consequently, transcending a security problem by politiciz-
ing it cannot happen through thematization in security terms, only away
from such terms.
An agenda of minimizing security in this sense cannot be based on a
classical critical approach to security, whereby the concept is critiqued and
then thrown away or redefined according to the wishes of the analyst. The
essential operation can only be touched by faithfully working with the clas-
sical meaning of the concept and what is already inherent in it. The lan-
guage game of security is, in other words, a jus necessitatis for threatened
elites, and this it must remain.
Such an affirmative reading, not at all aimed at rejecting the concept,
may be a more serious challenge to the established discourse than a critical
one, for it recognizes that a conservative approach to security is an intrinsic
element in the logic of both our national and international political organiz-
ing principles. By taking seriously this "unfounded" concept of security, it
+ , Securitization and Desecuritization 75
is possible to raise a new agenda of security and politics. This further implies
moving from a positive t o a negative agenda, in the sense that the dynamics
of securitization and desecuritization can never he captured so long as we
proceed along the normal critical track that assumes security to be a positive
value to be maximized.
That elites frequently present their interests in "national security" dress
is, of course, often p i n t 4 out hy observers, ~ ~ s ~ r iaccompanied
lly hy a
denial of elites' right to do so. Their actions are then labelled something else,
for example, "class interests," which seems to imply that authentic security is,
somehow, definable independent of elites, by direct reference to the "people."
This is, in a word, wrong. All such attempts to define people's "objective
interests" have failed. Security is articulated only from a specific place, in a n
institutional voice; by elites. All of this can be analyzed, if we simply give up
the assumption that security is, necessarily, a positive phenomenon.
Critics normally address the what or who that threatens, or the whom to
he secured; they never ask whether a phenomenon sholrld be treated in terms
of security because they do not look into "securityness" as such, asking what
is particular to security, in contrast to non-security, modes of dealing with
particular issues. By working with the assumption that security is a goal to
be maximized, critics eliminate other, potentially more useful ways of con-
ceptualizing the problems being addressed. This is, as I suggested above,
because security:insecurity are not binary opposites. As soon as a more nom-
inalist approach is adapted, the absurdity of working toward maximizing
"security" becomes clear.
Viewing the security debate at present, one often gets the impression of the
object playing around with the subjects, the field toying with the researchers.
The problematique itself locks people into talking in terms of "security," and
this reinforces the hold of security on our thinking, even if our approach is a
critical one. We do not find much work aimed at de-securitizing politics which,
1 suspect, would be more effective than securitizing problems.
From the discussion above, it follows that a major focus of "security stud-
ies" should be the processes of securitization and de-securitization: When,
why and how elites label issues and developments as "security" problems;
when, why and how they succeed and fail in such endeavors; what attempts
are made by other groups to put securitization on the agenda; and whether
we can point to efforts to keep issues off the security agenda, or even to de-
securitize issues that have become securitized?
Below, I explore these questions in the context of four different security
agendas. First, I look at European security between 1960 and 1990, the
period of change and dPtente, which provided the framework for develop-
ing the speech act interpretation of security. During this period, the main
issue was whether political and social change could he de-securitized even
76 Widening Security
as the basic political structure of the region was kept frozen with major help
of the security instrument. How much could be de-securitized and how was
a major question, as is why and how change suddenly took on a new and
different character in 1989. In the second part, I deal with a very different
case: Environmental security. Here we see not an instance of de-securitizing
an essentially securitized field but, rather, the potential advantages and dis-
advantages of securitizing a new area that, perhaps, should be addressed via
other thematizations. In the third part, I take up the issue of societal secur-
ity. This topic is presented in a fashion somewhat parallel to the preceding
one, but I also ask the following: If we start using the concept of societal
security in order to understand certain new dynamics, especially in post-
Cold War Europe, what differences are there between a traditional, alter-
native security approach as opposed to a speech act approach to security?
In the final part, I analyze the major new attempts to apply the concept of
"security" in Europe, with particular reference to the notion of "European
security."
A peculiar feature of the Cold War system in Europe was the almost total
exclusion of unwanted change, a guaranteed stability of the status quo.
Raymond Aron once described it as a "slowdown of history" (but then went
on to discuss the iron law of change that would ultimately upset this strange
~ i t u a t i o n )Security
.~~ became the means whereby this slowdown was effected.
The speech act "security" is, of course, more than just a word, since one must
have in hand the means to block a development deemed threatening. For
example, if a foreign army walks across the border or tries to intimidate a
country, it is necessary (but not sufficient) to have adequate military strength
to resist; or if social unrest, caused from within or without, is the problem,
one must have a sufficiently repressive apparatus, ideological cohesion in the
core group that allows the apparatus to be mobilized, and the legitimacy to
use it that avoids the escalation of public opposition.
For a long time the situation in Central and Eastern Europe was such
that, where nonmilitary issues were concerned, it was always possible for the
regime to control things - in extremis, with the help of friends with tanks.
In Cold War Europe, moreover, military threats could also be fenced off
because of the general nuclear condition. As the late Franz Josef Strauss once
put it: "In the present European situation there is no possibility of changes
through war, but neither through revolution or civil war."27 Change seemed
impossible without some consent by the power-holders; it had to take place
through a negotiated process of pressure and acceptance, stabilization and
destabilization. And so it happened.
The central issue of the debates on European dCtente - and the mech-
anism that actually worked in them - was the logic of change through sta-
bilization. In particular, as Willy Brandt explained, German Ostpolitik and
Deutschlandpolitik were very explicit about the necessity of "stabilizing the
\\ c.1 Securitization and Desecuritization 77
status quo in order to overcome the status quo." Only by removing some
threats to, and thereby some excuses for, the regimes in the East, would it
then become possible to push back the securitization of East-West relations
and change domestic conditions in Eastern Europe.
At the same time, the field of human rights evolved into an attempt to
develop new rules of the game in the nonmilitary arena. "Human rights"
became the label for a specific political strugglelnegotiation over the border
between security and politics, intervention and interaction. This theme gen-
erated a great deal of controversy in the mid-1 980s, especially where efforts
by West German Social Democrats (SPD) to revive detente were c ~ n c e r n e d . ' ~
Through all of this, East-West relations were marked by a basic asym-
metry, because internal legitimacy made Western society much more stable.
In Ruzan's terms, states in the West were strong, in the East, weak.lYThis
contrast generated a specific and clearly discernible constellation of secur-
ity concepts and practices: Since the West could not be destabilized from
within - especially as the decline of Eurocommunism eliminated this fear -
security concerns became focused on the "high politics" of military threats
and, possibly, skillful diplomatic maneuvering by the Soviets."' The states
of the East, in contrast, were fearful of "threats" from below; they regarded
almost all societal interaction with the West as potentially dangerous and
destabilizing. Accordingly, the concept of security became highly militarized
in the West, while in the East it was broadened to incorporate econon~ic
security and various types of interference in domestic affairs.
A key political question thus became the definition of "normal" trans-
national politics, as opposed to intervention, which was deemed to be a secur-
ity problem. A great deal of the East-West dialogue of the 1970s and 1980s,
especially that on "non-military aspects of security," human rights, and the
whole Third basket of the Helsinki Accords, could be regarded as a discussion
of where to place boundaries on a concept of security: To what degree were
Eastern regimes "permitted" to use extraordinary instruments to limit societal
East-West exchange and interaction?
By turning threats into challenges and security into politics, the ditente-
oriented actors of the West tried to get elites in the East to avoid applying
the term "security" to issues and to open LIP domestic space for more open
political struggle. Even though this strategy did not ultimately prove instru-
mental to the change in East-West relations in 1989, it is certainly arguable
that it did play an important role in a process of softening that allowed
another form of change to take place. Detente, as negotiated desecuritiza-
tion and limitation of the use of the security speech act, contributed to the
n~odificationof the Eastern societies and systems that eventually made pos-
sible, via sudden desecuritization through a speech-act failure, the radical
changes of 1989.
Many observers noted that the 1989 revolutions in Central and Eastern
Europc came about not as regimes slowly gave way to forces gaining more
and more control from the periphery but, rather, as a collapse from the cen-
ter. Some have tried to attribute this sudden loss of legitimacy to the dismal
78 Widening Security
economic performances of the 1980s. This was a necessary, but not suffi-
cient, condition for the collapse, inasmuch as the regimes had been lacking
in legitimacy for a very long time. The new feature in 1989 was the loss of
support within the elites, which some characterized as a sudden loss of self-
confidence by the regimes them~elves.~'In other words, to explain the
change, we must look within elites, and the ways in which the question of
legitimacy among elites translated into the capacity to act.32An important
part of an order-maintaining action occurs by sustaining a shared world-
view within some minimum inner-circle. In earlier cases of adjusting course,
when it was necessary to overcome a crisis or repress a revolt, the question
of worldview did not arise. The old leader was sacrificed and the new one
regained elite support by calling for the restoration of order. Something was
said in this act, of course, but the decisive question was not the truth of the
act, per se. Rather, the truth was given by the act being said from a specific
position, thereby regenerating a loyal elite following, (re)installingthe truth,
and reimposing the center's will on the majority.33 In this system of myth-
making, there was an almost infinite capacity for reappraisal through aux-
iliary hypotheses. That capacity was not, however, infinite and it ultimately
became more and more difficult to regenerate the truth, especially in the face
of continued economic failures.34 When the final crisis came, no one wanted
to take on the task of "calling to order" and no one wanted to take the place
at the center from which the call to order would come.
This inside-to-outside collapse can be seen as a speech act failure: The
performance of the security act and reinstallation of truth suddenly failed
to work. In retrospect, this should not have come as a surprise to the speech
act analyst of European security, although it did. As I noted in early 1989
(without drawing the logical conclusion):
In a way, the most interesting about a speech act is that it might fail. And
this is an essential part of its meaning. ... In our context this is clearly the
case: the invocation of "security" is only possible because it invokes the
image of what would happen if it did not work. And not only this (...):
the security speech act is only a problematic and thereby political move
because it has a price. The securitizer is raising the stakes and investing
some (real)risk of losing (general) sovereignty in order to fence of a spe-
cific challenge. In the present [post-structuralist] usage of speech act the-
ory the meaning of the particular speech act is thus equally constituted
by its possible success and its possible failure - one is not primary and
the other d e r i ~ e d . ~ "
German u n ~ t ~ c a t ~ A
o ngeneral
. feel~ngof mutual fear of los~ngcontrol of the
process led to m u t u ~ lself-control, as each major actor t r ~ e dto take Into
account the concerns of the others. Each developed surpr~smglys ~ m d a r"blue-
pr~nts,"j h usmg the s t a b ~ l ~of
t y Europe as the pomt ot "self-emdent" reference,
and each of w h ~ c hdemanded 1' certam degree of self-control called "secur-
~ t ~ . The
" ' ~ core element of t h ~ sneed for self-control was the assumption (or
fear) that German unification, and reactions to it, might become explosive.
With unification, internationally sanctioned through the "2 plus 4" agree-
ment, in place, however, the urgency and focus of the situation was lost.
Subsequently, the general theme of European security analysis and policy
statements has focused on the unbearable openness of the situation. So
much of the unexpected had taken place that no possible developnlent
could now be excluded. Moorings had been lost. Metaphors of architecture
and insistent talk of institutions revealed a longing for fixity, for structures,
for predictability. In this situation it was believed, moreover, no institutions
should be terminated, even i f they seemed no longer necessary; indeed, there
emerged a widespread assumption that there existed a deficit of institutions
and structures, and too much instability and unpredictability. The implicit
agenda of "security" became, as a result, the closing off of options! I will
discuss further attempts to establish "security" in Europe, below.
Moss goes on to warn that "the instinct for centralized state responses to
security threats is highly inappropriate for responding effectively to global
environmental p r o b l e r n ~ . " ~It' might, he points out, even lead to militariza-
tion of environmental problems.""
A third warning, not unrelated to the previous two, is the tendency for the
concept of security to produce thinking in terms of us-them, which could then
be captured by the logic of nationalism. Dan Deudney writes that "the 'nation'
is not an empty vessel or blank slate waiting to be filled or scripted, but is
instead profoundly linked to war and 'us us. them' thinking (...) Of course,
taking the war and 'us 11s. them' thinking out of nationalism is a noble goal.
But this may he like taking sex out of 'rock and roll,' a project whose feasi-
bility declines when one remembers that 'rock and roll' was originally coined
as a euphemism tor sex."47 The tendency toward "us us. them" thinking, and
the general tradition of viewing threats as coming from outside a state's own
borders, are, in this instance, also likely to direct attention away from one's
own contributions to enviro~mental problem^."^
Finally, there is the more political warning that the concept of security
is basically defensive in nature, 3 status quo concept defending that which
is, even though it does not necessarily deserve to be protected. In a para-
doxical way, this politically conservative bias has also led to warnings by
some that the concept of environmental security could become a dangerous
tool of the "totalitarian left," which might attempt to relaunch itself on the
basis of environmental collectivism.4'Tertainly, there is some risk that the
logic of ecology, with its religious potentials and references to holistic cat-
egories, survival and the linked significance of everything, might easily lend
itself to totalitarian projects, where also the sciencc of ecology has focused
largely on how to constrain, limit, and control activities in the name o f the
environment. "'
These observations point back toward a more g n e r a l question: Is it a
good idea to frame as many problems as possible in terms of security? Does
not such a strategy present the negative prospect of, in a metaphorical sense,
militarizing our thinking and seeing problems in terms of threat-vulnerability-
defense, when there are good reasons for not treating them according to this
formula?'' Use of the slogan "environmental sec~irity"is tempting, because it
is an effective way of dramatizi~lgenvironmental problems. In the longer run,
however, the practices resulting from the slogan might lead to an inappro-
priate social construction of the environment, as a threaddefense problem.
We might find it more constructive, instead, to thematize the problem in terms
of an economy-ecology nexus, where decisions are actually interlinked."
Use of the security label does not merely reflect whether a problem is a
security problem, it is also a political choice, that is, a decision for concep-
tualization in a special way. When a problem is "securitized," the act tends
to lead to specific ways of addressing it: Threat, defense, and often state-
centered solutions. This, of course, leaves the environmental agenda, with its
82 Widening Security
the advantage of setting the issue at the heart of the action that is most
relevant to it. There might, in the long run, be more advantage to mak-
ing producers, consumers, taxmen and economists factor environmental
costs into their accounting activities, than to arming the state with emer-
gency powers derived from an analogy with war. It might be argued that
process-type threats are better met by the process-type remedies of eco-
nomics, than by the statist solutions of security
Societal Security
Over the last few years, an interest in the concept of "societal security" has
developed, especially in Europe. If the societal sector is securitized in an
unsophisticated way, however, the result could be used to legitimize reac-
tionary arguments for, on the one hand, defining immigrants and refugees
as security problems and, on the other, presenting European integration as
a national security threat. Conversely, "societal security" could end as an
absurd attempt to tell people who feel insecure that they really should not.
More systematically, what does the term "societal security" suggest in light
of the three perspectives I have so far discussed: Traditional state centric,
critical wider security concepts, and the speech act approach? First, in the trad-
itional state-centric perspective, "societal security" could come to mean mak-
ing the state secure against society, against the types of situations in which a
state might be destabilized as its society disintegrates or turns against it. For a
society that lacks a state, or is a minority within a state, moreover, its strength-
ening could be seen by the state as such a security problem.
Second, the conventional-critical approach of broadening the concept
of security is likely to become locked into debate about whether, for example,
immigrants and refugees really do pose a security problem to the state. A
discourse on societal security might then be captured by neo-nazis who argue
"we are only defending our societal security," or end up as a pedagogical
project trying to convince people that, although they feel threatened, there
really is no security problem.
I Securitization and Desecuritization 83
Finally, the approach I have proposed above points toward a study of the
mechanisms leading to securitization of certain issues related to identity, espe-
cially when and how these problems are handled, by society, in security terms.
Such an approach implies that we have t o take seriously concerns about iden-
tity, but have also to study the specific and often problematic effects of their
being framed as security issues. We also have to look at the possibilities of
handling some of these problems in nonsecurity terms, that is, to takc o n the
problems, but leave them unsecuritized. This latter approach recognizes that
social processes are already under way whereby societies have begun to the-
matize thenzselues as security agents that are under threat. This process
of social construction can be studied, and the security quality of the phenom-
enon understood, without thereby actually legitimizing it. With the "as much
security as possible" approach, this is hard to handle: one will have either to
denounce such issues as not being security phenomena ("misperceptions"), or
one will be pulled into the process as co-securitizer.
What, then, can a tcrm such as "societal security" mean? The security of
societies is closely related to, but nonetheless distinct from, political security.
Political security has to do with the organizational stability of states, systems
of government, and the ideologies that give governments and states their
legitimacy. In today's world, the boundaries of state and society are rarely
coterminous. The key to society, therefore, involves those ideas and practices
that identify individuals as members of a social group. Society is about iden-
tity, the self-conception o f communities, and those individuals w h o identify
themselves as members of a particular community. "Society" should basically
be conceived of as both Genzeinschaft and Gesellschaft, but thereby, t o some
degree, necessarily more than the sum of the parts (that is, not reducible to
individuals).'" O u r analysis of societal security thus builds on a Durkheirnian
conception of society as a distinctive, sui generis phenomenon."
It has become fairly common t o talk about various sectors (or the like)
within the field of security, hut the concept almost always poses the state as
the referent object. This, I have suggested ahove, leads to "societal security"
being understood as the security of a state uis-h-zlis its constituent societies,
which is not what we want. M y colleagues and 1 have therefore suggested a
reconceptualizatioll of the security field in terms of a duality of state security
and societal security. State security has souereignty as its ultimate criterion,
and societal security has identity. Both usages imply survival. A state that
loses its sovereignty does not survive as a state; a society that loses its iden-
tity fears that it will n o longer be able to live as itselfiiThere are, then, at the
collective level between individual and totality, two organizing centers for the
concept of security: state and society. At a secondary level, in the way por-
trayed in figure 1, there are also the "individual" and "international" levels,
which influence national, o r state, and societal security, as well (see figure 2).
The deeper cause of this emerging duality may well be a tendency toward
the dissolution of the modern state system, as political authority is dispersed
across multiple levels. This process begins to undermine the exclusive, sover-
eign, territorial state, as overlapping authorities begin to emerge." In Europe,
84 Widening Security
I;,)"
International dynamics\
focus:
,identity
7,i
t
yy
l y /
conceptual
my
society state
better placed than others to speak on behalf of "their" societies. But "societyn
never speaks, it is only there to be spoken for.
While such representations are made all the time - indeed, a large part of
politics is about speaking in the name of society61 - there is a difference
between normal politics and speaking "security" in the name of society. We
cannot predict who will voice "societal security" concerns; we can only see,
with hindsight, how much legitimacy an actor did possess when slhe tried to
speak on behalf of society. Various actors try this all the time, but the
attempt becomes consequential on a different scale when society more or less
actively backs up the groups speaking. This has sometimes been the case
with neo-nazis in Germany, in contrast to ultra-leftist terrorist acts commit-
ted in the name of the people but without much, if any, public support.
Most often, there are no generally legitimized, uncontested representatives
of society: There is the state or there is nothing.62 This does not, of course, pre-
vent groups from speaking on behalf of society and gaining some degree of
backing for some period of time. Only in rare situations, as during the "Velvet
Revolution" in Czechoslovakia, do we see moments - almost seconds - of a
kind of self-evident representation of "society" by some nonelected but gen-
erally accepted institution such as Civic Forum. It is much more common for
a societal "voice" to be controversial and only partly accepted. Normally, the
state has preempted or prevented societal actors from taking on this func-
t i ~ n but
, ~ this
~ is no longer necessarily the case, especially in the complex con-
stellations evolving in Western Europe. There, we could begin to see a growing
division of labor between state and, society, as societal voices establish them-
selves as defenders of certain proclaimed identities, while the state continues
to pursue the separate agenda of defending its sovereignty.
It is easy to envision potentially troubling effects if certain societal
issues, such as migration, are securitized. Elizabeth Ferris illustrates how
this has already happened in Europe, with the result that the previously
dominant framings of immigration as a humanitarian or domestic economic
issue are being crowded out by notions of security threats.64 Dan Smith sug-
gests that "if security policy is justified on essentially racist grounds, that
will feed back to strengthen racist currents in society."65
Where Europeanization is concerned - if one favors European integra-
tion - it may be more advantageous to have such issues securitized in terms of
societal security rather than state security. If, on the one hand, the "threat"
from a new overarching identity is countered through a strengthening of state
control over borders, the result will be to block integration and accelerate a
renationalization of policies. If, on the other hand, the challenge is taken on
by society as something it should deal with as the state is partly lifted to the
European level, a process of cultural "rearmament" of the nation may be com-
patible with political integration into Europe.
Balkanization v v s - stability
fragmentation a v s - integration
--
Balkanization
"Superpower"
influence
-
v-s- stability
-
vs ----+ E U responsibility
-
for security.
One thing leads to another. This has been a feature of the Community,
which is constantly being taken into new areas. One of these new areas
is closely linked to the overall concept of security. I am referring, of
course, to the consequences of free movement for individuals and the
need for joint action, or at the very least close co-ordination, to c o n h a t
the various threats to personal security: organized crime, drug trafficking,
terrorism. ... Political initiatives in this security-related area are another
expression of solidarit).: a leitmotif o f the European pact.'"
transcendental signifii - a point which is its own referent, endowed with the
instruments (security) for reproducing itself. The way in which the mecha-
nism of security is then inscribed in the new Europe will be a major factor
in forming Europe's political system(s).
From a more Nietzschean perspective, I should also mention that politics
always involves an element of exclusion, in which one has to do violence to the
i n h e r e n t o p e n n e s s of s i t u a t i o n s , to impose a p a t t e r n - a n d o n c has not only
to remember but also to forget selectively." To act politically means to take
responsibility for leaving a n impact, for forcing things in one direction instead
of another. Whether such an act is "good" or "bad" is not defined by any inner
qualities of the act or its premises, but by its effects (which depend on the
actions of others, interaction and, therefore, an element of coincidence). As
Hannah Arendt pointed out, "Action reveals itself fully only to the storyteller,
that is, to the backward glance of the hi~torian."'~Acting politically can, con-
sequently, never be risk-free, and "progressiveness" is never guaranteed by
one's political or philosophical attitude. Theoretical practices, as well as any
political ones, have to risk their own respectability and leave traces, letting pos-
terity tell the story about the meaning of an act. Post-structuralists have usually
been arguing that their project is about opening up, implicitly arguing that a
situation was too closed, too self-reproducing. Politics is inherently about clos-
ing off options, about forcing the stream of history in particular directions.'"
In the present context, politics and responsibility can involve preven-
tion and limitation and, at times, the tool o f securitization may seem neces-
sary.It is thus not impossible that a post-structuralist concerned about risks
of power rivalry and wars will end up supporting a (re)securitization of
"Europe" through rhetorics such as that of integratiodfragmentation. The
purpose of this would be to impose limits, but it would have as a side-effect
some elements o f state-building linked to the EU project. This could there-
fore imply that national co~nrnunitiesmight have to engage in a certain
degree of securitization of identity questions in order to handle the stress
from Europeanization. Under such circumstances, there might emerge a com-
plementarity between nations engaging in societal security and the new
quasi-state engaging in "F,uropean security." Neither of these two moves are
reflections of some objective "security" that is threatened; they are, instead,
possible speech acts, moving issues into a security frame so as to achieve effects
different from those that would ensue if handled in a nonsecurity mode.
Notes
I . Ole Wzver "Security the Speech Act: Analysing the Politics of a Word," Copenhagen:
Centre tor Peace and Confl~ctResearch, Working Paper no. 1989119. Part of the sections e n d e d
Security: "The Concept and thr Word" and "From 'Alternat~veSecurity' to 'Secur~ty,the Speech
Act"' as well .IS the subsection "Change and Detente: European Security 1960-1990" under
" S e c ~ ~ r i t i r a t ~a on dn De-secur~tlzation:Four Cases" are adapted (sometimes abbreviated, some-
times elaborated) from this working paper; the latter suhsect~on,as well as the final one,
"F.uropean Security After th? Cold War." rnclude ideas previously presented in the paper "The
changing character of continuity: European Security Systems 1949, '69, '89, ... ," presented in
92 Widening Security
the panel on 'European Change Revisited' at the annual conference of British International
Studies Association, Canterbury, December 1989 and reprinted as Working Paper, 211990; the
subsection "Societal Security" draws on my contributions to Ole Wzver, Barry Buzan, and
Morton Kelstrup, Pierre Lemaitre, Identity, Migration and the New Security Agenda in Europe
(London: Pinter, 1993).
2. On the deconstructive strategy of such "post-structuralist realism," see Ole Waever,
"Tradition and Transgression: a post-Ashleyan position," in Nick Rengger and Mark Hoffman,
eds., Beyond the Interparadigm Debate (Brighton, U.K.: HarvesterlWheatsheaf, forthcoming);
Ole Waever, "Beyond the 'beyond' of critical international theory," paper for the (B)ISA con-
ference, London March-April 1989 (Centre for Peace and Conflict Research, Copenhagen,
Working Paper 198911.)
3. See, e.g., Jan Oberg, At Sikre Udvikling og Udvikle Sikkerhed (Copenhagen: Vindrose,
1983); Egbert Jahn, Pierre Lemaitre and Ole Waever, European Security: Problems of Research
on Non-Military Aspects (Copenhagen: Copenhagen Papers of the Centre for Peace and
Conflict Research, 1987); Barry Buzan People, States and Fear: An Agenda for Security Studies
in the Post-Cold War Era (Boulder: Lynne Rienner, 1991,2nd ed.); Ole Waever, Pierre Lemaitre
& Elzbieta Tromer, eds., European polyphony: Perspectives Beyond East- West Confrontation
(London: Macm~llan,1989).
4. Oberg, At Sikre Udvikling; see also Johan Galtung, "The Changing Interface Between
Peace and Development in a Changing World," Bulletin of Peace Proposals #2 (1980):14549;
Johan Galtung, "Twenty-Five Years of Peace Research: Ten Challenges and Some Responses,"
Journal of Peace Research 22, #2 (1985):141-58, see especially pp. 146f.
5. This discourse will probably only have a political role if it appears as part of a social
movement (such as a peace movement) that presents the establishment with a wall of mean-
ingless practice, i.e. if it appears as part of an external, upsetting activity which is shocking
precisely because it is incomprehensible. For a more detailed discussion of this point, see Ole
Waever "Moment of the Move: Politico-Linguistic Strategies of Western Peace Movements,"
paper presented at the twelfth annual scientific meeting of the International Society of Political
Psychology, Tel Aviv, June 18-22 (Centre for Peace and Conflict Research, Working Paper no.
1989113); and Ole Wzver "Politics of Movement: A Contribution to Political Theory in and
on Peace Movements," in: K. Kodama and U. Vesa, eds., Towards a Comparative Analysis of
Peacemovements (Aldershot, U.K.: Dartmouth 1990), pp. 1 5 4 4 .
6. Oberg, At Sikre Udvikling; Richard H. Ullman, "Redefining Security," International Secur-
ity 8, no. 1 (Summer 1983): 129-53; JessicaTuchman Mathews, "Redefining Security," Forergn
Affairs 68, no. 2 (Spring 1989): 162-77.
7. See Jahn, et al., European Security, pp. 51-53.
8. Alexander Wendt, "Anarchy is what states make of it: the social construction of power
politics," lnternational Organization 46, no. 2 (Spring 1992): 391426; C. A. W. Manning, The
Nature of lnternational Society (London: London School of Economics, 1962); Martin Wight,
Systems of States (Leicester:Leicester University Press,1977); Ole Wzver, "International Society:
The Grammar of Dialogue among States?,"paper presented at ECPR workshop in Limerich,
April 1992; Nicholas Greenwood Onuf, World of Our Making: Rules and Rule in Social Theory
and International Relations (Columbia: University of South Carolina Press, 1989).
9. "Most seriously, however, even if we admit that we are all now participating in common
global structures, that we are all rendered increasingly vulnerable to processes that are planetary
in scale, and that our most parochial activities are shaped by forces that encompass the world and
not just particular states, it is far from clear what such an admission implies for the way we organ-
ize ourselves politically. The state is a political category in a way that the world, or the globe, or
the planet, or humanity is not. The security of states is something we can comprehend in political
terms in a way that, at the moment, world security can not be understood." R.B.J. Walker,
"Security, Sovereignty, and the Challenge of World Politics," Alternatives 15, no. 1 (1990): 5.
There is nothing inevitable about this way of defining security - it has emerged historically, and
might change gradually again - but one has to admit "the extent to which the meaning of secu-
rity is tied to historically specific forms of political community" (Walker, "Security, Sovereignty").
Only to the extent that other forms of political community begin to become thinkable (again),
does it make sense to think about security at other levels. The main process at the present is a very
\\ ~ x v
t a i Securitization and Desecuritization 93
open a n d contradictory articulation of the relationship between state (and other pol~ticalstruc-
tures) a n d nation (and other large scale cultural communities). Therefore, the main d y n a m ~ cof
security will play a t the intertace of srate security and societal security (in the sense of the securlty
of large-scale we-identities). Thus, in the section o n "Soc~etalSecurity," I will argue why the study
of "societal security" should - although heing aware of specitic threats t o soclal groups - con-
struct the concept of soc~etalsecurity as distinct from t h ~ s as , heing a t a speclfic level of collectiv-
ity, heing a social fact.
10. But even here o n e c ~ argue n a h o u t t h e way of defining these standard cases as m i l i t ~ r y
o r political; Jahn, et a/., Euro/,ean Security, pp. 17-20.
I I. Barry Buznn argues more extensively a s follows: "Bewuse the use of force can wreak
major undes~redchanges very swiftly, rn~litarythreats are tradltlonally accorded the h ~ g h e s rpri-
ority In national securit) concerns. Military action can wreck the w o r k of centuries in all other
sectors. D~fficultxcomplislinients in politics, art, ~ndustr);culture a n d a11 human activities can
he undone by the use of force. H u m a n nchievements, In other words, can be threatened in terms
other than those in which they were created, and the need t o prevent such threats fro111 being
realized is a major underpinning ot the state's m ~ l ~ t a rprotection y f u n c t ~ o n .A defeated soclety
is totally vulnel-ahle t o the conqueror's power w h ~ c hcan he applied t o ends ranging from
r e s t r u c t ~ ~ r ~the
n g government, through pillage and rape, t o rn,l\sacre of the p o p u l a t ~ o nand
resettlement o f the I m d . The thre,lt of force t h ~ st~niulates~s .
n o t onl\, a oowerful concern t o nro-
tecr the socio-poht~calherit'lge of the stdte, hut also a sense o f outrage a t the use of u n f a ~ rforms
of competition.'' IJcoplc, St'ztes and keilr, p. 1 17.
12. J a h n , et ' I / . ,Europcizn Scmrrt): p. 9.
13. Arnold \Volfers, Drsi-ord m d Coll~7bori7tion:Essays or1 Inir~rnationalPolitics (Balti~nore:
T h e J o h n s Hopkin\ University Press, 19621, p. 150.
14. Raymond Aroti, I'rmc irnd W7r: A T l ~ f Y ) pof Into-nizttonal Politics ( N e w York:
I)ouhleda!; I 9 6 6 ) , pp. 72f a n d SYXf.
15. This is the reason why small states w ~ l loften hc cnretul not t o d e s ~ g n a t e"inconven-
iences" a s securlry problem\ o r ~ n f r ~ n g c r n e not sn wvereignty - it they are, in any event, u ~ i a b l e
t o d o anything a h o u t it. O n e exnmple w a s Finland In r e l a t ~ o nt o the Soviet Union.
16. Jean-Jacques R o u w a u , " O n Social Contract o r Principles of Political Right" 117621,
(translated hy Julia (:ono~v,iy Bondanella) pp. 84-174 in: Alctn Ritter a n d J u l i a Conoway
Bondanella. eds., Rousse~ru'sPolrtrcal \YJriturgs ( N e w York: W.W. Norton, 19881, p. 90.
17. T h ~ essenri,ll
s argumellt - the repetition of war In nonmilitary form - is the b n s ~ cdiffer-
ence hetween mine and the one made b y some ,idvocates of "non-offensive defense," most
notably Anders lioserup a n d Poul Holm Andreasen (trom w h o m I have learned this Interpret-
ation of Clausewiti). T h e ulr~matetest can arlse in another sphere today, and the whole game
therefore conrlnuej. Anders Boserup deduced from the nuclear c o n d i t ~ o nan imposihility of
Clausewitzian WJI; and from this ,I host of other tar-reachiriji (political as well as theoretic,~l)
coticlusions. Thew strong pol~ticalconclusions, however, depend o n a concept~~alwation of secur-
ity (existent~althreats t o sovereignty) as hy necessity ni~htar): Elsewhere, 1 have criticisecl F,gon
R,dir's L I S ~of t h ~ sopcr,ltlon and hi\ way of thereby establishing political necessity from ;I mili-
wry analys~s;Ole W z w r "Ideologies ot Srabili7at1on - St,lh~l~/ationof Ideologies: K e a d ~ n g
G e r m l n Social I)emocrats," in: V. H a r k and P. Sivonen, eds., h i r o p e in TrilnsitiOn: Polltics imd
Nnclcnr Strategy ( I ondon: Frances P~nter,1989), pp. 110-39. Still, the a n a l y s ~ spresented here
owes very much t o the iniprcs\~vea n d orig~n'ilC l a u e w i t i ~nterprerationof Anders Boscrup.
18. Anders Roserup, "St'~ten, snmf~llidetog k r ~ g e nhos Clausc\vitz," In: Carl von C l a ~ ~ s e w i t ~ ,
O m Krig, [ ~ i n d111: kom~ncntnrerog regrstrc (Copenhagen: Khodos, 1986), pp. 9 1 1-30.
19. Carl von clause wit^, V o m Krieg. [originally publ~shcd 18.121, (Frankfurt: Ullstein
i\/laterialen, 1980), p. 19 - Book I, Ch,lpter I . 1 follow here 1.1. (kaham's translat~onin O n War,
edited with a n introduction by Anatol Rapoport (Harmondsworth, U.K.: Penguin, 198.5), p. 103.
20. C l a u s e w m , Vont Kric~gcBook I. chapter 1, p. 17; O n LV'JY,p. 101.
2 1. Aron, ['race and N'n, p. 2 I .
22. T h o m a s Hobbes. 1.cwrath~rn(Middlesex: I'elican Boohs, 1968 11651 11, pp. 2.32t.
23. M o r e prec~selv,in the theory of speech acts, "secur~ty" would he seen a s ,In 11loc.r.r-
tron'rrv act; t h ~ IS \ elahorarcd a t length in my "Securit); the Speech Act." See also: J.1.. Austin,
hot^, to d o 'I'hrnp wrth Words (Oxford: Oxford Un~versit)Press, 197.5, 2nd ed.), pp. 98ff.
94 Widening Security
24. A point to which we will return: The other side of the move will, in most cases, be at
least the price of some loss of prestige as a result of needing to use this special resort
("National security was threatened") or, in the case of failure, the act backfires and raises ques-
tions about the viability and reputation of the regime. In this sense the move is similar to rais-
ing a bet - staking more on the specific issue, giving it principled importance and thereby
investing it with basic order questions.
25. The strongest case for the theoretical status of speech act failure being equal to success
is given by Jacques Derrida, "Signature Event Context," Glyph 1 (1977): 172-97 (originally
presented in 1971). The article was reprinted, in a different translation, in Jacques Derrida,
Margins of Philosophy (Chicago: University of Chicago Press, 1982).
26. Raymond Aron, On War: Atomic Weapons and Global Diplomacy (London: Secker
and Warburg, 1958 [French original 1957]), pp. 80-102.
27. Rudolf Horst Brocke, Deutschlandpolitische Positionen der Bundestagsparteien -
Synopse (Erlangen: Deutsche Gesellschaft fiir zeitgeschichtliche Fragen, 1985), pp. 66f and 79f.
28. Wilfried von Bredow and Rudolf Horst Brocke, Das deutschlandpolitische Konzept
der SPD (Erlangen: Deutsche Gesellschaft fiir zeittgeschichtliche Fragen, 1986); Ole Wzver
"Ideologies of Stabilization"; and Ole Wzver, "Conceptions of DCtente and Change: Some Non-
military Aspects of Security Thinking in the FRG," pp. 186-224, in: Wzver, et al., European
Polyphony.
29. Weaklstrong states refer (in contrast to weaklstrong powers) to the political strength
of the state; how much state the state is, which means basically the degree of sociopolitical
cohesion - not least how well the fit between state and nation is. Weaktstrong powers then
cover the more traditional concern about the "power" of a unit (as its ability to influence other
units). See Buzan People, States and Fear, pp. 96-107, 113f and 154-58.
30. Ole Wzver, "Conflicts of Vision -Visions of Conflict," pp. 283-325 in: Wzver, et al.,
European Polyphony.
31. See, e.g., Theodore Draper, "A New History of the Velvet Revolution," New York
Review of Books, Jan. 14, 28, 1993 (in two parts).
32. Ole Wzver, "The Changing Character of Continuity."
33. See Jadwiga Staniszkis, "The Dynamics of a Breakthrough in the Socialist System: An
Outline of Problems," Soviet Studies 41, no. 4 (1989): 560-73; Jadwiga Staniszkis, The Ontology
of Socialism (Oxford: Clarendon Press, 1992).
34. To this might be added the interpretations of "conversion of power," that is, the way the
old elite transformed its old system power into new capitalist "power" - and therefore did not
need to oppose change as strongly as one would have expected. See Staniszkis, "Dynamics";
ElernCr Hankiss, East European Alternatives: Are There Any? (Oxford: Oxford University Press,
1990); and Ole Wasver, "The Changing Character of Continuity," pp. Ilff.
35. Ole Wzver, "Security the Speech Act," pp. 4Sf. - making reference to the argument of
Derrida, "Signature Event Context."
36. Ole Wzver, "Three Competing Europes: German, French, Russian," International
Affairs 66, no. 3 (July 1990): 477-93; especially pp. 486-88.
37. Ole Wzver, "The Changing Character of Continuity," pp. 20f.
38. Alternatively, but not much better (in the eyes of the security establishment), a slogan
of "non-military aspects of security" could point toward the "Eastern" argument for economic
and political security and thereby for legitimizing a concern for system stability beyond the
field of military threats (cf. the preceding section).
39. The articles were: Robert D. Hormats, "The Economic Consequences of the Peace -
1989"; Hans W. Maull, "Energy and Resources: The Strategic Dimension"; Neville Brown,
"Climate, Ecology and International Security"; Michael J. Dziedzic, "The Transnational Drug
Trade and Regional Security"; and Sam C. Sarkesian, "The Demographic Component."
40. Secretary Baker, "Diplomacy for the Environment," address before the National
Governors' Association, February 26, 1990, Washington D.C. (reprinted in Current Policy, No.
1254, February 1990), quoted in Richard H. Moss, "Environmental Security? The illogic of cen-
tralized state responses to environmental threats," in: Paul Painchaud, ed., Geopolitical
Perspectives on Environmental Security (Cahier du GERPE, No. 92-05, Universite Laval, Quebec).
? , ar 1 1 Securitization and Desecuritization 95
41. This is one of the fite sectors drscussed by Buzan in l'coplc, States and Fear, pp. 13 1-33.
42. Barry Buzan, "Env~ronmenta s a Security Issue," in: P'iul Painchaud, ed. Geopolitrc-irl
Perspectiries on Environmental Securlty (Cahrer d u GERPE, N o . 92-05, UniversitG Laval,
Quebec), pp. I and 24f.
43. Buzan, "Environment as '1 Security Issue," p. 15.
44. Moss, "Env~ronmentalSecurity?." p. 24.
45. Moss, "Environmental Security?," p. 32.
46. ~ < , s squote5 the Scnarr A r n ~ c dSCTV~CCS
C<>tm,m;ttcc to thi. effect t h a t protecting U.S.
interests against environmental changes "may ult~matelyrequire the use of U.S. mil~tary
power." See "Env~ronmentalSecurity?," p. 21.
47. Daniel Deudney, "The Case A g a ~ n s Linking
t Fhvironlnental Degradation and N ~ t ~ o n a l
Security," Millennium 19, no. 3 (Winter 1990): 461-76; here quoted from p. 467.
48. Moss, "Environmental Security?," p. 32.
49. Buzan, "Environment as a Secur~tyissue," p. 24.
50. This was w h a t led AndrG G o r r some years ago to the conclusion that the tvay we
addressed environmental issues (which he certainly cdred about t o o ) contained the danger of
"eco-fascism." See Andre (iorz, Ecologie et lrherte (Paris: Editions Galilee, 1977). See also
Charles T. Rubin, The Green Crusade ( N e w York: Free Press, 1994).
51. Anders Boserup, presentation o n the concept o f securrty. Centre for Peace , ~ n dConflict
Research, Copenhagen, 1985.
52. Buzan, "Environment a s a Security Issue."
53. Buzan, "Envrronment as a Secur~tyIssue," p. 26.
54. I>eudney, "The Case Agalnst Linking Envlronrnental Degradation ...," p. 469.
S5. Kuzan, "Environment as J Security Issue," p. 25; see pp. 16-19 about the economlc
approach.
56. Thrs issue ot the nature o t society (and individuals) I S a debate often replayed under var-
ious h e a d i n g such as methodological individualisn~verslrs niethodological collectrvism, o r more
fashionably these past few years a s liberal~srnversus communitarianism; see, for example, Tracy
B. Strong, ed., The Selfand tile Political Order (Oxford: Blackwell, 1992); and Q u e n t ~ nSkmner,
''On Justice, the Cornmon ( h o d and the Priority of Liherty," pp. 2 11-24 in: Chantal Mouffe,
ed., Dintenstons of Radical Democvilcy: I'brrulisnr, Cztt~msl71p.(:omnzunity (London: Verw,
1992). F~nally,there is a point In critrcizing dichotomies like the C;emetnschaft/Gesellscl~~zft one,
inasmuch as it obscures the important political arena of practices that are neither openly
addressed nor a necessary expression of the "soul" of a conimunity but transferred In the form
of "practical knowledge." See Kichard K. Ashley, " l m p o s ~ n gInternat~onalPurpose: Notes o n a
Problematic of (;overnance." pp. 2 5 1-90, in: E:O. Czernpiel and J.N. Rosenau, eds., Global
C h a n p s and T17roretici~lC:hilllen~rs(Lexington: 1.exington Kooks, 1989); and Ole W m e r ,
"International Society: the <;rammar. ... " Finally, ~t could he argued that this debate ought to
be displaced toward "the re\pective ronstttutron of the indiv~du.il(the 'self') and the p o l ~ t y(the
'order')," a s argued by Tracy Strong, The Self, p. 3.
57. T h e insecurity of social groups could affect the s t a b ~ l ~ and
r y security of soc~etya s a kmd
of insecurity from helow: T h e insecurity of social groups might spread t o whole societies and
into other sectors. Thus, "societal securrty" entail5 an Interest In security a t all lower levels.
It seems, however, not adv~sahleto tlefinr the sum of these smaller secur~tiesas societal security,
inasmuch ac thls would Ie'id LIS down the track toward a n atomlstlc, aggregate view of securrt);
where the ultinute question is individual (= global) security. Openmg u p the definition of soci-
etal security as the securlty of varlous groups would (beyond probably proving to be a n infin~te
expansion of the subject) lead in the direction of an aggregate conception of the constituent col-
lectivities. As with state securlty, societal security has t o he understood first of all as the sccur-
rty of a social agent which has an independent reality and whlch IS Inore than and different from
the sum of ~ t individuals.
s Approaching it by way of summing up, aggregatmg individual pref-
erences, one will never capture the nature o f its security prohlenis which are constituted In the
relationship of a state and itr environment and a society and ~ t environment.
s In the case of soci-
etal security, it is actually the case that societies are often made insecure because important
group5 in society feel insecure. This, however, has t o be kept conceptually separate from the
96 Widening Security
security of a society, societal security. Societal is not social security. The referent object for soci-
etal security is society as such, neither the state, nor the (sum of the) individuals.
58. The logic of security points to questions of survival but, of course, the rhetoric of secur-
ity will often be employed in cases where survival - that is, sovereignty or identity - is not actu-
ally threatened, but in which it is possible to legitimate political action by making reference to
such a threat. State security can be influenced by the (in)security of a society on which it is
based, but this has to be seen as a two-step procedure. In the case of real "nation states", there
will be small difference between the pure state definition and the new more complex one of
state security via societal security. When nation and state do not coincide, however, the secur-
ity of a state-challenging nation will often increase the insecurity of the state. More precisely,
if the state has a homogenizing "national" program, its security will by definition be in con-
flict with the societal security of "national" projects of subcommunities inside the state.
59. This can be analyzed in terms of a "new middle ages." The medieval metaphor has the
advantage of drawing our attention to the change in the organizing principle of the sovereign,
territorial state, and not the nation-state (which is only half as old). The national idea is obvi-
ously not dying out (nor is politics as such giving way to interdependence or technocratic
administration as often imdied in ideas of "end of the nation-state"): what is modified is the
organization of political space. For some four centuries, political space was organized through
the principle of territorially defined units with exclusive rights inside, and a special kind of rela-
tions on the outside: International relations, foreign policy, without any superior authority.
There is no longer one level that is clearly the most important to refer to but, rather, a set of
overlapping authorities. Consequently, even those nations most closely approaching the ideal
type of the nation-state are beginning to lose the option of referring always to "their" state.
In a historical perspective, therefore, the state-nation relationship is moving toward an
unprecedented situation. The nation, born into an interstate system based on the sovereign
state (already 200-300 years old at the time), might continue into a post-sovereignty situation.
Thus, the post-modern political system will not be totally like the Middle Ages in this import-
ant sense. The understanding of this complex evolution is often blocked by the use of the term
"nation-state" as designating both the emergence of the national idea and the twice as old ter-
ritorial state (i.e. the principle of territoriality, sovereignty, and exclusivity), which means that
the specific nature and importance of the latter concept (which is the basic system organizing
principle) is overlooked. This obscures an understanding of the importance of a possible
change at this level. Announcements of the demise of the nation-state are often refuted by
pointing to the continuing importance of nationalisrnlthe nation idea, but this misses the point
since the major change seems to happen at the level of the state (which of course implies that
the nation-state as we have known it will also change since it was built on the territorial state),
whereas the nation as such continues.
See Hedley Bull, The Anarchical Society: A Study of Order in World Politics (London:
Macmillan, 1977), pp. 254f, 264ff, 285f, and 291ff; James Der Derian, On Diplomacy:
A Genealogy of Western Estrangement (Oxford: Blackwell, 1987) pp. 70 and 79ff; Timothy
W. Luke, "The Discipline of Security Studies and the Codes of Containment: Learning from
Kuwait," Alternatives 16, no. 3 (Summer 1991): 315-44, especially pp. 340f; Ole Wzver,
"Territory, Authority and Identity: The late 20th Century emergence of Neo-Medieval Political
Structures in Europe," paper for the 1st conference of EUPRA, European Peace Research
Association, Florence, November 8-10, 1991.
60. See Ole Wzver, et a/., Identity, Migration and the new Security Agenda, especially chap-
ter 4; and Ole Waever, "Insecurity and Identity Unlimited," in: AnneMarie Le Gloannec &
Kerry McNamara, eds., The European Disorder, forthcoming (Centre for Peace and Conflict
Research, Copenhagen, Working Paper 1994114).
61. See, for example, Ernesto Laclau, Thoughts on the Revolution of Our Times (London:
Verso, 1990), pp. 89-92.
62. Probably we see here the reason why all this is more cryptic to Americans than to
Europeans. At first, a concept of societal security should seem more natural to Anglo-Saxons
who allegedly see state and society as separate, whereas the continental tradition is for state and
society to be conceived as related; see Kenneth Dyson, The State Tradition in Western Europe
\i , t i i I Securitization and Desecuritization 97
(Oxford: Martin Robertson, 1980); Henry A. Kissinger, A World Restored (Boston: Houghton
Miflin, 1957), pp. 192-95. The American trad~tionis, however, of a rather minimalist concept
of state, In which the state is not given any inherent rarson d'gtre in and of itself, hut is only leglt-
m a t e d as derivative (in the form of some kmd of s o c i ~ contract1 l and only when and if ~t serve\
- a n d defends - society. Contmentals 'ire more prone to grant the state its own r g h t t o existence,
and continental traditions point t o soricty as a collective, as 111ore-than-the-sum-of-the-parts,
which IS more alien to anglo-l~beralthought. Thus, in American thinking, "security" is implicitly
~ ulti~llat~ly
~ S C L I I t~uT be d rcferrnce t o cecuring i~rd;z,iclrcols.A concept of soc~etal
I ~ ~ i t i n i i z chy
security then becomes odd (the natural reaction is t o call for more correct and appropriate state
policy), unless one denounces the social contract conception as simply IiherallAmerican ideology.
If one agrees w ~ t hThomas I'a~ne that "What is government more than the management of the
affairs of a natmn? It I S not," and turther that sovereignty rests wirh the nation, which has always
the rtght "to abolish m y form o f government if finds inconvenient and establish such as ,iccords
with its interests, it\ disposition and ~ t happinessn s (Rr,yi~tsof M m , pp. xx), then separate agendas
o f security for state .ind nation hecome inconceivable. To continental Europeans, the state, more
than a pr,lgmatic Instrument for achieving the collective Interests o f a group of individu,tls, i \
seen as a unit wirh ~ t own s logic and concerns. So is society.
63. Carl Schmitt even cLlirned that the task of the state was t o define enemy and friend,
and if the state fililcd to accomplish t h ~ s ,inevitably others \vould come forward and d o so,
whereby the state would lose its position m d be replaced by the new power. Carl Schmitt, 1)cr
Rcgriff des Polrtischrn (Berlin: Duncker and Humblot, 1963 119.12]),especially pp. 45-54.
64. Elizahcth (;. Ferris, "Peace, Security and the Movement of People," unpuhl~shedpaper,
Life arid Peace Institute, Uppsala, Sweden.
65. Quoted b! Ferris, p. 17.
66. Wzver, "Three Competing Europes."
67. lahn, cJtd . , fiuropmn S~ctrrity,pp. 3.5-37.
68. James Der 1)crian "SIN: Intern,~tio~lalTheory, Balk,lniz,ltion, and the New World
Order," M i l l ~ n t ~ i u20,
w ~ 3 ( 199 I ): 485-506, quote o n p. 488; a150 in Der L k ~ a n Awtidrplotrrr~cy:
,
Spws, 7rrrov. Spred. '2nd War (Oxford: Blackwell, 19921, pp. 141-69.
69. Uer Derian, "SIN," p. 4 9 1.
70. Markus l ~ c h t e n f u c h sand M i c h x l Huber, "Institutional I'earning in the European
Chrnmunity: The Kespon\e t o the <;reenhouse Effect." In: J.D. Lifferink, P.D. [.owe ,lnd
A.P.J. Mol, eds., k~tropeanI ~ t ~ g r ~ ~mt dt ot ltn~~ ~ ~ r ~ n i n c t Iz' tOiIzI lC ~ (1.01idon:Bclknap, in press).
71. This argument is all-pervasive In the Europe,~npress a i d used by numerous politic~ans,
rncludmg Kohl a \ well as Mitterrand. An intelligent p o l ~ c >nn,tlysis argulng strongly along
these lines is \upplied by Peter Glotz, "F.urop<i a m Scheideu-eg" Europa Archic~47, n o . 18
(Septemher 25, 1992): 503-14. Attempts t o ground this ~deologicalanalysis in ( m a ~ n l yneo-
reallst) theory is found in: K u ~ a n ,et al., Tire Eur.opem S e u r i t y Ordrr Rccust: Ole W m e r ,
"S~kkerhedspolitiskStabihtet og N a t ~ o n a lIdentitet," pp. 101-6 1 in Christen Sorensen, ed.,
Europa - Nution, [inion: Eftcr Mlnsk og Manstricht (<:openhagen: Fremad, 1992).
72. Ole Wlrcer, "Model11 e rcenari futuri," I'olitira Irztc~r~taiona/e 2 1, no. 3 (gennaw-
marzo 1993): 5-27; m d Ole Waver, "Identity, Integrrltion and Security: Solving the Sovereignty
Pwzle In li.11. Srudics," ,/ourtzd of Intrrtzational Affirrrs 48, no. 2 (1995).
7.3. I'ress conference ot the I'res~dent, F r a n ~ o i sMitterrand, I r i East Berlin, December 22,
1989 (reprinted in E u r o p arc hi:^ no. 4 (1990): 1). 96-99),
74. Jacques Delors, "European Integration and Security," Srtr:ival 33, n o . 2 (M,~rchI/\pril
199 1): 99-109, quotation from p. 103.
7.5. Henry A. Kissinger, A World R c s t o r ~ d Ole ; Wxver, "Three C;ompettng Europes"; Ole
Wzver, "International Society: Theoretical Promises Unfulfilled?" Cooperation and Conflict 27,
no. 1 11992): 147-78.
76. With European security used in the f r a g r n e n t ~ t ~ o n l i ~ ~ t e g r away t i o n (as presented
above), the price seems t o be that Yugoslavia hecomes the test case for "Europe." As a place
t o "prove" Europe, however, solving the problem of the Balkan\ is hardly the test one would
choose. The unfortunate first case poses a risk t o Yugoslavia as well as t o the EU. As the EU
h , ~ sbecome pulleditempted t o jump into the conflict, it hccomes an aim in itself t o act.
98 Widening Security
Moreover, the EU has been conducting its policy with the main criteria being the effect on the
EU, not on Yugoslavia. See Ole Walver, "Den europaliske union og organiseringen av sikker-
heden i Europa," pp. 33-72, in: Martin Salter et al., Karakteren av Den europeiske union
(NUPI-Report no. 160, July 1992, Oslo), especially pp. 64-66; Hikan Wiberg, "Divided States
and Divided Nations as a Security Problem - the Case of Yugoslavia" (Centre for Peace and
Conflict Research, Working Paper no. 1992114).
77. This is probably most clearly argued in "Vom Nutzen und Nachteil der Historic fiir das
Leben," where Nietzsche says for instance that "all great things" depend on illusions in order to
succeed (in Friedrich Nietzsche, Werke (FrankfurtIM: Ullstein 1969, vol. I), p. 254). It further
links up to the themes of "setting values" and "creating beyond oneself" from, for instance "Thus
spoke Zarathustra," and the risk implied in "the will to power."See, for example, Werke, vol. 2,
pp. 301, 356ff, 394f, 600,73Of, and 817-20; and Ole Wzver, "Tradition and Transgression. ..."
78. Hannah Arendt, The Human Condition (Chicago: Chicago University Press, 1958),
p. 192.
79. If some reader were puzzled above to find the author referring to himself as an exam-
ple of an "ideological" and "disciplining" move, this was not (necessarily)a case of analytical
scizophrenia but, rather, a conscious self-deconstruction. This points toward a tricky question
about post-structuralism and politics. For understandable but contingent institutional reasons,
post-structuralists have emerged on the academic scene with the political program of tearing
down "givens," of opening up, making possible, freeing. This invites the reasonable question:
opening up room for what? Neo-nazis? War? How can the post-structuralist be sure that "lib-
erating minds" and "transcending limits" will necessarily lead to more peaceful conditions,
unless one makes an incredible enlightenment-indebted "harmony of interests" assumption?
For someone working in the negatively-driven field of security, a post-structuralist politics of
responsibility must turn out differently, with more will to power and less de-naturalization.
Security Studies and the End of the Cold War
David A. Baldwin
of the post-cold war world; for others it grows out of the collective failure
of scholars to anticipate either the timing or the nature of the end of the cold
war. And third, there is a need for a broader view of national security (see
especially the essays by Schelling and Peterson, in Allison and Treverton).
For some this means including domestic problems on the national security
agenda; for others it means treating nonmilitary external threats to national
well-being as security issues.
Each of these books raises fundamental questions about the theories,
concepts, and assumptions used to analyze security during the cold war and
about those that should be used now, in its aftermath. This review in turn
seeks to lay the intellectual groundwork for a reexamination of security
studies as a subfield of international relation^.^
The discussion is presented in three parts. The first surveys the emer-
gence and evolution of security studies as a subfield of international rela-
tions. It suggests that scholars who wrote on national security at the beginning
of the cold war had a broader and more useful approach to the topic than
those writing at its end. The second part assesses the relevance of security
studies to the new world order. It argues that the field's treatments of the
goal of security, the means for pursuing it, and the domestic dimensions of
security raise serious questions about its ability to cope with the post-cold
war world. And the third part reviews proposals for the future study of
security; these range from holding to the status quo to abolishing the sub-
field and reintegrating it with the study of international politics and foreign
policy. It suggests that a strong case can be made for reintegration.
If security studies is defined as the study of the nature, causes, effects, and
prevention of war, the period between the First and Second World Wars was
not the intellectual vacuum it is often thought to be. During this period
I Security Studies 10 1
Later chroniclers of the history of security studies have suggested that there
was little academic interest in security studies until the m i d - 1 9 5 0 ~when~ it
was sparked by concern about the doctrine of massive r e t a l i a t i ~ n . 'Although
~
it is true that national security was treated within the broader framework of
international relations and foreign policy, it is not true that questions of the
security of the nation were ignored. By 1954 a rich literature on national secur-
ity affairs was available to anyone wishing to design courses or do research."
It was, as Fox observed, "to be expected that fifteen years of world war and
102 Widening Security
The question then is not why there was so little interest in security studies
in the decade after World War I1 but rather why later descriptions of the evo-
lution of the field have been so blind to the work of scholars prior to 1955.
It is as if the field came to be so narrowly defined in later years that the ques-
tions addressed during these early years were no longer considered to belong
to the field of security studies.'"ince many of the authors of the books under
review subscribe t o a broader view, this is unfortunate. Many current prob-
lems are related to those addressed in the period 194.5-5.5, for example, the
trade-offs among foreign policy objectives, the trade-offs between foreign
affairs and domestic affairs, and the trade-offs between nonmilitary and mili-
tary policy instruments.
The second decade after World War 11, 195.5-65, has been described as the
"golden age" of security studies."' Unlike the previous decade, the "golden
age" was dominated by nuclear weaponry and related concerns, such as arms
control and limited war. The central question, according to one reviewer, "was
straightforward: how could states use weapons of mass destruction as instru-
ments of policy, given the risk of any nuclear exchange?"" This question, it
should be noted, represented a shift in focus from the previous decade. Whereas
earlier research questions considered what security is, how important it is
relative to other goals, and the means by which it should be pursued, the new
focus was on how to use a particular set of weapons. Contributors to this
literature included Thomas Schelling, Glenn Snyder, William W. Kaufmann,
Herman Kahn, Albert Wohlstetter, Henry Kissinger, and others."
Although deterrence theory, one of the most impressive intellectual
achievements in the history of the study of international relations, was a
product of the "golden age," the period also had its many blind spots. Even
scholars who define security studies in terms of military force have noted the
tendency during that period to overemphasize the military aspects of national
security at the expense of historical, psychological, cultural, organizational,
and political context^.'^ Edward A. Kolodziej evidently has this period in
mind when he observes that "a focus on threat manipulation and force pro-
jections became the central, almost exclusive, concern of security studies."
This agenda, he notes, "was certainly urgent and ample, but the questions
raised were inevitably circumscribed, technical, and nianagerial."'"
If the cold war stimulated and nourished security studies before 196.5, the
decreased salience of the cold war during the next fifteen years contributed
to a period of decline." As Americans turned their interest from the cold
war with the Soviet Union to the hot war in Vietnam, their interest in secur-
ity studies waned. Although some might view this as an irrational reaction
104 Widening Security
on the part of those who thought they could stop war by not studying it,
this would be an oversimplification. In the first place, security studies had
been so preoccupied with U.S.-Soviet relations, NATO, and nuclear strat-
egy that it offered little help to those seeking to understand the Vietnam
War. As Colin Gray put it, the leading strategists knew "next to nothing"
about "peasant nationalism in Southeast Asia or about the mechanics of a
counterrevolutionary war."26 Second, security studies had become so pre-
occupied with war as an instrument of national policy that it had slighted
the legal, moral, and other aspects of war emphasized in Wright's A Study
of War. Third, the desire to be "policy relevant" had led some scholars into
such close relationships with policymakers that they ceased to be perceived
as autonomous intellectuals and came to be considered instead as part of
the policy-making establishment. And fourth, the decline of interest in trad-
itional security studies was partially offset by increased interest in peace
studies and peace research during the 1960s and 1970s, thus indicating that
declining interest in security studies was not tantamount to a lack of intel-
lectual interest in war.27
Interest in security studies did not revive immediately after the Vietnam
War; rather the lessened cold war tensions associated with dCtente allowed
other issues, such as economic interdependence, Third World poverty, and
environmental issues, to increase in salience. And the Arab oil embargo
served as a sharp reminder that threats to the American way of life emanated
from nonmilitary sources, as well as from military ones.
The 1980s
The breakdown of detente and the renewal of cold war tensions in the late
1970s and 1980s once again stimulated interest in security studies. Student
interest was rekindled, foundation money poured in, and research burgeoned,
as the old national security studies was replaced by the new international
security studies.
The new international security studies, however, looked much like the
version of national security studies that had evolved after 1955. One writer,
who had written a comprehensive survey of the field in 1975, noted the
renaming of the field and observed that "the substance of the problems
addressed did not change markedly from what national security specialists
had been working on earlier."28 Another writer proclaimed the rejuvenation
of security studies in the 1980s as the "renaissance" of the field. Defining
the field as "the study of the threat, use, and control of military force," he
portrayed the renaissance as bringing history, psychology, and organization
theory to bear on such familiar topics as deterrence theory and nuclear
weapons policy and consideration of such topics as the conventional mili-
tary balance, the danger of surprise attack, alternative force postures, and
the role of the U.S. Navy.29 Although there were undoubtedly new insights
during the 1980s, such topics continued to reflect the preoccupation that
had characterized the field since 1955 - the use of military means to meet
i L i i t J i i 111 Security Studies 105
11. S e c u r i t y S t u d i e s a n d t h e N e w World O r d e r
During the cold war military threats to national security dominated all others
in the eyes of most security specialists. With the end of the cold war have come
numerous suggestions that resources once devoted to coping with military
threats now be used to deal with such nonmilitary threats as domestic poverty,
educational crises, industrial competitiveness, drug trafficking, crime, inter-
national migration, environmental hazards, resource shortages, global poverty,
and so on." The challenge, according to the Final Keport of the Seventy-ninth
American Assembly, is to "rethink the concept of national security" (Allison
and Treverton, 44647). Is the field of security studies capable of meeting this
challenge? A tentative answer is suggested by examining the field with respect
to three critical issues: the goal of national security, the means for pursuing it,
and the relation between domestic affairs and national security.
The end of the cold war, like its beginning, raises the question of how
important military security is in comparison with other goals of public policy.
106 Widening Security
Each of these passages can be interpreted in (at least) two ways. On the
one hand, since neither national security nor survival can ever be corn-
pletely assured, there can be no limit on resources allocated to this purpose;
and thus no trade-offs with other goals are ever a d m i ~ s i b l e On
. ~ ~the other
hand, the passages may be interpreted as implying that such trade-offs are
admissible only after a minimum threshold of assurance of survival andlor
national security has been attained. The latter, somewhat generous inter-
pretation is surely the more defensible.
The trouble with the second interpretation is that it fails to distinguish
between the goal of national security (or survival) and other important
goals. For example, the economist could assert the primacy of economic
welfare, since states are likely to worry little about external military threats
if their citizens have no food, clothing, or shelter, that is, no economic wel-
fare. Likewise, the environmentalist could assert the primacy of environ-
mental concerns, since minimum amounts of breathable air and drinkable
water are more important than security from external attack. In order to
survive, states need minimum amounts not only of security from external
attack but also of breathable air, drinkable water, economic welfare, and so
forth. A state without armed forces to protect it from external attack may
not survive, but a state without breathable air or drinkable water will surely
not survive.
I Security Studies 107
Security studies has traditionally devoted less attention to the goal of security
than to the means by which it is pursued. More accurately, one should say
that the field has tended to focus on one set of means by which security may
be pursued, that is, military statecraft. One recent review of the field, for
example, ignores security as a goal and defines the field entirely in terms of
means, that is, "the study of the threat, use, and control of military force.""
108 Widening Security
Likewise, Shultz, Godson, and Greenwood focus their volume on "the trad-
itional and historical essence of the subject: the threat, use and management
of military force" (p. 2).39
The reasons for the emphasis on means rather than ends are not self-
evident. A partial explanation for the emphasis on military force may be found
in the common practice of equating security interests with "vital interests."
Since the latter are typically defined as those interests for which a country is
willing to use force, some confusion between means and ends is almost
i n e ~ i t a b l eAnother
.~~ possible explanation is the tendency of security schol-
ars to treat national security goals as "given." One writer describes the situ-
ation as follows:
Do Nothing
Not everyone agrees that reform is needed. For Mearsheimer, the essential
defining characteristic of international politics has been and remains a zero-
sum competition for military security. Whereas others may see a diminution
of military threats to security, he maintains that the end of the cold war does
not "mean that states will have to worry less about security than during the
Cold War" (Mearsheimer, in Allison and Treverton, 235).
For Walt, the end of the cold war expands the agenda of security stud-
ies to include post-cold war security arrangements and makes the study of
"grand strategy" more important; but it does not necessitate redefining the
scope of the field. The end of the cold war, he contends, "will keep security
issues on the front burner for some time to come."52
Modest Reform
Security Studies for the 1990s is based on the premise that reform of security
studies would have been in order even if the cold war had not ended.
I Security Studies 1I I
Accordmg to t h ~ svlew, the latter event s~mplymakes the case for such re-
forms more compellmg. Although some of the contrtbutors, espec~allyCharles
Kegley, Oran Young, and Edward Kolodz~e~, argue for radlcal reforms, most
concentrate on mlnor reforms consistent with the edltors' convent~onaldef-
lnltion of the subject a? "the threat, use and management of mhtary force, and
closely related toplcs" (p. 2).
The editors identify weaknesses in the "first-generation curriculum"
(1950-90) of security studies, including overemphasis on nuclear deterrence,
the United States, Europe, and the former Soviet Union and neglect of the
Third World, Asia, and nonmilitary instruments of policy. They then present
model syllabi for eleven courses, which are discussed by various commenta-
tors. The three syllabi emphasizing economic, environmental, and regional
aspects of security are the only ones that depart from the traditional security
studies orientation. The inclusion of the regional security syllabus by Kolodziej
is somewhat anomalous. since he clearlv, reiects
, the narrow traditional defin-
ition of security in favor of one broad enough to include domestic affairs,
economic issues, human rights, and more. The inclusion of courses on eco-
nomic and environmental aspects of security is in itself an innovation, of
course; but the proposed syllabi d o not depart significantly from conven-
tional views of security. The syllabus o n "environment and security," for
example, emphasizes such topics as environmental tools of warfare (herbi-
cides, for example), environmental side effects of warfare, and environmen-
tal disputes as causes of war.
Overall, Security Studies for the 1990s presents a view o f the field not
much different from the cold war version. What is needed, it suggests, is not
fundamental reorganization of the field but rather modest reform.
Radical proposals for reforming security studies include those that call for
broadening the focus o f the field and those that advocate reintegration of
security studies with the study of foreign policy and international politics.
Proposals for expanding the focus of security studies have been advanced
by numerous scholars, including Ullman, Ruzan, Haftendorn, Kolodziej, and
Kegley." Recognizing that threats to national survival or well-being are not
confined to the military realm, these proposals expand the notion of security
threats to include such matters as human rights, the environment, economics,
epidemics, crime, and social injustice.
These proposals are not necessarily tied to post-cold war developments.
Indeed, any serious attempt to explicate the concept of security is likely to
lead to a broader view - which may explain why traditional security spe-
cialists have usually avoided such exercises.j4 Reflections on the post-cold
war world, however; have increased the number of proposals for a broader
conception of security.
For those seeking an enhanced understanding of the multiple vulner-
abilities that beset hunlankind," expanding the focus of security studies is
1 12 Widening Security
clearly a step in the right direction. But from the standpoint of academic
disciplines - admittedly a matter of minor importance to nonacademics -
the advantages are less obvious. For to expand the scope of security studies
is to blur even further the barely distinguishable line between the subfield
of security studies and the main field of international relations and foreign
policy studies. As Klaus Knorr recognized two decades ago, "If we wanted
to study with equal emphasis all phenomena suggested by the term 'national
security,' we would have passed on to the study of foreign policy or inter-
national relations as a whole."j6
Perhaps the time has come to abolish the subfield of security studies and
"pass on" or, more accurately, return to the study of foreign policy and
international relations. In commenting on one of the syllabi in Security
Studies for the 1990s, Oran Young observes that "there is a strong case for
integrating international security studies into the broader curriculum on
international relations"(p. 351).j7
The following are the principal arguments on behalf of such a case.
1. It overlaps too much with the fields of international politics and foreign
policy. Although expanding the focus of security studies makes the problem
more obvious, there has never been a clear line between security studies and
international politics and foreign policy studies. War has always been a cen-
tral concern of international relations scholars; and national security policy,
including war as an instrument of statecraft, has been part of that concern
since 1940. Various scholars have noted the overlap, and none has been able
to draw a clear line between academic security studies and its parent fields of
foreign policy and international politics.5RThe intimate connection between
military force and foreign policy was clearly recognized before the "golden
age" of security studies began:
noted that "everyone agrees that 'security issues' are important and deserving
of national prominence and financial support" (p. I)."'
It is precisely because "everyone agrees" that security issues are import-
ant that they should not be consigned to a separate subfield. Although
some subfields are more important than others, n o other academic disci-
pline contains a subfield designated, in effect, "the study of important
iss~~es."~'
4. Security is too broad. As a theoretical concept, "security" is too broad
to define a subfield. Broad analytical concepts, such as power, interdepend-
ence, welfare, cooperation, conflict, public interest, and securit); are relevant
to all subfields of international relations and should be the special province of
none. Buzan rightly points o ~ ithat
t the concept of security is broad enough to
integrate the fields of international relations theory, international political
economy, area studies, peace studies, human rights, development studies,
international history, and so forth.-l It is precisely for this reason, however,
that it should not be used to delineate a single subfield. Lasswell understood
the broad applicability of the concept, which prompted his observation that
"there are no experts on national security. There are only experts on aspects
of the problem."-.'
The third and fourth arguments outlined above, concerning the misla-
beling of the field and the breadth of the concept of security, are based on
the assumption that both the label and the concept are important to secur-
ity studies scholars. To the extent that such scholars are willing t o give up
both the label and the claim of special expertise with respect to the security
problematique, those arguments would be nullified. Renaming the field as
"military studies," "war studies," or something similar, however, would not
affect the first or second arguments discussed above.
If reintegration of security studies into the broader curriculum of foreign
policy and international politics is desirable, why not apply similar logic to
other subfields, such as international political economy (IPE)?The answer to
this question is instructive. If the rationale for subfields is to ensure that
important subtopics are not neglected, the emergence of IPE as an identifiable
suhfield during the 1970s was justified by - and a reaction to - the wide-
spread neglect of the topic by international relations scholars during the
1950s and 1960s.-"o the extent that the larger field focuses on the politico-
economic aspects of international relations, the rationale for a subfield of IPE
is weakened. In principle, then, one can well imagine a situation in which the
arguments for reintegration of security studies would apply, mutatis mutan-
dis, to IPE. If the dominant paradigm for the study of international relations
were Marxist-Leninist, for example, one might well argue that a subfield of
lIIE was unnecessary on the grounds that it overlapped too much with the
main field of study. Under such circumstances, one might argue that a sub-
field of security studies is needed in order to ensure that politico-n~ilitary
aspects of the subject are not neglected. The case for the traditional subfield
of security studies is strongest when realism is not the dominant paradigm. It
is paradoxical that traditional security studies flourished during the cold war,
1 16 Widening Security
when realism was at its apogee and the rationale for the subfield would seem
to have been weakest.
It is sometimes argued that the existence of security studies as a sub-field
is justified by the continuing importance of war and military strategy in
human affairs. The question here, however, is how, not whether, to study
war and military strategy. The reintegration of such topics into the study of
international politics and foreign policy would not put academic security
specialists out of work. It would, however, set their work in a broader con-
text that would increase its relevance to the post-cold war world.
IV. Conclusion
Acknowledgements
The author would like to thank the following scholars for helpful comments on earlier drafts
of this review article: Richard Betts, Robert 0. Keohane, Edward A. Kolodziej, Robert Jervis,
Edward Mansfield, Helen V. Milner, Jack Snyder, and Oran Young.
I Security Studies I 17
Notes
18. For examples of these recurrent themes, see Brodie (fn. 17); idem, National Security
and Economic Stability, Memorandum no. 33 (New Haven: Yale Institute of International
Studies, January 2, 1950); Arnold Wolfers, "'National Security' as an Ambiguous Symbol,"
Political Science Quarterly 67 (December 1952); Frederick S. Dunn, "The Present Course of
International Relations Research," World Politics 2 (October 1949); and Harold D. Lasswell,
National Security and Individual Freedom (New York: McGraw-Hill, 1950).
19. Two recent reviews of the evolution of security studies ignore or make only passing
reference to the contributions of such major figures as Wright, Wolfers, Fox, the Sprouts, Dunn,
Lasswell, Earle, and Spykman. Stephen M. Walt, "The Renaissance of Security Studies,"
International Studies Quarterly 35 (June 1991); and Helga Haftendorn, "The Security Puzzle:
Theory-Building and Discipline-Building in International Security," International Studies
Quarterly 35 (March 1991).
20. Walt (fn. 19); and Colin Gray, Strategic Studies and Public Policy: The American
Experience (Lexington: University Press of Kentucky, 1982).
21. Walt (fn. 19), 214.
22. See Smoke (fn. 5); Lawrence Freedman, The Evolution of Nuclear Strategy (New York:
St. Martin's Press, 1981); Fred Kaplan, Wizards of Armageddon (New York: Simon and
Schuster, 1983); and Trachtenberg (fn. 12).
23. See, for example, Smoke (fn. 5); and Walt (fn. 19).The most enduring contribution of the
"golden age" was Thomas C. Schelling, The Strategy of Conflict (Cambridge: Harvard University
Press, 1960). Although concerned with nuclear strategy, Schelling stressed the applicability of his
analysis to a broader set of actors and problems, including foreign aid, tariff bargaining, child
rearing, taxi driving, investing in the stock market, tax collecting, house buying and selling, vot-
ing, playing charades, striking, price wars, traffic jams, kidnapping, daylight savings, etiquette,
Lot's wife, and selecting Miss Rheingold.
24. Kolodziej, "What Is Security and Security Studies? Lessons from the Cold War, " Arms
Control13 (April 1992), 2.
25. Walt (fn. 19), 215; Smoke (fn. S), 3 0 3 4 ; Nye and Lynn-Jones (fn. S), 9; and Trachtenberg
(fn. 12), 332.
26. Gray (fn. 20), 90. See also Smoke (fn. S), 304-5.
27. See Jaap Nobel, ed., The Coming of Age of Peace Research: Studies in the Development
of a Discipline(Groningen, The Netherlands: STYX Publications, 1991).
28. Richard Smoke, National Security and the Nuclear Dilemma: An lntroduction to the
American Experience in the Cold War, 3d ed. (New York: McGraw-Hill, 1993), 328.
29. Walt (fn. 19). Walt also portrays the "renaissance" as characterized by a commitment
to more rigorous scholarly standards. Although he notes that much work on security topics
fails to meet basic scholarly standards and "should be viewed as propaganda rather than ser-
ious scholarship," he concentrates his review of the field on works that do "meet the standards
of logic and evidence in the social sciences" (p. 213). He concludes, not surprisingly, that the
field is doing quite well by social science standards. For a cogent critique of Walt's view of
security studies, see Edward A. Kolodziej, "Renaissance in Security Studies? Caveat Lector!"
International Studies Quarterly 36 (December 1992).
30. Haftendorn (fn. 19).
31. On the militarization of American security policy, see the essays by Allison and
Treverton, Peterson, and Treverton and Bicksler, in Allison and Treverton; the essay by May
in Hogan; and Richard H. Ullman, "Redefining Security," International Security 8 (Summer
1983).
32. See Allison and Treverton; and Joseph J. Romm, Defining National Security: The
Nonmilitary Aspects (New York: Council on Foreign Relations Press, 1993).
33. Kenneth Waltz, Theory of International Politics (Reading, Mass.: Addison-Wesley,
1979), 126.
34. Smoke (fn. 5), 248; emphasis in original.
35. This is not to suggest that the authors of these passages actually advocate unlimited
defense spending. The relevant question is whether the logic of such passages provides any justi-
fication for a limit.
3 6 . F.ven concelvlng of security as ,I matter of degree seems t o he difficult for some security
spec~~ilists. See Barry Kuzan, P ~ r ~ p /States
c, and Fear: An A ~ w ~ d fori z Intemntiona/ Serrrrlt]~
Sttrdics I?? the Post-(;old War t.rrz. 2 d ed. (Boulder, Colo.: L.ynne Kienner, 1991). Rumn asserts
t "word itself ~ m p l ~ e;Ins absolute condition ... a n d doe\ not lend itself t o the idea ot a
t h ~ the
graded spectrum like that which f ~ l l sthe space between hot and cold" (p. 18). And K l ~ u Knorrs
notes that h ~ tre,ltment
\ of security threats as matters of degree "causes a lot of c o n c e p t ~ ~ , i l
uneasiness" for other scholars. Knol-I; "Economic Interdependence ,lnd National Secur~ty," in
I(lC~ul\ K n o r r .1nc1 P,-.~nkN. 'T'r.lp,cr, c d ~ . ,I ' c - o r z < , n z r c I s s r r c s i z ~ z dN ' r t r < m a l Security ( I .xwrcncc:
Regents Press of Kansas, 1977), 1811.
17. E.g., D u n n (fn. 18); Wolfers (hi. 18); 1,asswell (fn. 18); and Brodie (fnn. 17, 18).
Ijefrnse economl$r\, of course, have usually shared this view. 7 h 1 r voices, however, were more
t securlty studies during the "golden age" t h a n during the 1980s. See Charles J. H ~ t c h ,
s a l ~ e n in
" N a r ~ o n a lSecur~r)P o l ~ c yas a Field tor Econonlics R e ~ e ~ ~ r c h\VorId, " I'olrtrcs 1 2 (April 1960);
Charles J. Hitch a n d Roland McKean, The Econonri~-sof Drfcnsr in the N~rrlear Agc~
(C:amhridge: Harv.11-d University Press, 1960); and James R. Schles~nger,The Politicul Ecol~oilry
of Nrrtional Seurity ( N e w York: Frederick A. Praeger, 1960). Walt's (fn. 1 9 ) recent revietv, for
example, pays scant atrentlon t o the views of defense economtsts.
38. Walt (fn. 191, 1 1 2 ; rmph,isis in original. Walt's definition of the field is puzzling, since
he had c r i t ~ c i ~ ethe d tendency t o define security wlely In m ~ l i t ~ l rterms
y in a n e r ~ r l ~ puhlica-
er
tion. Stephen hl. W ~ l t ,"The Search for a Science of Strategy," Intert~ntionalSecurity I 2
(Summer 1987), 159-64.
39. For other reviews of the field that e m p h a s i ~ em i l m r y force as a means rather than secur-
ity as an end, see KLius Knorr, "National Security Studies: Scope and Structure of the Field," in
Frank N. Trager and Philip S. Kronenherg, eds., Nntlonirl Seczwity anti Atnerzcan Society: T!~rory
Process, m d Policy ( L ~ w r e n c eIlnivers~ty
: Press of Kan\as, 197.3); .lnd Nye and Lynn-Jones (fn. 5 ) .
40. See Kernal-d Brodie, W l r irrtti Polltics ( N e w York: Macrii~llan,1 9 7 3 ) , chap. 8.
41. Snioke ifn. 2 8 ) . 3 3 0 . See also Snioke (fn. i ) , 2.59.
42. See the interpretive css,lys hy Bernard B r o d ~ e ,Petel- I ' , I I - ~ ~ ,a n d Michael H o w a r d , 111
Carl von C l a u s c w ~ t / ,O n Wnr (Princeton: Princeton Universit) Press, 1 9 7 6 ) .
43. Wolters (tn. 18). 484. 502.
44. I.asswell (fn. 1 X), 75.Recent interest In "grand strategy" a m o n g security s p e c ~ a l ~ shrls rs
expanded the term t o ~ n c l u d ed~plornacyas well as milit,iry means, hut economic statecraft and
information remalt1 neglected. On this point, see W ~ l (fn. t 19); 'ind Kolodziej (fn. 29). 4 3 4 .
4.5, Nye a n d 1.ynt1-Jones (in. S),24; .ind Walt (fn. 191, 21.5, 224.
4 6 . I 1 ~ 1 n n( i n . 1 X), 83.
47. Krodie (fn. 18).
4 8 . Lasswell (fn. 18), 55, 75.
4 9 . See the essays hy Allison a n d Treverton, Peterson, May, Michael Rorrus a n d J o h n
Zysman, a n d Schell~ng,in Allison a n d Treverton; see Shulrz, Godson, a n d Greenwood; and see
the e s u y by J e r v ~ s ,In Hogan.
50. See Gaddis; a n d the esa,Iys by G a d d ~ as n d Ronald Steel, In Hogan. See also J o h n Lewis
G a d d ~ s "Internat~on,d
, Relations Theory 'ind the End of the Cold War," Internationc~lScotrlty
1 7 (Winter 1992-93); a n d K o l o d ~ ~ (fn. e l 29).
5 1 . Hafrcndorn (fn. 191, 15.
51. Walt (fn. 191, 225-27.
53. Ullnian (fn. 3 1 ) ; Buzan (in. 36); Haftendorn (fn. 19); Kolodz~el(in. 29); and Kegley,
"Discusswn," in Shultr., Godson, a n d Greenwood, 73-76.
54. O n this polnt, see B u ~ , l n(fn. 361, .3-12. Recent r e v i e w ot the field by Nye and 1.ynn-
Jones (fn. 5 ) a n d Walt (fn. 191, for cxarnple, d o n o t attempt t o d c f ~ n ethe concept of securit).
Although many ot the contributors t o Scc-wity Studies rtr t / ~ cI ')9Os allude t o the debate a h o ~ ~ t
alternative c o n c e p t ~ ~ ~ l l i z a t i oof~ lthe
s field, none of the ele\.en course syllabi includes the
f a n i o ~ ~article
s by Wolters (fn. I X ) o n the concept of n.~tion.ll securlty.
55. I-larold Sprout and Margaret Sprout, Mrrltiple Vrrlnefiil~ilit~c~s: The Cortt~xtof 1:il~~ir-
orrnrcwtd Reparr atid Kcsorrrrc3, Research Monograph no. 4 0 (Pr~nceton:Center of Intern,~r~onal
S t u d ~ e s Pr~nceron
, LJniversity, 1974).
120 Widening Security
S
ince the publication in 1983 of the first edition of People, States and
Fear, Barry Buzan's work has established itself - for European scholars,
at least - as the canon and indispensable reference point for students of
security. His book and the revisions of the second edition (1991) have been the
stimulus for further exploration of the security problenl at the Centre for Peace
and Conflict Kesearch in (;openhagen. Together with Kuzan, the collaborators
have produced several publications on the security theme, sufficiently inter-
related to warrant the collective shorthand, the 'Copenhagen school' of secur-
ity studies.
The revision of security studies, which Buzan announced in 1983, has
taken a new turn with a recent publication by the Copenhagen school. The
need to refine the concept of security and to focus greater attention on 'social
identity' appears to have emerged more from the pressure of events suggest-
ing a move in this direction than from particular doubts previously ex-
pressed at the theoretical level. With Buzan as a principal contributor, the
new thinking is set out in the recent publication of Waever et a/.' Since
Buzan has shared authorship of a new direction of his initial project, it
merits scrupulous attention by all who have spent the last decade reading
and teaching l'rople, States and Fear and, in Ken Booth's words, 'writing
footnotes to it'.?
Source: Kerww of Strriitcs, 221 1 ) ( 1996): X 1-93
Itzte?nntro~~~rl
122 Widening Security
At first glance, the new emphasis on society and identity answers the
main body of criticism levelled at Buzan's inability, arising from his con-
ceptual model giving ontological primacy to the state, to accord significance
or autonomy to human beings as an object of security and to the sub-state
groups to which they belong3 His collaboration in the abandonment of state
primacy shifts the weight of his contribution to security studies - and his
reputation - to this later joint publication.
Another factor that will contribute to its appeal and influence is its focus
on societal identity as the core value vulnerable to threats and in need of
security. Identity had been a fashionable preoccupation of social scientists for
many decades prior to its emergence in the media as the major cause of upheaval
in central and eastern Europe and the source of resistance to integration in the
European Union. Waever et al. have thus given an old idea a new angle in dis-
course on international affairs. Identity is a good thing, with a human face
and ephemeral character which make it at once appealing and difficult to
grasp. From the pens of scholars who aim to situate their work in the neore-
alist tradition, it betokens a break with the image of that hard-bitten class
which formerly consigned identity to the category of soft concepts suitable
for novelists and sociologists.
The analysis of collective identity can be approached from a deconstruc-
tionist, sociological angle, which focuses on the processes and practices by
which people and groups construct their self-image. O r it can be approached
from the more common objectivist viewpoint, similar to that adopted in respect
of the state in Buzan (1991). Waever et al. appear unsure and to want to
have a foot in each camp. The discussion setting out their basic approach
is obscured by uneven and sometimes slippery language, suggesting some
doubts as to the force of their argument and the degree of continuity of
approach with Buzan (1991). There are passages that suggest the decon-
structionist agenda, but these are radically at odds with the bulk of the work
which remains firmly objectivist, indeed realist.
In this paper, I examine critically the authors' central concepts of society
and societal security, and offer an alternative understanding of identity which
has implications for security. Finally, an assessment will be made of the con-
tinuity of Waever et al. with the seminal work of Buzan.
The societal dimension which was subordinated to the state in People, States
and Fear, is retained by Waever et al. as a sector of the state, but also given a
new status as an object of security in its own right. There is now 'a duality of
state security and societal security, the former having sovereignty as its ultim-
ate criterion, and the latter being held together by concerns about identity'.4
This elevation of society to the level of an independent object of security
is the major shift in thinking which provides the core of the argument. It is
the security of society, as distinct from that of the state, and in interaction
' i i t Buzan in Copenhagen 123
with it, which focuses attention throughout. What is meant by 'society' and
'societal security'?
It is clear that the term 'society' is not meant to connote a process of
negotiation, affirmation and reproduction, or even to embrace the 'system of
interrelationships which connects together the individuals who share a com-
mon culture', in a more traditional sociological formula.' Such a definition
leaves as a n open question the extent to which individuals in fact share a
common culture. Waever et al. prefer a less fluid reality: 'a clustering of insti-
tutions combined with a feeling of common id en tit^'.^ It is an objectivist,
Durkheimian conception, as they acknowledge. In fact, throughout the book,
their concept of society loses all touch with fluidity and process, resulting in
a near-positivist conception of identity.
The key to society is that set of ideas and practices that identify individ-
uals as members of a social group. Society is ahozit identity, about the
self conception of communities and of individuals identifying then~selves
as members of a community.-
If it is societies that are the central focus of this new security problem-
atique, then it is the issues of identity and migration that drive the under-
lying perceptions of threats and vulnerabilities. Societies are fundamentally
about identity8
The point is laboured: 'societal security concerns the ability of a society to per-
sist in its essential character under changing conditions ...'' Both 'society' and
'identity' are here projected as objective realities, out there to be discovered
and analyzed. If, then, 'the purpose of this book is to examine the agenda o f
societal insecurity', we can take it that other components of society, and other
values which that collectivity of individuals and social groups hold in esteem,
are of little significance to the task in hand.
The authors are clear that the intention is not to humanize the concept
of security in line with 'those theorists whose search for an alternative to
state security leads them to individual security . . . ' l o The reason that indi-
viduals and social groups are not the object of the study is similar to that
given in Buzan (1991): it we are to avoid methodological individualism, we
must treat society as a 'reality of its own', in Durkheimian fashion, 'not to
be reduced to the individual level'."
Who speaks for the state? The question which poses itself in relation to
the state-centric approach of People, States and Fcar arises with renewed
force in the new formulation of the problem: Who speaks for society? 'Whose
security?' now leads back to a prior question: 'Whose identity is to be
secured?' To their credit, the authors raise the same question themselves in
124 Widening Security
It depends on what they mean by 'seriously'. There are three different stages
in interpreting identity claims and taking them 'seriously' with respect to
security. The first two are the familiar, strictly empirical, problems relating
to the extent and intensity of beliefs. The third is more a philosophical prob-
lem, which will be addressed below. It suffices for the moment to note that the
authors never move beyond the first stage and seldom address even that as a
serious problem. Their work begins and remains at a level of reification which
excludes discussion of these questions of process. Even allowing that they
work on a very wide canvas where detail is inevitably sacrificed to the overall
picture, the general lack of concern with these fundamental methodological
questions is disturbing. It shows in the ambiguity of their thesis.
In a puzzling retrospective comment, the authors reject the charge of
reification on the grounds that their main interest is not in what increases or
decreases security, but in the process of defining security threats.I3 But this
and similar reflections are far from clear, are contradicted by several others,
and are impossible to match with the treatment of 'society' and 'identity' in
the book they have actually written. They would appear to undermine the
authors' entire work. If they were truly concerned with the process of social
construction, they could not regard society as 'a social agent which has an
independent reality'14 (as they do) and they would have to conduct the analy-
sis at the sub-social level (which they emphatically reject). Despite the dis-
claimers, they do in fact view society as an 'independent variable',15 a social
fact immune to process inquiry, whose values and vulnerabilities are as objec-
tive as those of the state.
Their response to their own question as to when security claims (and this
implies identity claims) should be taken seriously is, unhelpfully, 'In hind-
sight'. Only hindsight will reveal 'how much legitimacy an actor does have
when trying to speak on behalf of society ... [Actors] become consequential
on a political scale only when society actively backs them up . . . ' I 6 Whether
in hindsight or in foresight, the problem remains the rudimentary one of our
conception of society as process or as object. How do we know when society
'actively backs them up'? We cannot unravel the concept of society in action
by appealing to the same problematic concept in hindsight.
We must ask why the authors choose identity from among the countless
values which people are concerned about and which can be attributed to the
collectivity of society, thus coming under the umbrella of 'societal security'.
Llchiii c.iiia\ Buzan in Copenhagen 125
The human and moral connotations of identity give it a popular appeal. Its
apparent subjectivity makes everyone an expert. Its fundamental character
as an inalienable human property blocks all criticism and makes its secure
possession a matter of elementary justice. We are who we think we are; no
one else can judge us.
Though Waever et al. would reject this popular notion as the basis for their
understanding of collective identity, their thesis, paradoxically, commits them
, -i i Buzan in Copenhagen 127
to the same relativism. In effect they have an objectivist theory with relativist
consequences. In their view, identity is a property of society, not to be confused
with human beings. It 'emerges' (a frequently used term) from the peculiar
interactions of people and institutions in each society, fixed and incorrigible
like the computer output of a complex arithmetic. Identity describes the soci-
ety, and society is constituted by identity. Since its computation or construc-
tion does not crucially depcnd o n human decisions, i t rnakcs n o sense to speak
of correcting it. Societal identity just is. We are stuck with it. There is no way
we can replace it, except by adopting multiple identities, each of which is, in
principle, as inviolable as the next." It follows that we are stuck with every
other comn~unity'saccount of its identity also, and have no intellectual means
of passing judgment on these accounts. We may not like who they are, but if
they think that way, so be it.
This aspect of the identity thesis is disturbing because of its implications for
security policy in general and for particular security issues in Europe. It lies at
the other extreme to racism. The one view claims to judge races and to allo-
cate each a position in an ontological hierarchy. The other refuses all judgment
and allocates to each society an objective identity proper to it. Fortunately,
there is more to be said about it than just to disapprove.
function of the state. In the new focus on societal identity, there is no referee
and there are no criteria for legitimizing decisions about identity. In effect,
the construction of identity and the resolution of identity disputes are left to
emerge, incorrigible and beyond assessment, from the mysterious workings
of society. The element of normative judgment in the negotiations which
constitute the permanent process of identity formation is lost.
Collective identity is not 'out there', waiting to be discovered. What is 'out
there' is identity discourse on the part of political leaders, intellectuals and
countless others, who engage in the process of constructing, negotiating and
affirming a response to the demand - at times urgent, mostly absent - for a
collective image. Even in times of crisis, this is never more than a provisional
and fluid image of ourselves as we want to be, limited by the facts of history.
The relevance of this argument to the concept of societal security should be
clear.
Conclusion
Three general points which summarize the main threads of the foregoing dis-
cussion will be made, in addition to a brief comment on the implications of
the identity thesis for Buzan's analysis of security in People, States and Fear.
The validity of the identity thesis hinges on the objectivism of the authors'
concepts of 'society' and 'identity'. Society is conceived as a social fact, with
the same objectivity and ontological status as the state. Notwithstanding sev-
eral passing comments to the contrary, the authors' definition and analysis of
society is essentially Durkheimian. This perspective determines the method-
ology and skews the inquiry and level of analysis away from that required for
a process which is constituted by social practices. Such a focus would view
'society' and 'state' as an 'objectification' of social interaction, in Berger and
Luckmann's sense of the term;33 they are a particular class of dependent, not
independent, variable.
Secondly, the misunderstanding of 'identity' follows from the definition of
society. Who we are is not a matter of fact imposed on individuals who
'belong' to the 'society' of Waever et al. Their idea of collective identity as a
social fact projects the image of a collective self to be discovered: we are who
we are. The evidence and philosophical argument point more convincingly to
process and negotiation: we are who we want to be, subject to the constraints
of history. Such constraints set limits to the boundaries of possibility; the case
for an ecumenical harmony of identity between Danes and Swedes is clearly
more plausible than that between Danes and Zulus. Within such constraints,
disagreements about identity can and do flourish and, where they give rise to
conflict and have security implications, can be settled, but only by moral deci-
sion informed by factual observation, not by observation alone.
A third and related point is that this decision in regard to identity and its
security is a normative one. We cannot assume, by definition, that 'society'
i I i Buzan in Copenhagen 131
seen as an instrument and property of the state, if his general model of inter-
national security within anarchy - which entailed state primacy - was to be
preserved. Human beings were ultimately the reason for all security, but they
had no place in the analysis which explained its dynamics; their agency was
blocked by the theoretical decision to explain security only at the levels of the
state and the international system. Now Waever et al., and Buzan as joint
author, emphatically reject the primacy of the state and appear to have gone
much further in the domestic direction. After all, what could be more human
and domestic than to counterpose society and its identity to the state as an
object of security in its own right? However, it is clear that 'societal identity'
is not the identity of a collectivity of human beings. 'Societal security is not
used in this book as a "more human" concept of security ...'36 Society is a
technical term, defined not as a human process but as a reality transcending
the individuals who belong to it. Where does the new focus on societal secur-
ity leave Buzan's concept of the 'strong state'?
As Steve Smith suggests, one can discern a prescriptive dimension in Buzan's
understanding of strong states in a mature a n a r ~ h y . ~One' could argue - that
the substantive policy implications of his book are not those under the head-
ing 'Implications for P o l i ~ y ' but
, ~ ~are contained in the prescriptive treatment
of his concepts of strong state and security complex. A mature anarchy is,
after all, a position on his continuum of regional security configurations,
related to the idea of a 'security community'. If the move from security com-
plex to security community is desirable, as it clearly is, so too is the move
from weak to strong states in the international arena. Becoming a strong state
is a condition of participating in a security community.
In Buzan (1991),the primacy of the state is the pivot on which the domes-
tic dimension of the strong state and the international dimension of regional
security turn. The seminal character of People, States and Fear lay in the break
with the realism of traditional security studies marked by these two ideas. The
movement on a spectrum of weak to strong states directed attention to the
domestic level, and the corresponding movement from immature to mature
anarchy (or, in regional terms, from security complex to security community)
introduced the possibility and need for change at the international level.
Together, they represented a more complex and adequate picture of reality and
of the possibilities of change than the realists could envisage.
Theoretically, this advance depended on maintaining the realist doctrine
on state primacy. The agency of change in the domestic as in the international
sphere could not be attributed to sub-state or supra-state actors. If sub-state
actors were credited with the capacity to shift the state, then something close
to anarchy would rule at the domestic level. By definition, there could be no
stability in the socio-political cohesion which Buzan understood as a state-
managed domestic order and which was a defining characteristic of his
'strong state'. On the other hand, if the international system were allowed to
determine shifts in the security position of the state, Buzan would have to
reformulate his entire theoretical framework. His version of realism sees
anarchy as a constant, with modifications in regional configurations brought
Zli\~vecnc \ Buzan in C o p e n h a g e n 133
about by the actions of states. It is on the security of the state that the secur-
ity of people and of the international system depends. While an overall envir-
onment of anarchy determines the range of state actions, any change in the
character of the state from weak to strong can only be brought about by the
state itself.
The problem, then, is to understand how the identity thesis is compatible
with Buzan's security thcory. The concept of a strong state rested on the sub-
ordination of society to the state. Now, in Waever et al. the state is no longer
the uniquely privileged actor. Domestic resistance to the state cannot be viewed
as some kind of pathology. The vulnerability of identity to external threats is
now viewed as the vulnerability no longer of the state, but of an autonomous
actor and potential rival within its houndaries: society. The management o f
societal identity, which Buzan saw as the business of the state in building the
social cohesion essential to becoming strong and fit for membership of a secur-
ity community within a mature anarchy - this task is now in the hands of soci-
ety itself. A strong sense of societal identity could very likely, and not just
pathologically, coincide with resistance to the state. How changes in identity
are effected, or disputes about identity arc resolved, is not addressed by
Waever et al. Who would judge? Buzan's implicit answer was 'the state', and
this allowed for the possibility of change from weak to strong state which was
critical to his thesis. If society is now an independent variable, no longer sub-
ordinate to the state, then it appears that the Copenhagen school has under-
mined Buzan's original thesis. Ruzan himself has collaborated in an analysis of
security which purports to develop his analysis of 1983-91 but, in fact, sub-
verts it, without enhancing our understanding of the problems of security.
Acknowledgements
T h e author wishes t o thank I'aul 'Iiiylor a n d anonymous refel-ees tor comnients o n a n earlier
draft, w h ~ c halso benefited from exposure t o students of the hll'liil ( T C D ) programme in the
Centre for I'race S t u d ~ r s .
Notes
D
ebates over the nature and meaning of "security" and the future
of security studies have become a staple of the field's post-Cold
War agenda (Buzan, 199 1 : 14; Crawford, 1991; Haftendorn, 1991:
15; Kolodziej, 1992a, 1992b; Baldwin, 1995). These debates have three roots:
a discontent among some scholars with the neorealist foundations that have
characterized the field, a need to respond to the challenges posed by the
emergence of a post-Cold War security order, and a continuing desire t o
make the discipline relevant to contemporary concerns. But despite much
discussion, scholars have not arrived at a consensus o n what a more broadly
constructed conception of security should look like.
The diverse contributions to the debates on "new thinking on security"
can be classified along several axes. One - associated inter alia with such
authors as Richard Ullman (19831, Jessica T ~ ~ c h m aMathews n ( 1989),
Theodore Moran (199019 I ) , Brad Roberts ( 1 990), Myron Weiner (1992/93),
and Beverly Crawford ( 1 994) - attempts to hroilcicn the neorealist concep-
tion of security to include a wider range of potential threats, ranging from
economic and environn~entalissues to human rights and migration. This chal-
lenge has been accompanied by discussions intended to deepen the agenda of
security studies by moving either down to the level of individual or human
security or up to the level o f international or global security, with regional
and societal security as possible intermediate points (Rubenstein, 1988; Buzan,
1991; Grant, 1992; Tickner, 1992; Waever et ul., 1993). Others have remained
within a state-centric approach but have deployed diverse terms (common,
cooperative, collective, comprehensive) as modifiers to "security" to advocate
different multilateral forms of interstate security cooperation that could ameli-
orate, if not transcend, the security dilemma (Palme Commission, 1982;
Kupchan and Kupchan, 199 1; Carter, Perry, and Steinbruner, 1992; Dewitt,
1994).' This essay review concentrates on the efforts to broaden and deepen
our conceptions of security.
Source: Mcrd~orzIiztrr~tat~or~iz/
Stzlcfics Rel~icu:40(2) ( 1996): 229-54
136 Widening Security
What unites these efforts is a conviction that the neorealist focus on safe-
guarding the "core values" of a state from military threats emanating from
outside its borders is no longer adequate (if it ever was) as a means of under-
standing what (or who) is to be secured, from what threats, and by what
means. The theoretical targets being debated are the conceptualizations of
security (state security) and threat (military force) and the assumption of
anarchy (the security dilemma) that have characterized neorealist scholarship
in security studies (Walt, 1991: 212; Posen, 1993a: 82; Schultz, Godson, and
Greenwood, 1993: 2; Mearsheimer, 1995).3 By the neorealist account, as
Stephen Walt (1991: 212) defines it, security studies is "the study of the
threat, use, and control o f military force ... [that is] the conditions that make
the use of force more likely, the ways that the use of force affects individuals,
states and societies, and the specific policies that states adopt in order to pre-
pare for, prevent, or engage in war" (emphasis in the original).
Not surprisingly, attempts to broaden and deepen the neorealist agenda of
security studies have been met by a spirited defense. Calls to expand the field,
although they may appear compelling and even seek laudable ends, are viewed
from the neorealist perspective as taking security studies away from its trad-
itional focus and methods and making the field intellectually incoherent and
practically irrelevant (Dorff, 1994; Mearsheimer, 1994195; Gray, 1995). Even
though it is considered responsible scholarship to permit additions and amend-
ments to the core of security studies, to throw away its foundation is deemed
intellectually unsupportable. According to neorealists (Mearsheimer 1995: 92),
alternative approaches have provided neither a clear explanatory framework
for analyzing security nor demonstrated their value in concrete research.
Moreover, some neorealists (Walt, 1991: 213) have argued that the adoption
of alternative conceptions is not only analytically mistaken but politically irre-
sponsible.
Rather than presenting another polemical overview of the contrasting
positions in these debates (see Mearsheimer, 1994195, 1995; Keohane and
Martin, 1995; Kupchan and Kupchan, 1995; Wendt, 1995), this essay review
takes seriously Walt's (198710: 146) claim that "critical evaluation is ... the
key to scientific progress." The review proceeds in three stages. It starts by
evaluating, on their own terms, neorealist claims regarding the scope and
nature of contemporary security problems. This initial section discusses the
way in which the usually implicit foundational claims or assumptions of
neorealism underlie its vision of security and security studies. It suggests how
these claims shape neorealism's stance toward debates over whether (and
how) the concept of security should be "broadened" to incorporate nonstate
and nonmilitary dimensions, concluding that these commitments have tended
to close debate prematurely and thus constrain our understanding of current
issues and dilemmas. The section takes the debates surrounding "environ-
mental security" as an exemplar to highlight the exclusionary and inclusionary
strategies at work (Lapid and Kratochwil, 1996: 109).
The second section examines whether neorealist security studies lives up
to the promises of its foundational claims, and how controversies within
h t I I I . Broadening the Agenda of Security Studies 137
history of strategic thought. The search for the "laws of war" goes back at
least to the Enlightenment (Gat, 1989: 29, 25-53, 1992: 1-45) and, as John
Shy (1986: 184-185) argues, this vision of truth and method "has become,
during almost two centuries, so deeply embedded in Western consciousness
that many adherents refuse to accept it as a 'mode' of thinking at all." Viewed
historically "contemporary strategists echo Jomini (in his defense against
Clausewitz) by insisting that [their] critics fail to meet the urgent demand of
strategy for clarity, rigor, and utility" (Shy, 1986: 84).
The claim to scientific knowledge underlying neorealist security studies
is supported by a series of foundational claims that are presented as "facts"
about the world. The most important of these claims concerns the central-
ity of the state as the subject of security. Paradoxically, this vision emerges
neither from a theory of the state nor of the international "structure" but
from an implicit theory of the "subject" seen in terms of an individual per-
son. The subject is presented as an autonomous, rational actor confronted
by an environment filled with similar actors. These others are a source of
insecurity - hence, the classic security dilemma and the popularity of "state
of nature" analogies supposedly drawn from Hobbes or Rousseau (Waltz,
1959; Williams, 1989, 1996). Whether this situation arises from the nature
of the actors or from the context in which they find themselves (the trad-
itional debate between first-, second-, and third-image explanations) is less
important here than the recognition of the common foundation from which
both possibilities spring: an assumption of methodological individualism in
which all social action (cooperation and conflict) is strictly the product of
the interaction of wholly self-contained, instrumentally rational subjects
(Ordeshook, 1986: 1; Waltz, 1986b: 90-91, 115; Luke, 1987; Grieco, 1988:
487-488; Wendt, 1992: 392).
From this starting point, there can be no security in the absence of author-
ity. The state, accordingly, becomes the primary locus of security, authority,
and obligation. Contractual obligations between citizens represent the limit
(underwritten by the authority of the state) of effective coordination for col-
lective action (or of "community"). The security of "citizens" is identified
with (and guaranteed by) that of the state; and, by definition, those who
stand outside it represent potential or actual threats. Relations between states
are thereby rendered purely "strategic" (or contractual) in the instrumental
sense of the word. This foundation provides the basis for claims about inter-
national anarchy. A particular state, as a "rational subject," looks to its own
interests and security (and those of its constituents) first and foremost.
Despite the fact that in the long term its interests might be better served
through cooperation, a state cannot rationally assume that other states will
act in a cooperative fashion. Therefore, it acts solely in its own interest, and
all others do the same. The problem is not the lack of central agency to enforce
promises but the absence of a central authority to prevent the use of violence
to destroy or enslave (Grieco, 1988: 497-498; Milner, 1993; Mearsheimer,
1994195: 9-13).
I 11 ii 1 1 Broadening the Agenda of Security Studies 139
The declaration that the state is the subject of security and anarchy the
eternal condition of international relations is, thus, premised not on object-
ive facts or structural determinants but is grounded in a deeper set of
claims about the nature of political subjects and their relationship to sover-
eignty. The "fact" of anarchy is based on an a priori claim about autonomous
individual human subjects and the kind of contractarian political order that
these subjects necessarily require. At the international level tl,e essence of
this conceptualization is not simply a world of self-regarding states oper-
ating under the "security dilemma," but the assumption that there is a par-
ticular form of individual rationality in state action as both the source and
outcome of that anarchy. The above are, however, more than simplifying
theoretical assun~ptionsadopted for analytical convenience as some have
argued (Achen and Snidal, 1989: 150; Powell, 1993: 117). They are inextric-
ably tied to a particular set of episten~ologicalclaims and related methods
(Walker forthcoming).
The neorealist conception of security studies claims to be founded on an
objective representation of reality. This claim to know objectively means
that the discipline must treat the phenomena under consideration as given,
unproblematic o&cts. This instrumental-rational conception of human and
state action has consistently created difficulties in security studies (Steinbruner,
1974; Jervis et al., 1985; Levy, 1989: 272-289; Sagan, 1994) and in inter-
national relations more generally (Hollis and Smith, 1991). In neorealism, the
concept of rational self-interest provides the bridge that allows one to treat
state actions as the externally observable "objective phenomena" that are
required by a rationalist epistemology. The reduction of states to instrumen-
tally rational actors, embedded in a contractual theory of sovereignty and tied
up within a specific claim about scientific knowledge and its progress, is a
powerful theoretical move. Grounded in a series of assumptions deeply
ingrained in the culture from which it emerges, neorealist security studies can
confidently declare what is and is not a "security" issue, or what threats are,
and to whom they refer. The reader should note, however, that these claims
to objectivity and science rely on a prior definition of the political object and
the conditions of its (in)security. These foundations are at the heart of the
neorealist appraisal and rejection of attempts to bring "new issues" onto the
security agenda. The debates surrounding efforts to link "environment" and
"security" provide an excellent illustration of this process.
Perhaps the most w~despreadcall to redefme security has emerged from the
claim that env~ronmentaldegradation poses a threat to the ecosystem or to
human well-being that transcends part~cularstates and conceptions of natlonal
security. The severe consequences of continued env~ronmentaldegradat~on
are mewed as more urgent than external threats that could lead to organ~zed
140 Widening Security
violence. Moreover, national interest and sovereignty are considered less im-
portant than the well-being of the individual or the species. Such a recognition
has led to a demand for "a redefinition of what constitutes national security"
because "the assumptions and institutions that have governed international
relations in the postwar era are a poor fit with these new realities" (Tuchman
Mathews, 1989: 162). Scholars making these arguments accept the neorealist
claim that "security" is reducible to an objective referent and set of threats.
They seek to reorient security studies (and policies), however, by calling on the
authority of the natural sciences to demonstrate that environmental change "in
fact" represents a threat to human well-being, and by asserting that what is
really threatened is not an abstraction like "the state" but the material well-
being of individuals (Myers, 1993: 31; see also Dabelko and Dabelko, 1995).
According to these researchers, the constraints imposed by traditional cate-
gories of thought have limited our grasp of this reality; our conceptions of
security and our policies and institutions for providing security need to change
to meet the new challenges (Ullman, 1983; Mische, 1989).
But these calls to redefine security meet resistance because they do not
conform to the a priori political and methodological foundations underlying
the neorealist view of security. Those interested in broadening the agenda of
security studies fail to see that the field is not premised on the straightforward
observation of objective phenomena that threaten human life, and that rejec-
tion of the individual as the locus of security is not an oversight. The concept
of national security does not simply represent a reaction to objective condi-
tions; it is built on a series of political and epistemological choices that define
what is considered security. To appeal to the reality of environmental threats,
or to the security of individuals, runs up against the sovereignist resolutions
that form the basis of neorealist thinking.
Illustrations of this resistance are found in Marc Levy's and Robert
Dorff's exclusionary responses to the environment and security literature.
Levy (1995a, 199Sb) concedes the existence of potential environmental haz-
ards to human well-being, but he argues that their place as security issues
cannot be sustained. The attempt to make the environment a security issue
is marked more by a desire to heighten the political profile of environmental
concerns by placing them within the rhetoric of security than by any sus-
tainable status as security issues. Likewise, Dorff (1994: 27) asserts that
although a broader definition of security highlights significant contemporary
problems, these do not constitute security issues because "'problems' is not
a concept ... [it] provides us with no ordering of reality that we can use to
create a common understanding of what it is that we are talking about ...
[nor a] range of possible policy approaches to address those problems."
These arguments rely on two analytic moves that have significant con-
sequences. First, by describing the broadening of the concept of security as
a political rather than an analytical act, neorealists implicitly position their
view as an apolitical stance that is not equally driven by (or established
upon) a set of value commitments. Second, by thus positioning themselves,
neorealists implicitly establish their view as the yardstick against which
1 I i I 7, Broadening the Agenda of Security Studies 14 1
have suggested that sophisticated analysts have been aware of these issues all
along, the innovations support Baldwin's (1995: 119, 125; see also Chipman,
1992) argument for a broader agenda on the grounds that the "the study of
national security grew more narrow and rigid during the Cold War than it
had been before," and that Cold War security studies "militarized the study
of security" in ways that occluded a rich tradition of thought on "the nature,
causes, effects and prevention of war." Yet, the results of this research have
been varied and inconclusive. In Rwanda, great scarcities did not seem sig-
nificant in the outbreak of conflict; in Chiapas, land maldistribution and
weakly enforced property rights were more important than environmental
scarcity per se. In other cases, the primary conflict was not between states but
within them. Even where environmental factors appeared causal (as in broader
patterns of migration and the emergence of conflicts), such factors seemed
linked to larger questions of political identity and regime legitimacy that chal-
lenge the state as the orthodox object of security (Homer-Dixon, 1994; Ayoob,
1995). Claims closest to neorealist concerns - that scarcity dynamics can lead
to the rise of "hard-core" authoritarian states more likely to attack their
neighbors - have become embroiled in theoretical disputes regarding causal-
ity and method (Homer-Dixon, 1994: 36-37). Although such research shows
that international and environmental factors can play a role in violent con-
flict, the links between environmental scarcity and interstate violence are far
from clear. Moreover, the question of the correct "object" of study (states or
peoples) remains contested even within this narrower agenda.
The debate over "environment and security" illustrates how the neoreal-
ist conception of security studies rests on a claim regarding the appropriate
referent object of security that both insulates it from seriously engaging
alternative formulations and forces the latter to be judged on neorealism's
terms. Unfortunately, alternative formulations are seldom explicit about the
need to come to terms with the important political assumptions that are at
the heart of neorealism. As a result, the debate remains pitched at a frus-
tratingly superficial level.
Recent work on alliance formation represents a fruitful starting point for ana-
lyzing the "scientific objectivity" of security studies, particularly because the
scholars engaged in this work are explicitly committed to the developnlent of
parsimonious sets of deductive hypotheses that will provide "cumulative
knowledge," lead to "clear and more powerful theories, along with careful
attempts to test their validity" (Walt, 1992: 448-473), and permit "determin-
ate predictions at the foreign policy level" (Christensen and Snyder, 1990: 138).
Yet, these goals have proven controversial, even among scholars sharing simi-
lar perspectives.
Debate essentially revolves around whether or not a strict focus on the dis-
tribution of capabilities can capture the behavior of policymakers (Walt, 1985,
19873, 1992), whether bandwagoning or balancing behavior is more promin-
ent among states (and when) (Kaufnian, 1992; Labs, 1992; Schweller, 1994),
and whether or not the research on alliance formation ignores internal dimen-
sions of threat that apply especially to Third World states (David, 1991). A pre-
cise stipulation of the content of these debates is not crucial here; what is
important is bow well the empirical research meets the neorealist postulated
canons of science.
For example, how successful are scholars at classifying state actions as
either bandwagoning or balancing behavior in response to particular threats?
Walt (1992: 452) criticizes Kaufman (1992) for assuming "that the Nazi
threat was unambiguous and unmistakable as soon as Hitler came to power
in 1933," arguing that "the threat from Nazi Germany was anything but
obvious." A more conipiex answer to this question is presented by Schweller
(1994: 79), who proposes that Walt's definition of "bandwagoning" ("a
form of capitulation") is too narrow and status-quo oriented. This definition
led Walt to ignore alliance choices based on opportunities for gain and to
understate the occurrence of bandwagoning behavior. To support this claim,
Schweller constructs a classification of state behaviors that includes lions,
lambs, jackals, and wolves to describe differences in the willingness of states
to bear costs 3s they protect or extend their "possessions."4 He uses these
144 Widening Security
whereas in the case of the natural scientist we have to deal with only one
set of rules, namely those governing the scientist's investigation itself,
here what the sociologist is studying ... is a human activity and is there-
fore carried on according to rules. And it is these rules, rather than those
which govern the sociologist's investigation, which specify what is to
count as "doing the same kind of thing." (emphasis in the original)
Studies of the ways in which policies are constructed, explained, and justified
are thus needed to validate the interpretations that scholars in neorealist secur-
ity studies advance (Milliken, 1995a). This use of interpretation to validate
theoretical propositions raises questions about the quest for transhistorical,
acontextual, generalizable theory.
The second issue - how we study beliefs, intentions, and perceptions -can be
illuminated by examining research on offense-defense theory, which claims
general applicability to situations ranging from ethnic conflicts in the former
, I , \\ I I I i Broadening the Agenda of Security Studies 145
What is actually being studied here, however, is not individual beliefs and
intentions but collective meaning structures - shared understandings concern-
ing the nature of warfare, the goals of foreign policy, the potentials of existing
military technologies, and the limits of the politically and institutionally pos-
sible. Consider the evidence and analyses presented in discussions of the "cult
of the offensive." Neorealist scholars argue that the cult of the offensive (or
military doctrine in general) emerges from the organizationaVinstitutional
interests of professional military organizations that are not under civilian con-
trol (Snyder, 1984a, 1984b; Posen 1984);it derives from "the political object-
ives and alliance commitments of the great powers" (Sagan, 1986: 153);and it
has roots in the social stratification of European societies and social orders
(Van Evera, 1986: 95, 99-100). The evidence adduced for these claims comes
from the writings of major political and military figures, the contents of mili-
tary training manuals, examinations of general attitudes toward warfare and
the military profession, and discussions of the role of nationalist and imperial
myths in perpetuating social control.
"Meaning-oriented behaviorism," however, is not an appropriate method
for the study of the kinds of collective meanings invoked above. The role that
perceptions play in discussions of the offenseldefense balance bears a closer
resemblance to sociological and anthropological "thick descriptions" of the
practices, socialization, and "culture" of actors within social institutions -
whether narrowly military or more broadly political and societal. "Thick
description" is an interpretive research strategy (Geertz, 1973),not an empiri-
cistlrationalist one intended to reduce beliefs and perceptions to measurable
"units." Its goal is to offer an account of particular historical circumstances
and choices that is faithful to the understandings of participants and captures
the nuances in their positions and acts. Walt's (1992: 4 7 4 4 7 5 ) dissection of
Kaufman's (1992) rendition of interwar history - criticizing it for including
questionable characterizations of particular leaders' actions, sweeping state-
ments about domestic politics, and misreadings of policy choices and options
- points toward a commonsense use of thick description. Only rarely, how-
ever, do we find scholars who recognize how the need to make judgments of
this sort might affect the research strategy needed to validate their theoretical
claims. One exception in the offense-defense literature is Elizabeth Kier's
(1995) study, which explicitly situates her "culturalist" approach within
broader methodological debates - a rare admission of epistemological and
methodological pluralism.
A third set of problems focuses on the twin propositions that (1)beliefs
and perceptions only matter when we want to make determinate predictions
of foreign policies, and (2) the only issue of importance, therefore, is how
well the subjective perceptions of actors fit or clash with the underlying real-
ity of the situations. According to neorealists, for all intents and purposes
perceptions can be ignored by assuming that "states weigh options and make
policy decisions in a more-or-less rational fashion" (Walt, 1992: 473) because
an "ecological natural selection" process punishes those states and leaders who
I <II i \! I Broadening the Agenda of Security Studies 147
deviate from this norm over the long run (Waltz, 1986a: 66-67; Christensen
and Snyder, 1990: 140, 142-1 43; Posen, 1993a: 82).
The idea that perceptions either fit or clash with reality (which ultim-
ately punishes errors) does not take into account the role of perceptions and
beliefs in constructing the social world in which actors make choices and
act. Consider Walt's ( I 987a: 263) refinement of balance-of-power theory,
which argues that policymakers "balance againat the states that pose the
greatest threat," whether or not these are the most powerful states in the
system. Threats here are not objectively specifiable in the same sense that
capabilities are because they include offensive intentions (Walt, 198.5: 9).
Once we deviate from a tight linkage to capabilities, however, we move into
a constructed world. Indeed, the world of interests, threats, and intentions
requires an understanding of history, culture, ideologies, and related factors
(O'Tuathail, 1993; Weldes, 1993, forthcoming). In principle, the absence of
threatening intentions could allow actors to override completely the suspi-
cions that would be generated (in a pure Waltzian world) from capabilities,
opening the way for a whole range of resolutions to the security dilemma.
Such a proposition might explain why post-1945 Western Europe did not
balance against the United States, or why the U.S. Pentagon is not con-
cerned about British and French nuclear weapons. Here we become inter-
ested in the construction of the Western Alliance security community, for
which competing accounts can be offered that run counter to neorealist
arguments (Lhlby, 1988, 1990; Klein, 1990; Adler and Rarnett, 1996).
The rise in ethnic and nationalist conflicts has put the question of what (or
whom) is being secured (and from what) back on the agenda of security
studies. Neorealist scholars propose that questions of identity (and interest)
formation can be analytically suspended (Wendt, 3 992: 392, 1994: 384)
because they change relatively slowly or hecome "solidified" during cir-
cumstances of conflict and war (Kaufmann, 1996: 153). As a result, the
challenge posed by identity conflicts is resolved by integrating the issues
raised by ethnicity and nationalism into neorealist foundations without
reopening thorny epistemological or ontological questions.
Steven Van Evera's (1994) "hypotheses on nationalism and war" and
Barry Posen's (1993b)work on ethnic conflict in the former Yugoslavia illus-
trate with clarity this process. Both face the challenge o f explaining the ge:erz-
esis of nationalism within an approach that treats social actors as giucn and
their ideational origins as exogenous. Dynamics of political identity are dealt
with through an objectivist epistemology; identity groups are conceived of
methodologically as individuals who simply replace states as the new objects
of security analysis. These analytic constructs are then cast back into the
neorealist dynamics of anarchy and the security dilemma vis-a-vis other
"actors." The idea that taking questions of identity seriously may require a
148 Widening Security
things in essence remain the same. Interstate relations, and their propensity
for conflict, are determined by structures not by any social or political
changes within states or cultures, no matter how profound they may seem.
This view cannot, by definition, conceive of shifting identities that could
allow greater cooperation or broader structures of identification (such as
"Europe") linking people and groups in ever-widening forms of political
order (Mearsheimer, 1994195). The contemporary implications of this pos-
ition become clear at the end of Posen's analysis. Because nationalism is a
consequence of insecurity and insecurity is tied to the threat that other states
pose, decreases in nationalism and conflict are attributable to decreases in
the threat posed by mass armies. The reduction in West European national-
ism (and conflict) is, thus, attributable to the American nuclear umbrella.
Hence, nuclear disarmament could have negative consequences, and nuclear
proliferation could be beneficial (Posen, 1993a: 124). Other options for over-
coming the security dilemma are viewed as hopelessly "idealistic."
and how particular issues (cconomic well-being, the risk of violence, envir-
onmental degradation) are placed under the "sign of security" become cen-
tral. "Security" (especially, "national security") is understood as a particular
set of historical discourses and practices that rest upon institutionally shared
understandings. The research goal is to study the process by which threats
are represented politically: to examine "who can 'do' or 'speak' security
successfully, on what issues, under what conditions, and with what effects ...
[Wlhat is essential is the designation of an existential threat ... and the
acceptance of that designation by a significant audience" (Waever, 1995a: 4).
The concept and usage of "national" (or state) security is not rejected as
either outmoded or in need of transcendence; instead, it is taken seriously
as a n important historical resolution to central problems of political life
(Weldes, 1996).
From a methodological perspective, three propositions appear to form the
core of these alternative approaches to security studies and to differentiate
them from neorealism:
These issues are addressed in different ways within these emerging bodies
of research. But this lack of methodological unity should not be taken either
as a n easy excuse for dismissal or as evidence of the intrinsic strength of the
neorealist enterprise. Obviously, scholarship in these new research pro-
grams will fail to stand up if measured against the standard of neorealist
security studies. But oncc the scientific aspirations of neorealism are called
152 Widening Security
into question, alternative approaches can be judged on their own terms, and
the issues raised by (and between) these alternatives can be examined seri-
ously as a stimulus to critical reflection in the field.
For Buzan, Ole Waever, and others involved with the "Copenhagen School"
(McSweeney, 1996), a crucial starting point for restructuring security stud-
ies is the distinction between state and society. They argue that security
studies needs to adopt an understanding of the "duality" of security: that it
combines state security, which is concerned with sovereignty, and societal
secuvity, which is concerned with identity (Waever et al., 1993: 25). Societal
security takes into account the origins, structures, and dynamics of collect-
ive identity formation (Neumann, 1996a) and the connection between iden-
tities and interests (and threats to them) (Wendt, 1994). "At its most basic,
social identity is what enables the word 'we' to be used" as a means by
which to identify collectively the "thing" to be secured (Waever et al., 1993:
17). But "society," as used by these scholars, cannot be reduced to an
aggregation of individuals nor made synonymous with the state because to
do so would risk misunderstanding many of the most salient contemporary
security dynamics. It is not simply the identities of states that are con-
structed, but the entire set of practices that designates the object to be
secured, the threats it is to be secured from, and the appropriate responses
to these threats.
In ethnonationalist conflicts, for example, competing claims to sover-
eignty, rather than the competition between existing sovereignties, often
provide the source of conflict. What people are attempting to secure is an
idea. Even though material elements are still important, such conflicts can-
not be reduced to the competing interests among pre-given political objects.
These conflicts are about the creation of these objects and the way in which
different identities are developed (Anderson, 1983). The case of Macedonian
identity, as Hikan Wiberg explains it, is suggestive (from Waever et al.,
1993: 107):
How are threats defined and constructed? In other words, how, from the wel-
ter of information and interaction among states and their representatives, are
threats constructed and mobilized against? Most research on this question has
focused on the American construction of the "Soviet threat." Bradley Klein's
(1990; see also Nathanson, 1988) analysis of major documents surrounding
, I t Broadening the Agenda of Security Studies I 55
the early Cold War and the creation of NATO shows that capabilities played
hardly any role in the assessment of the Soviet threat. "[Wlhat carried the day,
in the absence of reliable intelligence estimates, was a series of discursively
constructed claims about the nature of the Soviet totalitarian state and about
its implacable global purposes" (Klein, 1990: 313).Jennifer Milliken's ( 1995b)
study of the Korean War highlights the effort involved within Western pol-
icy circles to construct the North Korean invasion o f the South as part o f a
Moscow-led aggressive expansionism and not as an internecine struggle
among Koreans. Both these works parallel some of the postrevisionist schol-
arship on the origins of the Cold War emphasizing the effort involved in cre-
ating an American consensus over its international role (Caddis, 1982; Leffler,
1992). Simon Dalby's (1990) book focuses on the construction of the Second
Cold War and analyzes the uses made by the American Committee on the
Present Danger (and associated advocates) of geopolitical logic, historical
determinism, and nuclear war-fighting logic to construct a series of interlocked
arguments for the military buildup and European nuclear deployments that
characterized the Reagan presidency. This analysis of threat construction
directly challenges the argument that the "end of ditente" was inevitable. The
post-Cold War threat environment has also provided fertile ground for crit-
ical analysis, as in David Mutimer's (forthcoming) examination of the way in
which the metaphorical and linguistic construction of a "proliferation threat"
for the United States (and its alliance partners) has been used to mobilize
resources aimed at dismantling the Iraqi nuclear, chemical, and biological
weapons programs; to isolate North Korea over its possible nuclear weapons
program; to create an activist "counterproliferation" policy within the Clinton
administration; and to mobilize support for the development of ballistic mis-
sile defenses.
A second line of research tackles the way in which appropriate responses
to the threats are constructed in security policymaking. Most attention in this
area has been focused on deterrence and arms control policies. Emanuel
Adler (1992) examined how the arms control "epistemic community" that
emerged in the United States after the Cuban missile crisis charted a path out
of the sterile debates over "disarmament" of the previous period and gener-
ated cooperative security policies hetween the superpowers. Others (Chilton,
1985; Chhn, 1987; Luke, 1989; Mehan, Nathanson, and Skelly, 1990) have
studied the elaboration and implementation of nuclear deterrence policies,
drawing attention to the linguistic construction of the nuclear debate and the
ways in which weapons were "normalized" or opponents trivialized in order
to promote particular nuclear deterrence policies.
Security policies also involve the securing of the stable identity of entities.
David Campbell (1992), for example, argues that threats need to be under-
stood in part as powerful elements in securing a society's collective identity
in an essentially rootless modern world. According to Campbell (1992: 54),
"the state requires discourses of 'danger' to provide a new theology of truth
about who and what 'we' are by highlighting who or what 'we' are not,
and what 'we' have to fear." Likewise, Iver Neumann and Jennifer Welsh
I56 Widening Security
(1991; see also Neumann, 1996b) have examined the way in which "Europe"
was constituted in relation to a "Turkish other" from which it needed to be
secured; Karin Fierke (forthcoming) has explored how the end of the Cold
War provoked a rearticulation of the political categories through which
identities and threats had been articulated within Europe.
All these authors are concerned with how questions. How was an
American or Western interest in opposing so-called Soviet expansionism
created and what forces did it mobilize? How did the language of nuclear
deterrence operate to tame these weapons and exclude particular options
for dealing with them? How do different discourses construct "others" as
the source of threats? The most common objection raised to all this research
is that constructions operate as simple glosses over the "real interests" that
lie behind "the veil of facts." The response to this complaint is a complex
one. All these authors challenge, for example, the neorealist argument that
the way in which the confrontation between East and West unfolded was
inevitable, that the construction of the Soviet threat was merely the public
gloss on the operation of real interests in great power clashes, and that the
particular form this confrontation took was unimportant to an under-
standing of its causes and consequences. Hence, the researchers go beyond
a demonstration of the constructed nature of threat discourses to show how
these constructions could have been different given the concrete historical
circumstances in which political choices were made. These arguments are
not purely of the idealist "if only" kind; they evince a clear concern with
the conditions of contemporary policy choices.
Scholars in the constructivist tradition often seek to shift the grounds of
debate to a pragmatic political or discursive perspective in order to avoid
determining what security "actually is" precisely because they view security
as a convention (Dalby, 1992, forthcoming; Waever 1995b). The thrust of
their arguments concerning the "practice of security" presumes that the
process of constructing a meaningful discourse of threats is not politically
neutral. Thus, one ought to question whether or not the construction of a
articular "problem" as a "threat" is desirable. As Daniel Deudney (1990)
has observed, for example, making the environment a national security issue
may subvert the goal that proponents of this change seek to achieve.
Environmental issues pose significant and pressing dangers, but placing them
on the security agenda means subsuming them within concepts and institu-
tions of state security (that is, military responses against a particular "target")
that are unlikely to further the agenda of "environmental security" (Deudney,
1990; Matthew, 1995: 19). In a similar vein, Kaufmann (1996) indicates that
identities (and threats to them) cannot be changed by a simple act of will or
wishful thinking; under extreme circumstances (such as communal war), the
boundaries of identities can be hardened and thickened in ways that exacer-
bate conflict and make creative resolutions difficult if not impossible. The
question of the relationship of theory to practice in alternative approaches to
security studies is central here, as is the issue of the political processes through
which policies and practices can be modified or altered.
Krdii'. II td \\ i I l l i r i l 5 Broadening the Agenda of Security Studies 157
Conclusion
This review essay does not claim to cut the Gordian knot into which con-
temporary security studies has tied itself. The conlplex methodological and
political issues raised above touch on every branch of security studies (and
its current political relevance). Moreover, they reflect concerns that are not
limited to this small outpost of social science. Nor can these issues be
resolved simply by declaring that alternative approaches to security studies
are little more than the expression of postmodern nihilism (Mearsheimer,
1994195: 39-41) and withdrawing to the supposedly safer harbors of theor-
etical and political orthodoxy. This review has attempted to show that
despite the analytic divides that appear to demarcate different approaches
to security studies, the various approaches actually share a number of the
same problems. Such a statement does not mean that different approaches
are commensurable, but it does suggest a need for all scholars to consider
seriously the issues central to approaches other than their own.
It cannot be underscored enough that neorealists and their challengers
"see" a different world. The former see, over the past several centuries of
world politics (and perhaps before), a ceaseless repetition of con~petition
among political units for power in a world of suspicion and insecurity.
As Steven Krams and Mark Kilgour (1988: viii) note, "[Tlrue, the world is
confusing, but considerable order and stability often can be found below
the surface ... This search for order is the hallmark o f scientific inquiry;
without it ... there could not be a coherent intellectual understanding of the
regularities we observe." Unfortunately, when claims to transhistorical con-
tinuity and generalizability are examined closely, they often turn out to rest
upon tendentious or implausible readings of history that are little better
than Whig or Toynhee-esque (Schroeder, 1994, 1995; Elman and Elman,
1995). The latter scholars see in the tapestry of recent world history vari-
ation, change, and contingency. For them, the rise and decline of absolutism,
the advent of modern nationalism and iniperialism, the emergence of claims
for self-determination and decolonization, and the more recent influence of
ideas of democracy and human rights have all embedded the interaction of
political units in a complex web that gives ~ r a c t i c a land shifting content to
their understandings of interests. It is no accident that researchers within
this more historicist tradition do not regard positivist methods and apodic-
tic prediction as the hallmarks of social understanding.
There are, however, at least two reasons for stopping short of the impli-
cation of this argument and claiming that competing accounts are simply
incommensurable and irreconcilahle (Neufeld, 1993b). The first is thc "div-
ision of labor" argument, presented most straightforwardly in the distinction
between "why" and "how" questions - "with explaining why particular
decisions resulting in specific courses of action were made" versus with
understanding "hozu the subjects, objects, and interpretive dispositions were
socially constructed such that certain practices were made possible" (Doty,
1993: 298, emphasis hers; see also Hollis and Smith, 1991). "How" clues-
158 Widening Security
tions are in some senses prior to "why" questions: before particular courses
of action can be selected (and thus explained), the range of possible or plaus-
ible options has to be constructed and scholars have to understand the way
in which certain options acquire meaning or value. In security studies, this
process involves ascertaining how the nature (and source) of threats is con-
structed, the "object" being secured, and the possibilities for reinforcing,
ameliorating, or even overcoming "security dilemmas." Neorealist approaches
take all these issues as givens. An enlarged conception of security studies
needs to make room for both sorts of research agendas. Without both "how"
and "why" research, we are not adequately "explor[ing] the conditions that
make the use of force more likely, the ways that the use of force affects indi-
viduals, states and societies, and the specific policies that states adopt in order
to prepare for, prevent, or engage in war" (Walt, 1991: 212).
The inability of neorealist security studies to meet (even in principle) the
standard of science to which it aspires should also moderate rejection of the
more interpretive scholarship that informs approaches concerned with "how"
questions. Of course, there are thorny methodological problems that bedevil
interpretation as well (some interpretations are always more plausible, coher-
ent, and convincing than others), but the "truth value" of the claims is arbi-
trated within a social context. The neglect by neorealist security studies
scholars of the crucial role that interpretation plays in their own arguments
and the implication this has for their claims to objectivity is difficult to
explain, except, perhaps, by their eagerness to gain the disciplining power con-
veyed by the mantle of science. Ultimately security studies research would be
enhanced by a more direct engagement with the difficult issues associated
with historical interpretation. Such would certainly seem more preferable
than claiming to be "wary of the counterproductive tangents that have
seduced other areas of international studies" (Walt, 1991: 223) or preserving
the coherence of neorealist theory by tautological and definitional fiat (Hall
and Kratochwil, 1993; Kratochwil, 1993; Schroeder, 1995). None of the pos-
itions in this debate has yet found the epistemological or methodological grail.
The second reason for not claiming that the various schools of thought in
security studies are incommensurable and irreconcilable is that all security
studies scholars are engaged in intensely practical and political projects,
whether these are defined as "policy relevant knowledge" or "praxis." On the
one hand, it is not the case that alternative approaches,
- - whether addressing-
new issues such as migration and nationalism or old issues such as deterrence
and arms control, court political irrelevance or are "diverted into a prolix and
self-indulgent discourse that is divorced from the real world" as some
(Walt, 1991: 223) have argued. This statement would be true only if one holds
a truncated view of politics that sees the relevant actors in the process of defin-
ing security as states and their policymakers (supported, of course, by appro-
priate academic experts) and believes that scholarship should "concentrate on
manipulable variables, on relationships that can be altered by deliberate acts
of policy" (Walt, 1991: 212, emphasis his). Even neorealist scholars like
Mearsheimer, Van Evera, and Posen have noted that important aspects of
conflictual relationships include the creation and perpetuation of national
/ ( I , (1 \ ,I1 Broadening the Agenda of Security Studies 159
Notes
1. O u r thanks to Lene H,lnsen, lenniter Milliken, Thomas Schmalherger, and the reviewers
and editors of the Mershon Internirtion~rlStudzes Revieto for helpful comments o n this essay.
2. Scholars who d o not tit neatly Into these categories include Edward Azar and Chung-in
Mooti ( 1988) and Mohammed Ayoob ( 1995).
3. Insofar ,ls debate ha\ focused o n neorealist securlty studies, it has C L I ~ I ~ L I S Ignored
I~ a
large nonrealisr literature - ~ncludlngcognitive, organiration;ll, and cybernetic ,ippronches, as
well as the l i t e r a t ~ ~ on
r e ciome\tic \ourcrs o f strategy (see, for example, Jervis, Lehow, and S t e ~ n
1985; Barnett and Levy 199 1 ; Rarnett 1992; Rosrcrance and Stein 1993; Sagan 1994; Smoke
1996).\r willingness t o l o o k heyond neorc,ilist security studies might strengthen the arguments
of the crit~cs.
160 Widening Security
4. Lions are "states that will pay high costs to protect what they possess but only a small
price to increase what they value"; lambs "will pay only low costs to defend or extend their val-
ues"; jackals "will pay high costs to defend their possessions but even greater costs to extend
their values"; and wolves "are predatory states [that] value what they covet far more than what
they possess" (Schweller 1994: 101-103).
5. We use the labels "critical" and "constructivist" loosely in this review, acknowledging
that the very term critical contains no connotations that link it extricably to either a positivist
or reconstructive approach. Thus, it may allow both proponents and opponents to stop at the
theoretical level, without reflecting on the practical implications of scholarship. It is also worth
noting that few of the scholars mentioned in what follows appear in Mearsheimer's (1994195)
review of "critical theory" and international relations.
References
Achen, Christopher and Duncan Snidal (1989) Rational Deterrence Theory and Comparative
Case Studies. World Politics 41:143-169.
Adler, Emanuel (1992) The Emergence of Cooperation: National Epistemic Communities and
the International Evolution of the Idea of Nuclear Arms Control. International
Organization 46:lOl-146.
Adler, Emanuel and Michael Barnett (1996) Governing Anarchy: A Research Agenda for the
Study of Security Communities. Presented at the annual meeting of the International Studies
Association. San Diego, California, April 19.
Anderson, Benedict (1983) Imagined Communities. London: Verso.
Ayoob, Mohammed (1995) The Third World Security Predicament. State-Making, Regional
Conflict and the International System. Boulder: Lynne Reinner Publishers.
Azar, Edward E. and Chung-in Moon (1988) Legitimacy, Integration and Policy Capacity: The
"Software" Side of Third World National Security. In National Security in the Third
World: The Management of Internal and External Threats, edited by Edward E. Azar and
Chung-in Moon, pp. 77-101. College Park: University of Maryland Press.
Baldwin, David (1995)Security Studies and the End of the Cold War. World Politics 48:117-141.
Barnett, Michael (1992) Confronting the Costs of War. Princeton: Princeton University Press.
Barnett, Michael and Jack Levy (1991) Domestic Sources of Alliances and Alignments: The
Case of Egypt, 1962-73. International Organization 45:369-395.
Brams, Steven and Marc Kilgour (1988) Game Theory and National Security. Oxford: Basil
Blackwell.
Buzan, Barry (1991) People, States and Fear. Second edition. Heme1 Hempstead: Harvester
Wheatsheaf.
Buzan, Barry, Charles Jones and Richard Little (1993) The Logic of Anarchy. New York:
Columbia University Press.
Campbell, David (1992) Writing Security: United States Foreign Policy and the Politics of
Identity. Minneapolis: University of Minnesota Press.
Carter, Ashton, William Perry, and John Steinbruner (1992) A New Concept of Cooperative
Securrty. Washington, DC: The Brookings Institution.
Chilton, Paul, ed. (1985) Language and the Nuclear Arms Debate: Nukespeak Today. London:
Frances Pinter.
Chipman, John (1992) The Future of Strategic Studies: Beyond Even Grand Strategy. Survival
34:109-131.
Christensen, Thomas and Jack Snyder (1990) Chain Gangs and Passed Bucks: Predicting
Alliance Patterns in Multipolarity. International Organization 44:137-168.
Cohn, Carol (1987) Sex and Death in the Rational World of Defense Intellectuals. Signs 12:
687-718.
Crawford, Beverly (1994) The New Security Dilemma under International Economic
Interdependence. Millennium 23:25-55.
h r,l I . I I i I\1 1 ' 1 . Broadening the Agenda of Security Studies 161
C r ~ w f o r d Ncra
, ( 1991) Once and F u t ~ ~ Security
re Studies. S c c ~ t r ~Studies
ty 1:283-3 16.
Dabelko, Geoffrey D. and I h v i d D. Ilahelko ( 1 995) Env~ronrnenralSecurity: Issues of Conflict
rind Resolution. En~~irrrnnzentdC:hrrtige and S e c ~ t ~ i tI'rolect y Report 1:3-13. Woodrow
W ~ l s o nCenter, l'rincrton University.
Dalby, Simon ( 1988) Geopolitical Discourse: The Soviet Union as Other. Alternatives 13:4 1.5443.
Lhlhy, S ~ m o n( I99Oi Crcatirrg the Srmt?d (:old War. T / J CDiscmtrsc of Po/itrcs. New York and
London: Guilford and 1'1ntcr.
Dall,): Simon ( 1992) Secur;ry, M<xiern;ry,F c ~ l c , The ~ ~ : D;lcmn,as of Post-(:old Wnr Secur~ty
Discourse. Altc~r~zatitvs 17:95-1 34.
Dalhy, Simon ( t o r r l i c o m ~ n g Contesting
) an Essent~,ll (hncept: Reading the Dilcrnmas In
Contemporary Security Discourse. In (:ritrcal Security Studies: Concepts and Casrs, e d ~ t c d
hy Krith I < ~ , I L and
I ~ M~chaelC. Will~,~ms. Minneapolk: University o f Minnesota I'ress.
David, Steven ( 199 I ) E x p h i n ~ n gT h ~ r dWorld Alignment. World Politrcs 433233-256.
DeNardo, J,~mes( 1995) T h c Amiltcirr Striztegrst: Intrrit~ivDctcvwnce and the P o l i t ~ so f tl~cz
N~tclenrArms Rare. < : a ~ n h r ~ d g(:ambridge
e: Un~vers~ry I'rrss.
Ikudney. Danlel (1990) The ( h s e Agmnst [.inking Environnienta1 Ikgradation and National
Security. M~lle~r~lilorr 1 Y:46 1-1 76.
Ilewitt, David ( 1 994) Common, C:omprehrns~veand (:ooperCltive Security. The Pizcific K ~ v i e ~ c ,
7:l-15.
Lhrff, Robert H (1994) A C:<)~nnientary on Securrty Studies for the 1'990s as a Model Core
Curriculum. Irrtc~r~zatrorrd Strtdies hrotes 1 9 2 - . 1 I.
Iloty, Roxanne ( 1993) Forelgn Policy as Social Construct~on: A Post-positivist Amlysis of
U.S. Counterins~~rgenq Pol~cyin the Phdippines. Inter~tntiomilStudies Quarterly 37297-320.
Elman, Chlin atid Miriam Fenciius Elman ( 1995) Correspondence: History vs. Neo-rcnli\m: A
Second 1.ook. l~~trrnntioirirl Sccur~ty20: 182-1 95.
Fierke, Karen (Forthcoming) Changing Worlds of Secur~ty. In Critical Securit)~St~ldrps:
C o ~ z ~ c p ~t st r dC~zses,edited by Kelt11 Krausc and .Mich,lel C. W ~ l l i a ~ n sMinneapolis:
.
University ot Minncsor,i I'res\.
<;addis, l o h n L e w s ( 1 9 8 2 ) .Strirtcyc,s of ( h r t a ~ i i m r n t New
. Yo]-k: Oxford University Press.
(ht, A u r ( 1989) '/-he Ori,y~rsof Mil~trlryThoright. Ouford: Oxford Un~vercityPress.
Gat, A.ur (1992) T h e L)c~~,clopnrrwt o f M111tirryThorlght: T h c N ~ ~ z e t e e n tCentury
h Oxford:
(:larendon Pres.;.
<;eertz, Clifford ( 1973) T h e Irrterprrttrtro~z of Cultrtrrs. New York: Basic Books.
<;iddens, Anthony ( 1 9 8 7 ) T l ~ eNatmn-State atzd \ ' ~ o h ~ - c 1.0s . hngeles: University of
California I'ress.
Gizewskl, Peter and Thomas Homer-D~xon( 1995) UrOan Griru& and Vtolence: Will the Putttrt,
Resr~nblrthr I'i~st?Project on Environment, PopuLltion and Security, University of Toronto.
Gleick, I'eter H. (1993) Water ,tnd Conflict: Fresh Water Reuources m d lntcrnatlonal Security.
Interrzat~onnl.%wirity 1 8:79-1 12.
Grant, Rebecca ( 1992) The Quagmire of Gender and Internation,il Security. In Gendered States,
editcd hy V . S p k e Peterwn, pp. 83-97. Boulder: Lynne Kcinner Publishers.
Gray, Colin (1992) New D~rectionsfor Strategic Studies? H o w Can Theory Help I'racrice.
Secrtrity Strdics I :6 10-6.35.
Gray, Colin ( 1995) Villans, V~rttnzsm d Sheriffs: Scc~rrrtyStttd~esand Security for an Inter- War
Period. Hull: University of Hull Press.
G r ~ c c o ,Joseph (1988) Anr~rchyarid the limits of C:ooper,1tion: A Realist Crirlque of the
Newest 1.iberal Institi~tional~sn~. l~~ternntronal C)rganrztrtrorr 42:48.5-507.
Haftendorn, Helga (1991) The Security Puzzle: Theory-Building and Discipline-Building in
International Security. Intrrn~rt~on~zl Studies Qirizrterly .3.5:3-17.
Hall, Rodney Bruce and Friedrich Krarochw~l( 1 993) Med~ev'll Tiles: Neo-Realist "Science" and
the Abuse o f History. lnternatro~~nl Organization 47:479-500.
H e i s b o ~ ~ r gFranqois
, (199 1 ) Populatio~i Movements in a Post-Cold War Europe. S u r ~ ~ i v a l
3 3 3 1-43.
Hollis, M a r t ~ nand Steve Smith ( 199 1 ) Explaining and Understanding International Relations.
Oxford: Oxtord University Press.
162 Widening Security
Percival, Valerie and Thomas Homer-Dixon (1995b) Environmental Scarcity and Violent
Conflict: The Case of South Africa. Project on Environment, Population and Security,
University of Toronto.
Posen, Barry R (1984) The Sources of Military Doctrine: France, Britain and Germany
between the World Wars. Ithaca: Cornell University Press.
Posen, Barry R (1993a) Nationalism, the Mass Army and Military Power. International
Security 18:80-124.
Posen, Barry R (1993b) The Security Dilemma and Ethnic Conflict. Survival 35:27-47.
Powell, Robert (1993) Guns, Butter, and Anarchy. American Political Science Review
87:115-131.
Ringmar, Eric (1995) The Relevance of International Law: A Hegelian Interpretation of a
Peculiar Seventeenth-Century Preoccupation. Review of International Studies 21:87-104.
Roberts, Brad (1990) Human Rights and International Security. Washington Quarterly
13:65-75.
Rosecrance, Richard and Arthur A. Stein, eds. (1993) The Domestic Bases of Grand Strategy.
Ithaca: Cornell University Press.
Rubenstein, Robert A (1988) Cultural Analysis and International Security. Alternatives
13:529-542.
Sagan, Scott (1986) 1914 Revisited. International Security 11:151-175.
Sagan, Scott (1994) The Perils of Proliferation. International Security 19:66-107.
Schroeder, Paul (1994) Historical Reality vs. Neorealist Theory. International Security
19:108-148.
Schroeder, Paul (1995) Correspondence: History vs. Neo-realism: A Second Look. lnternational
Security 20:193-195.
Schultz, Richard, Roy Godson and Ted Greenwood, eds. (1993) Security Studies for the 1990s.
New York: Brassey's.
Schweller, Randall (1994) Bandwagoning for Profit. lnternational Security 19:72-107.
Shaw, Martin (1993) "There is N o Such Thing as Society": Beyond Individualism and Statism
in International Security Studies. Review of lnternational Studies 19:159-176.
Shy, John (1986) Jomini. In Makers of Modern Strategy, edited by Peter Parer, pp. 143-185.
Oxford: Clarendon Press.
Smoke, Richard, ed. (1996). Perceptions of Security: Public Opinion and Expert Assessments
in Europe's New Democracies. New York: Manchester University Press.
Snyder, Jack (1984a) Civil-Military Relations and the Cult of the Offensive, 1914 and 1984.
lnternational Security 9: 108-146.
Snyder, Jack (1984b) The Ideology of the Offensive: Military Decision Making and the
Disasters of 1914. Ithaca: Cornell University Press.
Steinbruner, John D. (1974) The Cybernetic Theory of Decision. Princeton: Princeton
University Press.
Tickner, J. Ann (1992) Gender and International Relations: Feminist Perspectives on
Achieving Global Security. New York: Columbia University Press.
Tuchman Mathews, Jessica (1989) Redefining Security. Foreign Affairs 68:162-177.
Ullman, Richard (1983) Redefining Security. International Security 8:129-153.
Van Evera, Stephen (1986) Why Cooperation Failed in 1914. World Politics 38:80-117.
Van Evera, Stephen (1994) Hypotheses on Nationalism and War. lnternational Securzty 185-39.
Waever, Ole (1995a) Security Analysis: Conceptual Apparatus. In Environmental, Economic
and Societal Security: Working Papers 10, by Barry Buzan, Ole Waever, and Jaap de Wilde,
pp. 1-13. Copenhagen: Centre for Peace and Conflict Research.
Waever, Ole (1995b) Securitization and Desecuritization. In On Security, edited by Ronnie
Lipschutz, pp. 46-86. New York: Columbia University Press.
Waever, Ole, Barry Buzan, Morton Kelstrup and Pierre Lemaitre (1993) Identity, Migration
and the New Security Agenda in Europe. London: Pinter.
Walker, R.B.J. (Forthcoming) The Subjects of Security. In Critical Security: Concepts and
Cases, edited by Keith Krause and Michael C. Williams. Minneapolis: University of
Minnesota Press.
I 1 1 I I Broadening the Agenda of Security Studies 165
The Puzzle
W
hy was it that the United States, the undisputed superpower of
the early post-1945 period, found itself entangled in the North
Atlantic Treaty Organization (NATO) with Western Europe only
four years after the end of World War II? Why was it that a pattern of cooper-
ation evolved in NATO that survived not only the ups and downs of the Cold
War and various severe interallied conflicts - from the 1956 Suez crisis to the
conflict over Euromissiles in the 1980s - but also the end of the Cold War?
Why is it that NATO has emerged as the strongest among the post-Cold War
security institutions - as compared to the Organization for Security and
Cooperation in Europe (OSCE), the West European Union (WEU), not even
to mention the EU'S Common Foreign and Security Policy (CFSP)?
Traditional (realist) alliance theory1 at least has a simple answer to the
first two questions: the Soviet threat. But what constituted the Soviet threat?
Was it Soviet power, ideology, behavior, or all three combined? I argue in this
essay that the notion of the "Soviet threat" needs to be unpacked and prob-
lematized if we want to understand what it contributed to the emergence and
the endurance of NATO. I also claim that realism might provide first-cut
answers to the questions above but that it is indeterminate with regard to
explaining particular Western European and U.S. choices at critical junctures
of the Cold War, not even to mention its aftermath. Moreover, sophisticated
power-based arguments that try to account for these choices do so at the
expense of parsimony. Why should they be privileged as providing the base-
line story, while more elegant alternative explanations are used to add some
local c ~ l o r a t i o n ? ~
I provide an account for the origins and the endurance of NATO different
from the conventional wisdom. NATO and the transatlantic relationship can be
better understood on the basis of republican liberalism linking domestic polities
Source: Peter J. Katzenstein (ed.), The Culture of Nutiom1 Security: Norms and Identity in
World Politics (New York: Columbia University Press, 1996), pp. 357-99.
i I[ 1 I Collective Identity in a Democratic Community 167
each other and to compete fiercely.' The more important relative gains are,
however, the more significant the acquisition of client states should become.
While the loss or defection of one small ally might not be important, super-
powers might fear that even small losses might set in motion a chain reaction.
Thus, if we change our understanding of bipolarity only slightly, American
Cold War policies of acquiring allies around the globe, i~lcludingthe Western
Europeans, can be explained. In other words, structural realism can be made
consistent with actual U.S. behavior during the Cold War, but the theory could
also explain the opposite behavior.
What about Stephen Walt's more sophisticated realism emphasizing the
"balance of threat" rather than the "balance of power"?8 Does it reduce the
indeterminacy of structural realism by adding more variables? Walt argues that
states align against what they perceive as threats rather than against economic
and military capabilities as such. States feel threatened when they face powers
that combine superior capabilities with geostrategic proximity, offensive mili-
tary power, and offensive ideology. One could then argue that the proximity of
the Soviet landmass to Western Europe, Moscow's offensive military doctrine
backed by superior conventional forces, and the aggressive communist ideol-
ogy constituted the Soviet threat leading to the formation of NATO.
There is no question that Western decision makers perceived a significant
Soviet threat during the late 1940s and that this threat perception was causally
consequential for the formation of NATO. The issue is not the threat percep-
tion, but what constituted it: Soviet power, ideology, behavior, or a combin-
ation of the three? As to Soviet power, the geographic proximity of the Soviet
landmass - Walt's first indicator - could explain the Western European threat
perception and the British and French attempts to lure reluctant decision
makers in Washington into a permanent alliance with E ~ r o p eBut . ~ it is still
unclear why the U.S. valued Western Europe so much that it decided to join
NATO. The argument that the U.S. wanted to prevent Soviet control over the
Eurasian rimlandlo makes sense only if we also assume that decision mak-
ers in Washington saw themselves as defensive positionalists in a fierce hege-
monic rivalry rather than more relaxed Waltzian realists (see above). In this
case, sophisticated realism is as inconclusive as structural realism.
Moreover, the Soviet Union was not considered an offensive military threat
to Western Europe during the late 1940s. Military estimates did increasingly
point to Soviet military superiority in Europe, but that did not lead to the per-
ception of an imminent attack. As John Lewis Gaddis put it, "Estimates of
Moscow's intencions, whether from the Pentagon, the State Department, or the
intelligence community, consistently discounted the possibility that the Russians
might risk a direct military confrontation within the foreseeable future."ll
Rather, the U.S. threat perception at the time focused on potential Soviet
ability to psychologically blackmail war-weakened Western Europe and to
destabilize these countries politically and economically. This American view
of a significant Soviet threat was concerned about actual Soviet behavior in
Eastern Europe and the Soviet offensive political ideology - the third of
Walt's indicators. If this is indeed what constituted the Soviet threat in
I p Collective Identity in a Democratic Community I69
Western eyes in the late 1940s, it can be better explained by liberal theories
t h a n by even sophisticated realism (see below). At least, the t w o accounts
become indistinguisl~ablea t this point.
The indeterminacy of realism also applies when we start using the theory to
predict the survivability of NATO after the Cold War. Structural realists in the
Waltzian tradition should expect NATO to wither away with the end of the
Cold War. If great powers do not need allies under bipolarity for their survival,
this should be all the more true when the hegemonic rivalry ceases to dominate
world politics. In Waltz's own words, "NATO is a disappearing thing. It is a
question of how long it is going to remain as a significant institution even
though its name may linger on."I6
In the absence of indicators of what "lingering on" means, it is hard to
evaluate the proposition. I argue later in this essay that NATO is alive and
well so far, at least as compared to other security institutions in Europe.
Sophisticated realism and "balance-of-threat" arguments are indetermin-
ate with regard to the future of NATO. On the one hand, one could argue that
the Western Alliance should gradually disintegrate as a result of the Soviet
withdrawal from Eastern Europe and the drastically decreased military threat.
On the other hand, the Russian landmass might still constitute a residual risk
to Western Europe, thus necessitating a hedge against a potential reemergence
of the threat." In any case, the Western offer for a "partnership for peace" to
Russia is difficult to account for even by sophisticated realism.
In sum, a closer look at realism as the dominant alliance theory reveals its
indeterminacy with regard to the origins of, the interaction patterns in, and the
endurance of NATO. In retrospect, almost every single choice of states can be
accommodated somehow by realist thinking. As a Waltzian realist, the U.S. could
have concluded that the direct confrontation with the USSR was all that mat-
tered, while the fate of the Western Europeans would not alter the global balance
of power. As a more sophisticated realist, the U.S. would have decided - as it
actually did - that the fate of the Eurasian rim was geostrategically too signifi-
cant to leave the Western Europeans alone. If decision makers in Washington
listened to their allies during the Cuban missile crisis, we can invoke realist argu-
ments about reputation and the need to preserve the alliance during crises. Had
the U.S. not listened to the Western Europeans during the crisis, one could have
argued that superpowers do not need to worry about their allies when they per-
ceive that their immediate survival is at stake. If NATO survives the end of the
Cold War, it is "lingering on" as a hedge; if it disappears, the threat has withered
away. As others have noted before, realism is not especially helpful in explaining
particular foreign policy choices.18 I now look at a liberal account emphasizing a
community among democracies, collective identity, and alliance norms.
The U.S. had quite some latitude as to how it defined its interests in Europe.
Thus we need to "look more closely at this particular hegemon" in order to
"determine why this particular ... agenda was p ~ r s u e d . " 'Domestic
~ politics
I' 1 1 ; Collective Identity in a Democratic Community 1 71
individ-
1 . thc fundamental agents in international p l i t i c s are not states but
uals acting in a social context - whether governments, domestic society, o r
international institutions;
2. the interests and preferences of national governments have to be analyzed
as a result of domestic structures and coalition-building processes respond-
ing to social demands as well as t o external factors such as the (material
and social) structure of the international system;
3. ideas - values, norms, and knowledge - are causally consequential in inter-
national relations, particularly with regard to state interests, preferences,
and choices;
4. international institutions form the social structure of international politics
presenting constraints and opportunities to actors.
1. Why is it that domestic orders, norms, and political cultures shape the
identities of actors in the international realm? Why not economic orders,
such as capitalism? Why not geographic concepts, such as "the West," the
"North Atlantic area," and the like? Why not gender and race, such as
"white males" ?
2. Democratic identities appear to be constant and acontextual rather than
historically contingent. Is there never any change as to what constitutes
an identity as "liberal democrat"?
As to the first point, it is, of course, trivial that actors hold multiple identi-
ties. Which of these or which combination dominates their interests, percep-
tions, and behavior in a given area of social interaction needs to be examined
through empirical analysis and cannot be decided beforehand. I submit, how-
ever, that values and norms pertaining to questions of governance are likely to
shape identities in the realm of the political - be it domestic or international.
Moreover, such notions as "the West" do not contradict the argument here but
seem to represent a specific enculturation of a broader liberal worldview. The
same holds true for identities as "capitalists," particularly if juxtaposed against
"communist order." The notion of the "free world," which Western policy
I< * r i Collective Identity in a Democratic Community 175
makers used frequently during the Cold War to refer to their collective identity
and to demarcate the boundaries against "Communism," encompassed liberal
values pertaining to both the political and the economic orders.
As t o the second point, and unlike several versions of neoliberalism, a
sociological interpretation of the liberal argument posits historical contin-
gency and contextuality. The zone of the "democratic peace" in the Northern
klemisphere did n o t fall from heavcn but was creatcd through processes of
social interaction and learning." The emergence of NATO is part a n d par-
cel of that story. Moreover, the norms of the democratic peace can in prin-
ciple be unlearned, since collective identities might change over time. But t o
argue that the social structure of international relations is somehow more
malleable a n d subject t o change than material structures represents a mis-
understanding of social c o n s t r ~ ~ c t i v i s m . ' ~
The argument then can be summarized as follows: Democracies rarely fight
each other: they perceive each other as peaceful. They perceive each other as
peaceful because of the democratic norms governing their domestic decision-
making processes. For the same reason, they form pluralistic security cornmu-
nities of shared values. Because they perceive each other as peaceful and express
a sense of community, they are likely t o overcome obstacles against inter-
national cooperation and to form international institutions such as alliances.
The norms regulating interactions in such institutions are expected to reflect the
shared democratic values and to resemble the don~esticdecision-making norms.
In the following sections, I illustrate the argument with regard t o the
formation of NATO, t w o cases of inter-allied conflict during Cold War
crises, and the future of the transatlantic relationship in the post-Cold War
environment.
public. President Roosevelt, for example, tried to preserve the wartime alliance
with the Soviet Union until his death and to realize a collective security order
guaranteed by the "four policemen" (the U.S., the USSR, Great Britain, and
China), a concept that he had first proposed in 1941. His successor, President
Truman, continued on this path during his first months in office. After
Truman had changed his mind, Secretary of Commerce Henry Wallace still
advocated a modus vivendi with the Soviet Union and the need to respect a
Soviet sphere of influence in Europe until he was removed from office in
September 1946. In the U.S. public, Walter Lippmann became the leading
advocate of that argument when responding to George F. Kennan's contain-
ment strategy.
Early supporters of a tougher policy toward Moscow included the U.S.
ambassador to Moscow, Averell Harriman, Kennan, and particularly Secretary
of the Navy James Forrestal, while Secretary of State George Marshall steered
a middle course until about 1948. How is it to be explained that this latter
argument carried the day and that particularly President Truman became a firm
advocate of a policy of c ~ n t a i n m e n t ? ~ ~
An obvious answer pertains, of course, to Soviet behavior. Western lead-
ers, including Roosevelt, would have accepted a Soviet sphere of influence
in Europe and were prepared to accommodate its security concerns - see
Churchill's famous trip to Moscow in October 1944 and the Soviet-British
"percentages agreement" on Southeast Europe.40 But when the Red Army
moved into Eastern Europe in 1944, Moscow immediately started to sup-
press potential political opposition in Romania, Bulgaria, Hungary, and,
above all, Poland. Stalin broke what Roosevelt considered a Soviet com-
mitment to free elections negotiated at Yalta, provoking the president to
complain, "We can't do business with Stalin. He has broken every one of
the promises he made at Yalta."41
The Truman administration, which had supported friendly relations with
the Soviet Union until December 1945, began to change its position in early
1946, in conjunction with the Soviet reluctance to carry out the Moscow
agreements to include non-Communists in the governments of Romania and
Bulgaria.42These early disputes focused on domestic order issues in Soviet-
controlled Eastern Europe. Had Stalin "Finlandized" rather than "Sovietized"
Eastern Europe, the Cold War could have been avoided. In the perception of
U.S. decision makers, the Soviet threat emerged as a threat to the domestic
order of Western Europe, whose economies were devastated by the war. As
the CIA concluded in mid-1947, "the greatest danger to the security of the
United States is the possible economic collapse in Western Europe and the con-
sequent accession to power of Communist elements."43 U.S. administrations
from Roosevelt to Truman considered Western Europe vital to American secu-
rity interests, both for historical reasons (after all, two world wars had been
fought over Western Europe) and because it was viewed as a cornerstone of
the liberal - political and economic - world order that both Roosevelt and
Truman envisaged.44But it was not Soviet power as such that constituted a
threat to these interests; rather it was the Soviet domestic order, combined
ki , <,,;;r):~ Collective Identity in a Democratic Community 177
[The Cold War] was launched in fiercely ideological terms as an invn 51011
.' L
and democracy - i.e., the values for which the Cold War was fought - but also
proved crucial to move the U.S. closer to a firm commitment to European
security.
Second, major initiatives toward the formation of a North Atlantic
Alliance originated in Europe, mainly in the British Foreign Office." A close
transgovernmental coalition of like-minded U.S., Rritish, Canadian, and -
later o n - Frcnch senior officials worked hard to transform t h e growing sensc
of threat into a firm U.S. commitment toward European security. The nego-
tiations leading to the North Atlantic Treaty resenihled a "three-level" game
involving U.S. domestic politics, transgovernmental consensus-building, and
intergovernmental bargains across the Atlantic. As to the last, probahly the
most important deal concerned Germany: the French would support U.S.
policies toward the creation of a West German state in exchange for an
American security commitment to Europe in terms of "dual containment"
(protection against the Soviet Union and Germany)."
Third, a multilateral institution had advantages over alternative options,
since it enhanced the legitimacy of American leadership by giving the Western
Europeans a say in the decision-making process. In this context, it was self-
evident and not controversial on either side of the Atlantic that an alliance
of democratic states had to be based on democratic principles, norms, and
decision-making rules. The two major bargains about the North Atlantic
Treaty concerned, first, the nature of the assistance clause (article 5 of the
treaty) and, second, the extent to which the consultation commitn~ent(article 4)
would include threats outside the NATO area. Neither the commitment to
democratic values (preamble) nor the democratic decision-making procedures
as outlined in articles 2, 3, and 8 were controversial in the treaty negotiations.
Rather, the controversy between the U.S. Congress, o n the one hand, and the
administration together with the Western European governments, on the
other, focused o n the indivisibility of the mutual security assistance."
In sum, a liberal interpretation of NATO's origins holds that the Cold
War came about when fundamental ideas - worldviews - about the domestic
and the international order for the post-World War I1 era clashed. The
Western democracies perceived a threat to their fundamental values resulting
from the "Sovietization" of Eastern Europe. While the perceived Soviet threat
certainly strengthened the sense of community among the Western democrac-
ies, it did not create the collective identity in the first place. In light of the lib-
eral collective identity and its views of what constituted a "just" domestic and
international order, Stalin's behavior and his refusal to join the liberal order
confirmed that the Soviet Union could not be trusted. NATO then institu-
tionalized the transatlantic security community to cope with the threat. The
multilateral nature of the organization based on democratic principles and
decision rules reflected the common values and the collective identity.
Regulatory norms of multilateralism and joint decision making were not
just rhetoric covering up American hegemony, but shaped the interallied rela-
tionship. These norms were causally consequential for transatlantic security
cooperation during the Cold War, since they allowed for disproportionate
180 Widening Security
European influence on U.S. foreign policies. During the Korean war, for
example, norms of consultation had an overall restraining effect on American
decisions with regard to the localization of the war in Korea instead of its
extension into China, the non-use of nuclear weapons, and the conclusion of
the armistice negotiation^.^^
Western Europeans also had quite an impact on the early stages of nuclear
arms control, especially during the test ban negotiations when the British
in particular pushed and pulled the U.S. toward an agreement. As to NATO
decisions pertaining to European security, joint decision making quickly be-
came the norm. This has been shown to be true in most crucial cases, such as
decisions on nuclear strategy and deployments." The evidence also suggests
that the transatlantic relationship cannot be conceptualized as merely inter-
state relations; rather, the interaction patterns are significantly influenced by
transnational and transgovernmental coalition-building p r ~ c e s s e s . ~ ~
I will briefly discuss here two cases of interallied dispute over policies dur-
ing the Cold War. The first, the 1956 Suez crisis, probably constituted the most
severe transatlantic crisis of the 1950s, leading to a temporary breakdown of
the community. I argue, however, that reference to a conflict of interests alone
does not explain the interallied confrontation, in particular not the United
States' coercion of its allies. The transatlantic dispute can be better understood
in the framework of norm-guided behavior, as a dispute over obligations and
appropriate behavior in a security community. The second case, the 1962
Cuban missile crisis, was the most serious U.S.-Soviet confrontation during the
Cold War. I argue that U.S. decisions during the crisis cannot be explained
without reference to the normative framework of the transatlantic security
community.
the Suez Canal. Both sides frequently exchanged their diverging viewpoints
through the normal channels of interallied communication, which remained
open throughout most of the crisis. The U S . and its allies also knew that the
British were economically dependent on American assistance for the pound
sterling and for ensuring oil supplies to NATO Europe, should the crisis escal-
ate into war.""
Why, then, did the British a n d French w h o k n c w a b o u t their dependence
a n d the American disagreement with them, nevertheless go ahead with their
military plans a n d deceive Washington? H o w is their miscalculation of the
U.S. reaction to be explained?
The British and French governments reluctantly agreed to U.S. attempts
for a negotiated solution, first through a n international conference in London
in August 1956 and later through the proposal of a Suez Canal Users' Asso-
ciation (SCUA) in Septemher. But the allies were not seriously interested in
the success of these efforts, since their ultiniate goal was not only to secure
access t o the Suez Canal but also to get rid of Nasser. They endorsed the
American efforts to huy time and t o create a favorable climate of opinion in
the U.S. and the IJN.
At the same time, the governments in London and Paris perceived
Anlerican behavior during the crisis as a t best ambiguous, if not deceiving.
John Foster Dulles earned himself a reputation o f "saying one thing and
doing another," as Selwyn Lloyd, the British foreign minister, put it.6' There
are indeed indications that Dulles favored stronger action if Nasser rejected
reasonable proposals by the London conference. In September, for example,
Dulles discussed a proposal with the British prime minister t o set up an
Anglo-American working group that would consider means of weakening
Nasser's regime.''
The British sense of heing betrayed by the Americans increased dramatic-
ally as a result of Dulles's handling of his own SCUA proposal. Prime Minister
Anthony Eden viewed it as a means to corner Nasser further and to use his
expected rejection as a pretext for military action. But in a n attempt to damp-
en the British spin on the proposal and to make it more acceptable to the
Egyptians, Dulles declared that "the United States did not intend itself to try
to shoot its way through" the Suez Canal. As a result, Eden concluded on
October 8 that "we have been misled so often by Ihlles' ideas that we cannot
afford to risk m o t h e r misunderstanding. ... Time is not on our side in this
matter."": The British felt abandoned by the American government, which in
their eyes had violated the community ot purpose. L.ondon then chose to
deliberately deceive Washington about the ~nilitaryplans in October 19.56
without calculating the possible consequences. First, British officials thought,
in a somewhat self-deluding manner, that the U.S. did not want to hear about
the military preparations. Second, the British government was convinced in
some strange way that the U.S. would ultimately hack it and that allied action
would somehow force Washington to support what persuasion did not
accon~plish.Eden and his foreign minister reckoned that the choice was clear
for Washington if it had to take sides between Eg!.pt and its European allies.
182 Widening Security
What they perceived as Dulles's duplicity not only created a sense of betrayal
leading to the deception in the first place, it also helped to reassure them that
the Americans would ultimately support their action. In short, British deci-
sion makers firmly believed in the viability of the North Atlantic partnership.
They convinced themselves that the U.S. was bound by the community and
would ultimately value it. They relied on reassurances such as the one uttered
by Dulles ten days before the invasion of the Suez Canal: "I do not comment
on your observations on Anglo-American relations except to say that those
relations, from our standpoint, rest on such a firm foundation that misunder-
standings of this nature, if there are such, cannot disturb them."64
But Eisenhower and Dulles, despite all ambiguous statements, never
wavered in pursuing two goals: (a)to prevent the use of force and (b) to reach
a negotiated settlement guaranteeing safe passage through the Suez Canal.
The administration mediated between its allies and the Egyptians while at the
same time trying to restrain the British and French from resorting to military
action. But this does not mean that Washington had to use its overwhelming
power to force its allies to give up their adventure in Egypt. While the U.S.
opposition to the allied action was to be expected, the use of coercive power
was not. The allies could have agreed to disagree, since no supreme American
interests were at stake.65 The U.S. could have confined its opposition to con-
demnatory action in the UN General Assembly. In other words, U.S. decision
makers made choices as to how to react to the allied military action.
The American decision to play hardball with the allies was triggered
by a series of unilateral allied moves that violated norms of consultation
and jeopardized the community of purpose in the eyes of American leaders.
First, the British government decided at the end of August to get the
North Atlantic Council involved in the crisis, against the explicit advice of
the U.S. government. The allies apparently calculated that other Western
Europeans would support their military preparations, while the adminis-
tration thought that such a move would further complicate discussions at
the London c ~ n f e r e n c e . ~ ~
Second, the British government told the U.S. in late September of its
plans to refer the matter to the UN Security Council in order to preempt a
likely Soviet move. John Foster Dulles advised against it, since he thought
that such action would hinder his attempts to get the SCUA off the ground.
On September 23, the British and French referred the Suez issue to the Secur-
ity Council anyway.
Third, immediately before the invasion, American decision makers com-
plained that they were left in the dark about the British and French plans and
that the interallied lines of communications had gradually broken down. The
State Department asked the U.S. embassies in London and Paris to find out
what the two governments were up to. It received reassuring messages, since
the American embassies either were deliberately misled by their sources or
just second-guessed the allied governments. Intelligence information grad-
ually came in reporting Israeli plans to invade Egypt, with possible French
and British inv~lvement.~'When &e Israeli invasion started on October 29,
i I I Collective Identity in a Democratic Community 183
the U.S. administration had sufficient ~ n f o r m a t ~ oton suspect that France was
involved in the action. Rut until the facts could no longer be dented, ne~ther
F~senhowernor l h l l e s wanted to belleve that the Rrttlsh government had
decelved them. The sense of comrnun~tyled to w~shfulth~nkingby Amer~can
d e c ~ w mmakers. The U.5. then decided to bring the matter to the UN Secur~ty
Councd but w ~ told s by the all~esthat they would never support a UN move
agamst Israel. Cven then, tlsenhower d ~ dnot bel~cvcwhat he saw. He sent
an urgent message to P r ~ m eMm~sterEden, expressing his confusion and
demand~ng
that the UK and the US quickly and clearly lay out their present views
and intentions before each other, and that, come what may, we find some
way of concerting our ideas and plans so that we may not, in any real cri-
sis, be powerless to act i11 concert because of our misunderstanding of
each other.""
not regard the sort of confrontations experienced during the Suez crisis as
appropriate behavior among democratic allies.
I conclude, therefore, that the Suez crisis confirms liberal expectations
about discourses and practices when fundamental norms governing the rela-
tionship are violated. Norm violation challenging the sense of community
among the allies provides the key to understanding the interactions leading to
the confrontation, the clash, and the restoration ot' the community.
While the Suez crisis is a case of norm violation, the Cuban missile crisis
shows the collective identity of the security community in action. It repre-
sents the most serious U.S.-Soviet confrontation of the Cold War. While we
k n o w today that neither side was prepared t o risk nuclear war over the
Soviet missiles in Cuba, President John F. Kennedy and General Secretary
Nikita Krushchev were each afraid that the other would escalate the con-
flict in ways that might get o u t of control." Decision rnakers in Washington
were convinced that the supreme national interests of the United States
were a t stake. Why care about allies when national survival is endangered?
Indeed, the conventional wisdom about the Cuban missile crisis holds that
the allies were not sufficiently consulted, even though U.S. decisions directly
affected their security. Even senior officials in the administration, such as
Roger Hilsman, then director of intelligence in the State Department,
thought that the U.S. had chosen not to consult the allies in order to pre-
serve its freedom of action: "If you had the French Government and the
British Government with all their hangups a n d D e Gaulle's hangups we
would never have done it, it's as simple as that."'"
I argue that - except tor the first week of the crisis - there was far more
interallied consultation than most scholars assume and that key allies, par-
ticularly the British and Turkish governments, knew about details of deci-
sion making in Washington. Moreover, the fate o f the Western Alliance was
the most important foreign policy concern for U.S. decision makers, except
for the direct confrontation with Moscow a n d Cuba. Strategic arguments
about reputation a n d the credibility of commitments explain these concerns
only t o a limited extent. First, as argued above, realism is indeterminate
with regard to allied consultation when the alliance leader's survival is per-
ceived t o be a t stake. Second, decision makers did not worry a t all about
their reputation in the Organization of American States (OAS), for ex-
ample, the other U S - l e d alliance, which was even more directly involved in
the Cuban missile crisis. Rather, if we assume a security community of
democracies, strategic concerns about reputation and credibility immedi-
ately make sense. At least, realism does not offer a better understanding of
these concerns than liberal theory.
Rut the Cuban missile crisis also poses a puzzle for liberal propositions
about the allied community of values and norms, since the U.S. violated these
186 Widening Security
rules during the first week of the crisis. Whether or not to consult the allies
was discussed during the very first meeting of the Executive Committee
(ExComm) on October 16. Secretary of State Dean Rusk argued strongly in
favor of consultation and maintained that unilateral U.S. action would put the
allies at risk, particularly if the U.S. decided in favor of a quick air strike. The
decision not to consult, however, did not free decision makers from concerns
about the Europeans. Membership in the community of democracies formed
part of the American identity, as a result of which decision makers continued
to define U.S. preferences in terms of joint interests rather than unilaterally.
There was unanimous consensus that U.S. inaction with regard to the Soviet
missile deployment in Cuba would be disastrous for U.S. credibility vis-a-vis
its allies.7" The reputation of the U.S. government was perceived to be at stake,
in both domestic and alliance politics. Decision makers in the ExComm did
not distinguish between the two. As a result, the decision not to consult key
allies during the first week strengthened the position of the "doves" in the
ExComm, who argued that an air strike and military action against the Soviet
installations in Cuba without prior consultation would wreck NATO.
During the second week of the crisis, the Europeans not only were regu-
larly informed about the U.S. deliberations but had ample opportunities to
influence American thinking through a variety of bilateral and multilateral
channels. Among the key allies, only the British chose to take advantage of
these opportunities, while France and West Germany strongly supported
the U.S. courses of action. President Kennedy had almost daily telephone
conversations with Prime Minister Macmillan - which even many of his
staff members did not realize.
The British were the most "dovish" of the major allies. They made sure,
for example, that U.S. forces in Europe were exempted from the general
alert status of U.S. troops. When Macmillan was briefed about the crisis, he
assured the president that Britain would support the U.S., but he mentioned
that Europeans had lived under the threat of Soviet nuclear weapons for
quite some time. Since the British had internally concluded that the naval
blockade of Cuba violated international law, Macmillan demanded that the
U.S. made a good legal case in favor of the quarantine. He then wondered
about possible Soviet reactions against the blockade, including attempts at
trading American bases in Europe or even West Berlin for the withdrawal
of the missiles from Cuba.76Kennedy perceived Macmillan's message as the
"best argument for taking no action."
The British prime minister was as concerned as President Kennedy that
the crisis might get out of control, and he favored a cooperative solution.
On October 24, he told David Ormsby-Gore, the British ambassador to the
U.S.: "If I am right in assuming that the President's mind is moving in the
direction of negotiations before the crisis worsens, I think that the most
fruitful course for you to pursue at the present might be to try to elicit from
him on what lines he may be contemplating a ~ o n f e r e n c e . " ~ ~
He suggested that the U.S. should raise the blockade if the Soviets refrained
from putting more missiles into Cuba. When Macmillan phoned Kennedy
\ 1 i; i i I Collective Identity in a Democratic Community 187
later, he urged the president not to rush and asked whether "a deal" could be
done. When the president asked for Macmillan's advice on a possible invasion
of Cuba, the prime minister strongly recommended against it.'x
Whether the British proposals for de-escalation made a crucial difference
in the U.S. decision-making process is unclear. It is safe to argue, however, that
the close contact between Kennedy, Macmillan, and Ormsby-Gore during the
sccond week o f the crisis strengthened and reinforced the president's view.
Given Kennedy's convictions about the importance of the Western Alliance,
which he expressed time and again during the crisis, it was significant that a
key ally whom he trusted fully endorsed his search for a "deal."
Two alliance issues strongly influenced the president's thinking during the
crisis. The first was the fate of Berlin. The American commitment to Berlin
was one more reason to preclude inaction against the Soviet missiles in
Cuba. As the president put it during the second ExComm meeting, if the
Soviets put missiles in Cuba without an American response, Moscow would
build more bases and then squeeze the West in Berlin." Concerns about
Berlin also served as another restraining factor on US. decisions. The city's
exposure inside the Soviet bloc made it an easy target of retaliatory action
against American moves in Cuba. Kennedy worried about Berlin almost con-
stantly. Fear of Soviet action against the essentially defenseless city was one
reason for his decision in favor of the blockade and against more forceful
military action.""
Kennedy's personal and emotional commitment to Berlin was again appar-
ent during the crucial ExComm meeting on October 27, when he was faced
with the choice between an air strike and a "missile swap":
The Berlin issue symbolized the role of the North Atlantic Alliance in the
minds of U.S. decision makers throughout the crisis - precluding both inaction
and a rush to escalation. Concerns about the city and the fate of Europe in
general were causally consequential not by determining specific choices but by
constraining the range o f options available to decision makers. President
Kennedy and other ExComm members treated Berlin almost as if it were
another American city, for which American soldiers were supposed to die in
defense of their country. It did not seem to make a difference whether the fate
of Berlin or that of New York was at stake. Berlin symbolized the allied com-
munity and the values for which the Cold War was fought. It was the city's
very vulnerability to Soviet pressures that made it such a significant symbol for
the U.S. commitment to the defense of Europe.
188 Widening Security
While Berlin was an important concern of U.S. decision makers during the
crisis, it was peripheral to the solution to the crisis. The Jupiter medium-range
ballistic missiles (MRBMS) deployed under NATO arrangements in Turkey
and Italy became part and parcel of the crisis settlement. The Jupiter missiles
had been deployed following a 1957 NATO decision, on U.S. request. In the
meantime, the administration considered them dangerously vulnerable and
militarily obsolete. Kennedy would have preferred their withdrawal long
before, but the administration failed to persuade Turkey to give them up.
By the time of the Cuban missile crisis, the Jupiter missiles had become a
political symbol of alliance cohesion, of the U.S. commitment to NATO and
to Turkey in particular, which had just returned to democratic rule.
Not surprisingly, the Jupiter MRBMS became immediately linked to the
Soviet missile deployment in Cuba. Throughout the crisis, the administration
was divided over a "missile swap." The split cut across divisions between
departments and even led to differences of opinion within specific agencies
such as the State Department and the Pentagon. The topic of the Turkish
Jupiter bases also came up in various interallied discussions. A "missile swap"
was discussed in the British government, but London remained opposed to an
explicit "missile trade" throughout the crisis, despite its support for a "deal."
At the same time, the Turkish government began to raise concerns, particu-
larly when the Soviet ambassador in Ankara began to argue that Moscow
regarded the Jupiter missiles as its "Cuba." While Dean Rusk publicly denied
any connection between the Cuban missile crisis and any situation elsewhere
in the world, he hinted that, in the long run, disarmament negotiations could
deal with the location of weapons.x2
The administration also considered speeding up ~ l a n for s the Multilateral
Force (MLF), a sea-based nuclear force of American, British, and French sys-
tems under a joint NATO command, which had originally been proposed by
the Eisenhower administration. The U.S. then set its diplomatic machinery in
motion to anticipate how the allies would react to withdrawal of the Jupiter
missiles in such a conte~t.~"he U.S. ambassador to NATO, John Finletter,
responded along the lines already discussed in Washington. He argued that
Turkey regarded the Jupiter missiles as a symbol of the alliance commitment
to its defense and that no arrangement should be made without the approval
of the Turkish government. Finletter strongly advised against any open deal,
but then proposed a "small southern command multilateral seaborne force
on a 'pilot basis"' using Polaris submarines and manned by mixed U.S.,
Turkish, and Italian crews. Such an arrangement could allow the U.S. to offer
the withdrawal of the Jupiters to the soviet^.^^ While the U.S. ambassador to
Turkey cabled a gloomy assessment from Ankara, he also concurred that a
strictly secret deal with the Soviets was possible, together with some military
compensation for Turkey.85 These cables were discussed in the ExComm
meetings on October 27 and influenced the president's decisions.
Various U.S. ambassadors to NATO allies apparently talked to their
host governments about a secret "missile swap" despite an explicit directive
by Rusk not to talk about it. The networks provided by the transatlantic
I - I I Collective identity in a Democratic Community 189
the crisis was quickly escalating and that the U.S. might soon bomb the mis-
sile bases in Cuba, which could lead to war in Europe. He then told Dobrynin
with surprising openness that the U.S. was prepared to remove the Jupiter
missiles from Turkey but could do so only if the deal was kept secret, since
alliance unity was at stake.91 Khrushchev accepted the president's proposal,
thereby solving the crisis.
In sum, U.S. membership in an alliance of democratic states shaped the
process by which decision makers struggled over the definition of American
interests and preferences during the Cuban missile crisis. One could argue,
though, that the U.S. decisions were perfectly rational given the risks and
opportunities at hand and that reference to the transatlantic relationship is,
therefore, unnecessary to explain American behavior. The blockade, the non-
invasion pledge, and the secret "missile swap" were indeed perfectly rational
decisions. But a rational-choice account proves to be indeterminate unless
alliance considerations are factored in. The opposite arguments in favor of
escalating the crisis through an air strike or even an invasion were as rational
as those in support of the blockade or the "missile deal." Supporters of an
air strike correctly argued that the risks of escalation were minimal given
the overwhelming superiority of the U.S., both locally in the region and on
the global nuclear level. Only if Soviet retaliation against Europe was con-
sidered a problem could one make a rational argument against the air strike
and other escalatory steps. Berlin was the American Achilles heel during the
crisis, not New York City.
That U.S. decision makers did not distinguish between domestic and
European concerns, that they worried as much about the fate of Berlin as
about New York City, and that they regarded obsolete Jupiter missiles in
Turkey as major obstacles to the solution of the crisis - these puzzles make
sense if one assumes a security community of democratic nations, on behalf of
which the Kennedy administration acted. Membership in the Western Alliance
affected the identity of American actors in the sense that the "we" in whose
name the president decided incorporated the European allies. Those who
invoked potential allied concerns in the internal discourses added weight to
their arguments by referring to the collectively shared value of the community.
The alliance community as part of the American identity explains the lack of
distinction between domestic and alliance politics as well as the sense of com-
mitment that U.S. decision makers felt with regard to their allies. Reputational
concerns and the credibility of the U.S. commitment to NATO were at stake
during the Cuban missile crisis. But I submit that these worries can be better
understood within the framework of a security community based on collec-
tively shared values than on the basis of traditional alliance theory.
Since 1985, the European security environment has changed dramatically. The
Cold War is over, the U.S.-Soviet rivalry gave way to a new partnership among
former opponents, Germany is united, the Warsaw Pact and even the Soviet
Union have ceased to exist. Fundamental parameters in the international
I I 1 11 Collective identity in a Democratic Community 191
In response to the end of the Cold War, NATO has started changing its
force structure. lnstead of heavily armored and mechanized divisions,
member states are setting u p intervention forces with increased mobility
in accordance with the NATO decision to build an allied rapid reaction
corps for "out-of-area" purposes.y2
As to relations with the former Cold War opponents, the North Atlantic
Cooperation Council was instituted in 1991, linking the sixteen allies with
Eastern Europe and the successor states of the Soviet Union. Two years
later, these countries joined a "partnership for peace," creating institu-
tionalized ties between NATO's integrated military command structure
and the Cast European and Russian militaries. Current debates center
around how central Eastern European countries such as Poland, Hungary,
and the Czech Republic could join the alliance without antagonizing
Russia and jeopardizing its legitimate security concerns."
The alliance has started playing a subsidiary role in UN-sponsored inter-
national peacekeeping and peace-enforcement missions, such as in the for-
mer Y~goslavia.'~ It is remarkable in this context that the profound conflict
of interest among the Western powers with regard to the war in Bosnia-
Herzegovina has not at all affected NATO. Rather, the U.S., Britain, France,
and Germany worked hard to ensure that their disagreements over Bosnia
would not adversely influence the transatlantic alliance.
It should be noted, however, that this explanation has its limits. Liberal
theory as such does not suggest that democracies should behave cooperatively
toward democratizing states, as the West did toward the Soviet Union under
Gorbachev. The arguments put forward in the Kantian tradition pertain to
stable democracies. Since they relate to the social structure of international
relations, they cannot explain the specifics as well as the differences among
the Western responses to the Gorbachev revolution, i.e., agency.97But unlike
realism, a liberal argument about the transatlantic security community cor-
rectly predicts that these threat perceptions would wither away at some point
when former opponents democratize and thus begin entering the community
of liberal states.
The end of the Cold War, then, not only does not terminate the Western
community of values, it extends that community into Eastern Europe and,
potentially, into even the successor states of the Soviet Union, creating a
"pacific federation" of liberal democracies from Vladivostok to Berlin, San
Francisco, and Tokyo.98But liberal theory does not necessarily expect NATO
to last into the next century. It only assumes that the security partnership
among liberal democracies will persist in one institutionalized form or an-
other.99 If the democratization process in Russia gives way to authoritarian
nationalism, however, liberal theorists do expect NATO to remain the domin-
ant Western security institution and to regain its character as a defensive
alliance. In this case, NATO would be expected quickly to extend its security
guarantee to the new democracies in central Eastern Europe. But institution-
alist arguments suggest that a transformed NATO will remain the overarching
security community of the "pacific federation." It is easier to adjust an already
existing organization, which encompasses an elaborate set of rules and
decision-making procedures, to new conditions than it is to create new institu-
tions of security cooperation among the liberal democracies in the Northern
Hemisphere. The OSCE - not to mention the West European Union - would
have to be strengthened much further until they reach a comparable degree
of institutionalization.
NATO also provides a unique institutional framework for Europeans
to affect American policies. Liberal democracies successfully influence each
other in the framework of international institutions by using norms and joint
decision-making procedures as well as transnational politics. Playing by the
rules of these institutions, they do not just constrain their own freedom of
action; they also gain access to the decision-making processes of their part-
ners. Reducing the institutional ties might create the illusion of independence,
but it actually decreases one's impact.
I have argued in this essay that traditional alliance theories based on realist
thinking provide insufficient explanations of the origins, the interaction pat-
terns, and the persistence of NATO. The North Atlantic Alliance represents
an institutionalized pluralistic security community of liberal democracies.
I' I I 1 1 Collective Identity in a Democratic Community 193
Democracies not only do not fight each other, they are likely to develop a col-
lective identity facilitating the emergence of cooperative institutions for spe-
cific purposes. These institutions are characterized by democratic norms and
decision making rules that liberal states tend to externalize when dealing with
each other. The enactment of these norms and rules strengthens the sense of
community and the collective identity of the actors. Domestic features of lib-
eral democracies enable the community in the first place. But the institution-
alization of the community exerts independent effects on the interactions.
In the final analysis, then, democratic domestic structures, international insti-
tutions, and the collective identity of state actors do the explanatory work
together.
But do the findings pertaining to the North Atlantic Alliance hold up
with regard to other alliances and cooperative institutions among democ-
racies? Comparisons can he made along two dimensions: the degree of insti-
tutionalization of the comn~unityand the extent to which collective identities
have developed among its members. The only international institution that
appears to score higher than NATO on both dimensions is the Euvopearz
Union (EU).""' While it is less integrated than NATO with regard to security
and foreign policy making, the EU features ~miquesupranational institutions
such as the European C h ~ m i s s i o nand the European Court of Justice. The
EU member states also coordinate their economic and monetary policies to
an unprecedented degree."" As far as collective identity is concerned, there
is a well-documented sense of common Europeanness among the elites of the
continental member states that partially extends into mass public opinion.
Interaction patterns within the EU closely resemble the transnational and
transgovernmental coalitions that have been found typical for decision mak-
ing in NATO.""
Compared with NATO and the EU, the C1.S.-Iapanese security relirtiovr-
ship appears to represent an interesting anomaly, in the sense that it is highly
institutionalized, but the collective identity component seems to be weaker.'"'
lapanese security was more dependent on the U.S. during the Cold War than
were Western Europe and even Germany. Strongly institutionalized trans-
national and transgovernmental ties developed among the military and the
detense establishments of the two countries. Apart from the elite level of the
governing party, however, the security relationship remained deeply con-
tested in Japanese domestic politics during the Cold War. As a result, the
U.S.-Japanese security cooperation certainly qualifies as a democratic alliance
establishing norms of consultation and compromise-oriented decision mak-
ing similar to those of NATO. But given the lack of collective identity, it is
less clear whether this alliance constitutes a "pluralistic security community"
in Deutsch's sense. The U.S.-Japanese example, then, shows that there is
some variation with regard to both institutionalization and identity compon-
ents in alliances among democracies.
In contrast, identity politics appears to be particularly strong in the U S -
lsraeli security relationship, as Michael Barnett argues. Again, the variation,
compared with NATO and the U.S.-Japanese alliance, seems to pertain to
the identity component, while the American alliance with Israel is as highly
194 Widening Security
Author's Note
This essay summarizes, builds upon, and expands arguments developed in Thomas Risse-
Kappen, Cooperation Among Democracies: The European Influence on U.S. Foreign Policy
(Princeton: Princeton University Press, 1995). Participation in the Social Science Research
Council - sponsored project under the directorship of Peter Katzenstein has greatly inspired
my thinking o n the subject of norms, identity, and social constructivism. For comments o n the
draft of this essay, I am very grateful t o the project participants, in particular Peter Katzenstein.
I am also indebted to Mark Laffey, David Latham, Fred H. Lawson, Stephen Walt, Steve
Weber, and several anonymous reviewers for their criticism and suggestions.
Notes
1. See, for example, Hans J. Morgenthau, Politics Among Nations: The Struggle for Power
and Peace, briefed. (1948;reprint, New York: McGraw Hill, 1993); Kenneth N. Waltz, Theory
1111 ( Collective Identity in a Democratic Community 195
influenced. ... The word that most accurately describes their behavior is not domination or
even bargaining, but unilateralism" (Snyder, "Alliance Theory," p. 121).
13. Details in Risse-Kappen, Cooperation Among Democracies. See also Fred Chernoff,After
Bipolarity (Ann Arbor: University o f Michigan Press, 1994);Helga Haftendorn, Kemwaffen und
die Glaztbwiirdigkeit der Allianz (Baden-Baden: Nomos, 1994); Elizabeth Shenvood, Allies in
Crisis: Meeting Global Challenges to Western Security (New Haven: Yale University Press, 1990).
14. For evidence, see Bruce Bueno de Mesquita, The War Trap (New Haven: Yale University
Press, 1981); Stuart A. Bremer, "Dangerous Dyads: Conditions Affecting the Likelihood o f
Interstate War, 1816-1965," Journal of Conflict Resolution 36, no. 2 (1992):309-41.
15. On these propositions, see, for example, Michael Handel, Weak States in the International
System (London:Frank Cass, 1981);Holsti, Unity and Disintegration in International Alliances;
Glenn Snyder, "The Security Dilemma in Alliance Politics," World Politics 36, no. 4 (July1984):
461-96; Jan F. Triska, ed., Dominant Powers and Subordinate States (Durham: Duke University
Press, 1986).
16. At a U.S. Senate hearing in November 1990. Quoted from Gunther Hellmann and
Reinhard W o l f ,"Neorealism, Neoliberal Institutionalism, and the Future o f NATO," Security
Studies 3, no. 1 (Autumn 1993):3-43, 17. See also John J .Mearsheimer, "Back t o the Future:
Instability in Europe After the Cold War," International Security 15, no. 1 (1990):5-56.
17. See Charles Glaser, " W h y NATO Is Still Best: Future Security Arrangements for
Europe," International Security 18, no. 1 (Summer 1993):5-50.
18. As Kenneth Waltz himself put it, "With the aid o f a rationality assumption one still
cannot, from national interest alone, predict what the policy o f a country might be" (Waltz,
"Reflections on Theory of lnternational Politics: A Response to My Critics," in Robert
0. Keohane, ed., Neorealism and Its Critics, pp. 322-45 [New York: Columbia University Press,
19861, p. 331). On the indeterminate nature o f realism, see also Robert 0. Keohane, "Realism,
Neorealism, and the Study o f World Politics," ibid., pp. 1-26; Stephen Haggard, "Structuralism
and Its Critics: Recent Progress in International Relations Theory," in Emanuel Adler and Beverly
Crawford, eds., Progress in Postwar International Relations, pp. 403-37 (New York: Columbia
University Press, 1991).
19. John G. Ruggie, "Multilateralism: The Anatomy o f an Institution," lnternational
Organization 46, no. 3 (Summer 1992):561-98, 592.
20. For efforts at systematizing a liberal theory o f international relations, see Ernst-Otto
Czempiel, Friedensstrategien (Paderborn: Schoningh, 1986), pp. 110-67; Doyle, "Liberalism
and World Politics"; Keohane, "International Liberalism Reconsidered"; Andrew Moravcsik,
Liberalism and International Relations Theory, 2d ed., Working Paper Series (Cambridge:
Center for lnternational Affairs,Harvard University, 1993);Russett, Grasping the Democratic
Peace. My point o f departure is, thus, what Jepperson, Wendt, and Katzenstein call "neolib-
eralism" in "Norms, Identity, and Culture in National Security," essay 2 in this volume. But
drawing on insights from social constructivism, I argue that a liberal theory o f international
relations properly understood should be located in the upper-right - "sociological" - corner o f
figure 1 in the Jepperson, Wendt, and Katzenstein essay.
21. See Immanuel Kant, " Z u m ewigen Frieden: Ein philosophischer Entwurf" (1795),in
Wilhelm Weischedel, ed., lmmanuel Kant: Werke in sechs Banden (Frankfurt am Main: Insel-
Verlag, 1964),6: 193-251.
22. For the state o f the art, see Russett, Grasping the Democratic Peace. Two recent criticisms
o f the "democratic peace" finding seem to be empirically flawed. See Christopher Layne, "Kant
or Cant: The Myth o f the Democratic Peace," International Security 19, no. 2 (Fall 1994):5 4 9 ;
David E. Spiro, "The Insignificance o f the Liberal Peace," International Securrty 19, no. 2 (Fall
1994): 50-86. For the rebuttals, see John M. Owen, "How Liberalism Produces Democratic
Peace," International Security 19, no. 2 (Fall 1994):87-125; Bruce M. Russett, "The Democratic
Peace: And Yet It Moves," Intertzational Secttrity 19, no. 4 (Spring 1995): 164-75.
23. See Owen, "How Liberalism Promotes Peace"; Thomas Risse-Kappen, "Democratic
Peace -Warlike Democracies? A Social Constructivist Interpretation o f the Liberal Argument,"
European Journal of International Relations 1 , no. 4 (1995):489-515.
I:I ,r ? pix 11 Collective Identity in a Democratic Community 197
60. See Diane K. Kunz, "The Importance of Having Money: The Economic Diplomacy of
the Suer Crisiu," in 1.ouis and Owen, Sstcz 1956, pp. 2 15-31. 2 18-19; Kunz, Thc Economic-
Ilrplortzrrcy of the Suez Crrsrs.
61. Selwyn l.lo>d, Suez 1956: A Personal Acco~tnt(London: lotlathan Cape, 19781, p. 38.
62. See "Menlorandurn ot Conversation at Kritish Foreign Offrce," Septernher 2 1, 19.56,
in U.S. Department of State, b o r r i p Kelirtrons of the linitcd Stirtcs, l9.Y.5-19.(7 Ihere~fter
FK U S 19.YT-19.571 (Washington, D.(:.: 11.5. Government Pr~ntingOffice, 1990), 16: 548-50.
6 3 . .'EJc.rl to S c l w y n I Ioyd," C)cr<,hcr 8, clucxcJ in Wnl. R<,gcr Imois, ''DulIes, Suer, <xr,J
the Br~tish,"in Richard Inlmerrnann, ed., / o l ~ nFostw Dulles a t d t l ~ eDiplomizcy of the C:old
W a y (Princeton: Pr~ncetonUn~versitvPress, 19901, pp. 1 3 3 4 8 , IS 1. For the Dulles quotes, cf.
[hid., pp. 149, 150; Rohert Bow~e,"Eisenhower, Dulles, and the sue^ Cr~sis,"in 1.ou1s and
Owen, Sucz 19.56, pp. 189-2 14, 204-5.
64. "1)~illest o Sclwyn l.loyd," October 19, FRIJS I9.5T-1957, 16: 760.
65. U S . anticolonialism, tor example, does not e x p l a ~ nAmerican behavior. During the
Falklands/hlalvinas war in 1982, tor example, the Keagan admin~srrariontacitly backed the
Br~tisheffort t o regain the islands even though it remained officially neutral in light o f its
alliance ohl~gationst o both A r g e n t ~ n ,(OAS)~ and Brita~n.
66. See "Memorandum for Secretary of Stare," August 28, FRUS 19.55-19.57, 16: 309;
"Secretary of State to U.S. Ernh,lssy UK," August 30, ihid.. pp. 3.39-40; "Dept. o f State to cer-
t a n diploniatic missions," August 31, ihid., pp. 344-45.
67. See "Depr. ot State t o U.S. Embassy UK," October 26, FRLIS 19Y5-19.57, 16: 790;
"U.S. Frnt~assyIsr,lrl t o I k p t . of State," October 26, ibid., p. 785; "Dept. of St'ire t o lJ.S.
Ernl~assyFrance," Octoher 29, ihid., pp. 815-16. For the following, see "Memorandum of
Conversation at I k p t . of State." Ocroher 28, ihid., pp. 803-4; "1I.S. F.mbassy UK t o Ilept. of
State," October 29, ihid., pp. X 17-20.
68. "Eisenhower t o Eden," Octoher 10, FRUS 1955-IW7, 16: 848-50. See 3 1 ~
"Memorandum of Conversat~onat the White House," Octoher 29, [hid., pp. 833-39; editor-
lal note, ibid., pp. 840-42; Bowie, "Eisenhower, Dulle5, and the Sue7 Crisis," pp. 208-9.
69. "Memorandurn of Conversar~ona t the Depr. of Stare," October 30, I-RIJS 19.5i-1c).57,
16:867-68. For d ~ kisenliower
c quotes, see "Mernorandunl of (hnference wlth the President,"
October 30, ihid., p. 873; "hlessage from Eisenhower to Eden," Octoher 30, ibid., p. 866;
"Mernoranduni of Conversation with the President," Octoher 30. ihid., pp. 851-5.5.
70. "1,orci ( : ~ c c ~ ,IlJK
i ,lnihassador in Waahingtonl t o FOI-e~gn Office," Novemhcr 28,
1956, quoted iron1 Louis, "Dulles, Suez, ,lnd the British," pp. 155-56.
71. "Memorandum of Conversation hetween the President ,lnd Dulles," (my emphasis!),
November 12, ER1I.S 1'1.5 5-1057, 16: 1 1 12-14. For the preceding quote, see "Memorandum
o f Telephone Con\,er\ation hvtween the President and Sir Eden," November 7, ibid., p. 1040.
72. See Sherwood, Allics Irl (:rrsrs, pp. 88-94.
73. For details, see Rich,lrd N. 1.ehow and Janice G. Ste~n.We All Lost t l ~ c(;old WUV
(Princeton: Princeton Un~versityPress, 19941, pp. 19-145. See ~ l s oMichael Beschloqs, 7%c.
Crisls Years (New York: Edw,ird Burl~ngameBooks, 199 I), pp. 4 3 1-575; James Blight, T l ~ c
Shattered (:rystid R d l (Savage, Md.: Rowman and 1.ittlefield. 1990); James Blight and David
Welch, O n I ~ J C Ljr~nk (New York: Hill and Wang, 1989); McGeorge Bundy, Dcrngcr ~ r r l t f
Stirvizd (New York: R,indom House, 19881, ch. 9; L.iurence CIi,ing and I'eter Kornbluh, eds.,
Thr Cuhan Missdc Crisis, 1962 (New York: New Press, 1992); Raymond Garthoff, Reflcrtiotrs
o n thr C11hm1MISS~IC Cris~s.rev. ed. (Washington, D.<:.: Krookings Institution, 1989).
74. "Interview with D a v ~ dNunnerly," In Nationd Security Archive, The Gdmz Mrss~l(~
Crisis, 1962 Ihereafter NSA: CMCI, microfiche collect~on(Wclsliington, I>.(:.: Chadwyck-
He'iley, 1990), Lhc. 032.5 1 . O n the alleged lack o f consultation, see Richard Kosecrance,
Defense of thc Kcwlnr (New York: Columbia Un~versityPress, 19861, p. 13; Sherwood, Allres
in Crisis, p. 122; 1. F. Stone, "Wh'it I'rice Prestige?" in Rolwrr A. Divine, ed., Thc Crrhnn
M~ssrleCrisrs, pp. 15 7-65 (Chicago: Quadrangle Books, 197 I ] .
7.5. As Koherr McNarnara put it later, "For all kinds of reasons, especiall) t o preserve
unity in the alliance, we had t o indicate t o the Soviets that we weren't going to accept the pres-
ence o f offensive miss~lesin <:ub,~"(quoted from Blight and Welch, O Hthe Hrink, p. 188). See
a l w "Ex(:omm Tr,lnscripts," Octoher 16, 1962, NSA: CMC, Lhc. 00622.
200 Widening Security
76. See Harold Macmillan, At the End of the Day, 1961-1963 (London: Macmillan,
1973), pp. 184-90. For the following quote see "507th NSC Meeting," October 22, NSA:
CMC, Doc. 00840.
77. "Foreign Office to Embassy Washington," October 24, in Public Records Office,
London, Diplomatic Correspondence Files [hereafter PRO: FO] 3711162378.
78. See Macmillan, At the End of the Day, pp. 198-203,202-4. See also Lebow and Stein,
We All Lost the Cold War, p. 121.
79. "White House Tapes and Minutes of the Cuban Missile Crisis," International Security
10, no, 1 (Summer 1985): 164-203, 185.
80. See, for example, the telephone conversation Macmillan-Kennedy, October 26, in
Macmillan, At the End of the Day, pp. 209-11.
81. "October 27, 1962: Transcripts of the Meetings of the ExComm," International
Security 12, no. 3 (Winter 1987188): 30-92, 55, 58.
82. For details, see "Ambassador Hare, Ankara, to State Dept.," October 23, NSA: CMC,
Doc. 01080; "Hare to State Dept.," October 24, ibid., Doc. 01260; "Rusk, Circular Cable,"
October 24, ibid., Doc. 01140; "Rusk to US Embassies, West Europe," October 25, ibid., Doc.
01294; "Rusk to US Embassy, Ankara," October 25, ibid., Doc. 01298.
83. "Dean Rusk to US Embassies to NATO and to Turkey," October 24, NSA: CMC, Doc.
01138.
84. "Finletter to State Dept.," October 25, NSA: CMC, Doc. 01328.
85. "Hare to State Dept." (Section I ) , October 26, NSA: CMC, Doc. 01470; "Hare to
State Dept." (Sections 2 and 3), October 26, NSA, Nuclear History Documents.
86. See "Embassy Ankara to Foreign Office," October 28, PRO: FO 3711162382; "Embassy
Ankara to Foreign Office," October 28, ibid. 3711162381, On discussions at NATO's headquar-
ters see "Finletter to State Dept.," October 28, NSA: CMC, Doc. 01602.
87. According to "Embassy Washington t o Foreign Office," October 27, PRO: FO
3711162382.
88. "October 27, 1962: Transcripts," p. 39.
89. Bromley Smith, "Summary Record of ExComm Meeting," October 27, NSA: CMC,
Doc. 01541. For the following see "October 27, 1962: Transcripts."
90. See Bundy, Danger and Survival, pp. 432-34;.
91. See Dobrynin's cable to Moscow, October 27, in Lebow and Stein, We All Lost the
Cold War, pp. 524-26.
92. If the alliance was disintegrating, one would expect the members to concentrate on the
defense of their national territories rather than building light and mobile forces. See Hellmann
and Wolf, "Neorealism, Neoliberal Institutionalism, and the Future of NATO," p. 22.
93. For details, see "North Atlantic Cooperation Council Statement," N A T O Press Service,
December 20,1991; Stephen Flanagan, "NATO and Central and Eastern Europe," Washington
Quarterly 15, no. 2 (Spring 1992): 141-51; "'Partnerschaft fiir den Frieden' mit Osteuropa.
Aber keine konkreten Zusagen fiir Mitgliedschaft," Suddeutsche Zeitung, January 11, 1994;
"NATO Chiefs Hail New Era, But War Still Casts Clouds," International Herald Tribune
[hereafter I H T ] , January 12, 1994; "Clinton Hints NATO Would Defend East from Attack,"
IHT, January 13, 1994.
94. See, for example, "Report by Ad-hoc Group of the North Atlantic Cooperation
Council on Cooperation for Peacekeeping," NATO Press Service, June 11, 1993; Hellmann
and Wolf, "Neorealism, Neoliberal Institutionalism, and the Future of NATO," p. 25.
95. See also Steve Weber, "Does NATO Have a Future?," in Beverly Crawford, ed., The
Future of European Security (Berkeley: University of California at Berkeley, Center for
German and European Studies, 1992), pp. 360-95. Emanuel Adler, "Europe's New Security
Order," in ibid., pp. 287-326, shares the assessment but comes to different conclusions regard-
ing the desirability of NATO.
96. On this point, see Daniel Deudney and G. John Ikenberry, "The International Sources of
Soviet Change," International Security 16 (Winter 1991192): 74-1 18; Henry Nau, "Rethinking
Economics, Politics, and Security in Europe," in Richard N. Perle, ed., Reshaping Western
Security, pp. 11-46 (Washington, D.C.: American Enterprise Institute Press, 1991).
i:ii~
i I\ spl ~ v i Collective Identity in a Democratic Community 20 1
Introduction
R
ecent contributions to the debate over 'redefining security' or the
'renaissance of security studies' have called into question how the con-
cept of security should be defined, but have virtually ignored the issue
of whether or not the 'redefinition' or 'renaissance' has any analytic utility or
relevance to the security policies of the world beyond the advanced industrial
states of the 'North' (Booth, 1991; Haftendorn, 1991; Kolodziej, 1992; Walt,
1991b).With only a few exceptions (Ayoob, 1989,1995; Buzan, 1991), most
prominent analyses of security in the so-called 'Third World' have been
explicit extensions or amendments of concepts and models drawn from the
Western experience (Ayoob, 1995; Barnett and Levy, 1991; David 1991;
Levy and Barnett, 1992; Walt, 1987). Also with few exceptions (Ball, 1988;
Deger and West, 1987; Harkavy and Kolodziej, 1982; Neuman, 1984), little
actual research has been done on the external and internal factors that shape
security policies in the developing world. Hence the adequacy of Western
approaches to the 'quest for security' in the developing world can easily be
called into question at the conceptual level, but until the contours of an
alternative research agenda are more fully developed, such a critique will
remain purely theoretical.
This article moves towards such a research agenda by sketching a frame-
work for studying the quest for security in the developing world that goes
beyond the confines of mainstream security studies, and by demonstrating
its utility via a preliminary examination of the process of state formation
and 'military development' in the contemporary Middle East. My central
theses can be summarized as follows -
The language of these propositions does diverge from the 'threat, use and
control of military force' formulations central to mainstream conceptions of
security studies. My argument does not, however, claim that we should 'rede-
fine' security by somehow transcending or ignoring its intimate connection
to conflict, violence and force. In fact my goal is to engage more fully the
traditional concerns of security studies with the role of institutions and
instruments of organized violence in political life, but to d o so by focusing
attention on a wider range of elements of the 'quest for security' than are
usually treated in the literature. The goal of this article is not to sketch a
deductive model that can generate 'testable hypotheses', but rather to take
the prior step of sketching an 'explanatory logic' or framework that can be
usefully contrasted with the logic underlying the predominant approach to
understanding the quest for security in the developing world.
I begin with a brief overview of the existing International Relations litera-
ture on security in the developing world. Sections two and three then elab-
orate the foundations for a broader conception of sccurity, based upon the
literature on state fornlation and institutions of organized violence, and the
concept of 'military development' as the dynamic and specifically security-
oriented aspect of this process. Sections four and tive sketch a preliminary
case study of military development in the modern Middle East that demon-
strates the utility and scope of this approach for understanding the quest for
security along its regional, state and societal dimensions.
within the security dilemma, and acting as utility maximizers who autono-
mously define their own interests. Under this rubric 'security studies is
defined as the study of the threat, use, and control of military force ... it
explores the conditions that make the use of force more likely, the ways that
the use of force affects individuals, states and societies, and the specific pol-
icies that states adopt in order to prepare for, prevent, or engage in war' (Walt,
1991b: 212, emphasis in original). Non-military phenomena are excluded on
the grounds that their inclusion 'would destroy [the] intellectual coherence [of
the field] and make it more difficult to devise solutions to any of these
important problems', and that 'it would be irresponsible ... to ignore the cen-
tral questions [of war and peace] that form the heart of the security studies
field' (Walt, 1991b: 213). This definition appears broad, for it not only
engages questions of the causes of war and conditions of peace, but also
seems to make room for studying the consequences of war-making and war-
preparation. In this sense, it goes beyond most conceptions of 'strategic
studies', which have been usually understood to deal narrowly with the first
part of the definition (Buzan, 1991: 23-5). But there is no doubt that it
remains constrained within a state-centric conception in which the threat of
violence is central: as Joseph Nye and Sean Lynn-Jones point out, 'a subject
that is only remotely related to central political problems of threat perception
and management among sovereign states would be regarded as peripheral'
(Nye and Lynn-Jones, 1988: 7).
The practical result of this has been that the most prominent debates on
security in the developing world have focused on a narrow range of issues.
The central orienting point has been the work of scholars such as Stephen
Walt, who has elaborated a structuralist account of interstate alliance for-
mation behaviour that is developed from Kenneth Waltz's balance of power
theory. He postulates that states 'balance against the states that pose the
greatest threat', whether or not these are the most powerful states in the sys-
tem (1987: 263), and has applied balance of threat theory to Southwest Asia
and the Middle East (Walt, 1987, 1991a). Walt has concluded that balancing
behaviour has been more prominent than 'bandwagoning', in these regions
throughout the cold war, once one takes his expanded conception of 'threat'
into the account of state behaviour.
There have been three main lines of challenge to this structuralist account.
The work of Steven David, Michael Barnett and Jack Levy has retained the
focus on alliance formation, but drawn domestic or internal factors into the
analysis. David argues that the central feature of Third World state behaviour
is 'omnibalancing', by which state rulers balance against both external and
internal threats to their rule, often 'appeasing other states ... in order to
counter the more immediate and dangerous domestic threats' (David, 1991:
236). Levy and Barnett go beyond this still narrow focus on political
threats, and argue 'that the most frequent threats to the domestic security
of Third World elites tend to originate in weaknesses in the domestic political
economy', with the goal of state managers being to balance domestic political
stability, economic considerations and external security threats (Levy and
Barnett, 1992: 23).
L Insecurity and State Formation in the Global Military Order 205
Another line of challenge that overlaps this argues that the security
problematic of most states in the developing world is conditioned by their
fundamental institutional and political weaknesses (Ayoob, 1989, 199 1,
1995; Azar and Moon, 1984; Korany, et dl., 1993; Sayigh, 1990). Most
developing world states are still weak qua states, and lack a basic societal
consensus over the core values that would structure political life: the nature
of governing institutions, the legitimacy of the state or the foundations of
political order (Ruzan, 199 1: 112-14). Hence threats emerge not only from
other states, but from within the state, or from groups that cut across state
boundaries. Security from the threat of organized violence remains a cen-
tral preoccupation, but it is subsumed under the hroader umbrella of vul-
nerabilities that 'threaten state boundaries, institutions or regime survival'
(Ayoob, 1991: 259), which must be understood in the context of the process
of state-building and the incorporation of post-colonial states into the con-
temporary world order.
The third challenge, represented by scholars such as Thomas Homer-
Dixon or Jessica Tuchman Mathews, has attempted to broaden the concept
of security (in the developing world and elsewhere) by arguing that external
threats of organized violence are far less urgent than other potential threats to
human well-being and survival, such as environmental degradation, refugee
flows, economic deprivation or communal conflicts (see, inter alia, Homer-
Dixon, 1991, 1994; Iaescher, 1992; Thomas, 1987; Tuchnian Mathews,
1989). But insofar as most scholars under this rubric have presented little
more than a 'shopping list' of possible threats to security, they have not shown
how security from violence, from environmental threats or from economic
deprivation (tor example) can be considered analytically similar or can be
integrated into a coherent 'model' for comprehending the security problem-
atic of the developing world.' Those who do attempt to construct more
robust analytic explanations, such as Homer-Dixon, end up conceding that
the central issue for security studies should remain the potential for violent
interstate conflict, although they do contribute a richer analysis of the poten-
tial causal chains that can lead to it (Gizewski and Homer-Dixon, 1995;
Homer-Dixon, 199 1, 1994; Percival and Homer-Dixon, 1995).
The work of almost all of these scholars ultimately revolves around, or
is oriented towards, questions generated by the neorealist security s t ~ ~ d i e s
problematic outlined above. Walt focuses entirely on the systemic dynamic
of interstate relations between rational actors, and attempts to test hypoth-
eses concerned with balancing or bandwagoning behaviour. His critics (Lhvid,
Ixvy and Barnett) incorporate domestic factors, hut their central analytic
goal is still to explain international alliance formation, rather than a hroader
range of outcomes or consequences of the quest tor security. Ayoob goes
somewhat further, by adding the historical dimension of state formation, but
he too remains committed to a state-centric vision that keeps the state and
its institutions as the primary referent point for security. Factors such as
famine or environmental degradation can become security issues, h u t only if
s ~ 'vi~lnernbilities
~ h ... threaten ... to bring down or significantly weaken
state structures, both territorial and institutional, as well as the regimes that
206 Widening Security
0 what have been the most important sources of insecurity driving the
development and use of institutions of organized violence in postcolorlid
Middle Eastern states/societies?
how have patterns of military development within Middle Eastern states
had an impact on the three dimensions of s e c ~ ~ r i outlined
ty above?
into the global security order. My analysis, however, will concentrate on the
Middle East, since it presents in a stark form many important features. By
virtually any indicator one chooses, the Middle East is the most highly mili-
tarized region of the globe. Other states may have larger armies, arsenals or
defense budgets, but in comparative terms (relative to population or wealth),
Middle Eastern states rank at or near the top on many indices. Table 1 sum-
marizes some of these figures. Further, the importance of interstate conflict
makes the region a 'hard case' for my argument, since if I can demonstrate
(even in a preliminary fashion) that factors other than interstate conflict
need to be adduced in order to explain patterns of insecurity and military
development in the region, then its utility in other regional contexts will be
more securely established. Finally, the degree of state terror and repression
in many states of the region is also high and organized violence (covert or
overt) has been pervasive in political and social life.
The first step towards challenging a structuralist account of state policy
is to establish, even provisionally, that the expansion of the military cap-
abilities of Middle Eastern states occurred in response to both internal and
interstate imperatives. Until independence, most Middle Eastern states pos-
sessed only small 'constabulary' forces, suitable for maintaining internal
order and supporting the regime, and dependent upon the external patron
for training, materials and leadership. In Iraq, for example, Britain under-
took after 1921 to train the Iraqi officer corps (which had inherited most
of its personnel from Ottoman service) and to support the army with spe-
cific British-led forces (the Assyrian levies) and the Royal Air Force.
and a force for national integration (Abbas, 1989: 203-7; Hemphill, 1979).h
The first military coup occurred only three years later. In Syria, the early
rapid expansion o f the armed forces in the mid-19.50s coincided with their
use in the crushing of unrest and revolt among the Druzes, and to a lesser
extent the Alawis (Ma'oz, 1972: 399). A similar pattern was manifest in
Saudi Arahia, albeit somewhat earlier. The lkhuun (religious) and tribal
forces of Ibn Saud conquered and unified most of the diverse tribes of the
peninsula in the 1920s hefore formal statehood was achieved in 1932. As
Nadav Safran (1985: 59) has argued, 'Ibn Saud's basic security concern ... in
the period up to World War 11 ... was internal rather than external threats, and
the practical problem was money.' He concludes that between 30 and 50% of
state revenues were spent on defence and security. The armed forces fell into
disuse and disrepair until the 1950s, when the political threat from Nasserist
Egypt to the Saudi monarchy (including coup attempts) triggered the estab-
lishment of a loyal armed force which was quickly expanded (with American
assistance) throughout the late 19.50s (Cordesman, 1984: 92-1 05; Safran,
1985: 103-10).
In many cases, armed forces rhetorically patterned on Western models (to
defend the state against external threats to its territorial integrity and national
interests) evinced a deeper concern with internal security. Their primary mis-
sion has tended to be the defence of a particular ruling elite against internal
threats to its control that rise from its narrow base o f support, or from a frac-
tured polity. In some cases these internal and external security missions were
fused for the entire armed forces; in others, strong 'royal guard' or elite forces
were tasked with maintaining regime security, while opposition groups were
shunted into 'gendarmerie' or semi-regular forces. For example, in Jordan
after the coup attempt of 1957, the regime depended upon loyal Royal Guards
brigades, and when the largely Palestinian national guard (which was as large
as the regular army) was incorporated into the regular army in 196.5, only
4 0 % of its men were accepted (Hurewitz, 1969: 323; Safran, 1969: 440).
The regime still possesses a 10,000-strong para-military force (International
Institute for Strategic Studies, 1994). In Saudi Arabia, 'for internal defense the
Saudi clan continued placing primary confidence in the tribal forces [the White
Army]', which were as large as the regular forces (Hurewitz, 1969: 251). The
White Army (renamed the National Guard in 1963) was also an important
means of maintaining loyalty to the Saudi regime and funnelling money to
tribal and village leaders. It was modernized in the early 1970s, and through
the 1970s and 1980s it was more than two-thirds the size of the regular
forces. In the 1970s the National Guard had 25,000 men, compared to reg-
ular forces of 35-45,000; in 1994, it had 57,000 active members (with 20,000
tribal levies) compared t o a regular force of 104,000 (Cordesman, 1984:
173-8, 218-21, 229; International Institute for Strategic Studies, 1994). In
Syria, Hafez Asad's brother controlled (between 1971 and 1983) a 50,000-
man elite force (savaya al-difa') tasked with protecting the regime; this was
later supplemented with a 10,000 strong Presidential Guard (Drysdale, 1985:
2 16 widening Security
248; Middle East Watch, 1991: 38-9). The regime also relies upon various
special forces and 'political' military units, although the Defence Brigades
have been subsequently reduced in size after they threatened regime stability.
In Iraq, the Republican Guard, which was created in 1963 as a sort of 'elite
corps of the regime', was supplemented later by the 'People's Army', a 75,000
strong (in 1979) adjunct of the Ba'ath party itself (Farouk-Sluglett and
Sluglett, 1990: 93-4, 184).
While one cannot specify precisely the balance between internal and systemic
pressures, it is clear that both played a role in the process of military develop-
ment in the Middle East. The most straightforward implication of this (echoing
Barnett, Levy and David), is that domestic imperatives need to be incorporated
even into explanations that focus strictly on the alliance formation or external
orientation of Middle Eastern states. A more subtle implication, however, is that
the process of responding to internal and external forces has consequences for
the 'quest for security' that go beyond the level of state interactions, but which
can only be grasped if one adopts a broader conception of the scope of security
studies. It is to this interrelationship between military development and the quest
for security that I now turn.
Much more could be said about the specific circumstances that fuelled mili-
tary development in these Middle Eastern states, but this sketch allows me at
least to outline the interrelationships between the process of military devel-
opment and the quest for security. At this stage, the discussion is more taxo-
nomical than analytic, but since my main purpose is to establish the necessity
of studying the different dimensions simultaneously to generate robust
explanations, the more analytical task can be deferred. The consequences of
this process of military development can be analysed along the three dimen-
sions of security outlined previously - threats states pose to each other,
threats posed by the institutions of organized violence to state institutions
or regimes, and threats posed by those who control the means of violence to
citizens and society. For reasons of presentation, I will start with the state and
societal levels, and deal with the regionallinterstate dimension of security last.
State/Regime Security
The f ~ r s would
t correspond to a representative democracy, the second to an
autIior~tari,inreglme (of varvlng degrees of seventy) and the t h ~ r dto a ni111-
tary junta or d ~ c t a t o r s h ~ pThe
. Issue I S not, howeker, whether or not the
people occup) lng these role\ wear un~forms,but rather w h ~ c hset of Inter-
ests they reprewnt, or cvh~ch~nterestsdoni~nateIn p o l ~ t ~ c and a l allocat~ve
struggles. 5ome generals have been to tap c ~ 111,ln
b bases of power; some
c i v ~ l ~ a nhabe
s been lnele puppet4 of the armed force\.
The process of ' c ~ v ~ l ~ ~ ~ nthat ~ ~would
a t ~ olead
~ l ' to the f m t outcome has
50 far been thwarted In the M ~ d d l eEast ( w ~ t hthe p a r t ~ a lexceptlon of
Israel), and the s o c ~ ~andi l p o l ~ t ~ c droles
l of m111tar~establ~shmentcIn the
post-colon~alM ~ d d l eka\t have evolved along the last two paths, hoth of
w h ~ c hhave li~stor~cal precedents. The 'doni~nantel~te'pattern t ~ t swell the
late Ottoman experience. ~~~~~~~~y reform w ~ as near-contlnuous o h w s i o n
of Ottoman rulers after ~ t sd e f c ~ t sby the R u s \ ~ a n sIn 1768-74, ~ l t h o u g h
serlous measure\ could not he taken u n t ~ lthe de\truct~onof the ] a n ~ \ s a r ~ e \
(the a r c h a ~ cformer core o t the reglnie and the armv) In 1836 (Hurewlt7,
1969: 28-40; 5hau, 1965). Yet the proce\s of state-hu~ld~ng proceeded o n
2 18 Widening Security
a wide front, and the Ottoman response to systemic pressures generated far-
reaching domestic social, economic and political changes in the economy
and society, conducted under the umbrella of the T a n ~ i r n a tMilitary
.~ reform
always occurred in the context of a robust and complex civil society, which
has evolved towards more representative political models. The 'military
junta' pattern resembles the Egypt of Muhammed Ali, the early 19th-century
officer who took power after the Napoleonic invasion of Egypt had opened
that area to Westernizing influences. Aside from reorganizing the army,
opening an elaborate military training system and importing new weapons,
Muhammed Ali also launched his personalistic empire-building effort by
wiping out competing claimants for power and transforming social, political
and economic relations (Farhi, 1972; Mitchell, 1988: 34-48; Ralston, 1990:
82-8). As Anwar Abdel-Malek (quoted in Ralston, 1990: 80) put it - 'for
Muhammed Ali the army ... was everything, the pivot of national life. ...
With the army as his starting point, Muhammed Ali constructed a state.'
Contemporary cases, although not always clear-cut, also fit these two
patterns. Syria, for example, falls in the 'military junta' pattern, in which
those who control the instruments of organized violence also control the
state, and use it to entrench their rule, or 'loot' it for personal gain. The
dominant Asad-Alawi group plays a major role in all aspects of political
and economic life, and the armed forces are highly sectarian. In 1980 Alawis
commanded half of all army divisions and controlled all the military intelli-
gence services (although they comprise no more than 15% of the population).
In the 1980s smuggling, often run by the military itself, accounted for 70%
of all non-military trade (Hinnebusch, 1990; Sadowski, 1987). The result was
a state in which the armed forces consumed enormous amounts of resources
(in relative and absolute terms) and played a heavy role in domestic political
and economic life. This could also easily describe the Iraqi situation, and in
both cases state managers have constructed extractive apparatuses that are
outside of the 'regular economy' and which stall the possible emergence of
a more symbiotic relationship between war-makers and other social force^.^
On the other side, one could argue that Jordan, Saudi Arabia and Morocco
correspond to the 'dominant elite' model, in which the process of military
development was more or less subordinated to the needs of the ruling elite
(Cordesman, 1984; Safran, 1985; Vatikiotis, 1967).
Of course, neither of these patterns is precisely followed, and one should
not expect a long historical struggle to unfold without countervailing currents.
Perhaps the two most interesting cases are Egypt and Algeria, which seem at
this point to combine elements of both patterns. In Egypt, the existence of
strong technocratic and state capitalist economic elites, and a relatively strong
(i.e. legitimate) state has meant that post-1952 regimes have drawn support
from a range of social forces and groups. Although the military has been a
powerful actor, it has not occupied the stage alone. Civilian elites have an
interest in keeping the costs of security down, in order to maximize their 'rent-
seeking' opportunities; as Crystal (1994: 272) has described it - the Egyptian
business elite wants 'a state weak enough to loot, but strong enough to be
I Insecurity and State Formation in the Global Military Order 2 19
worth looting' (see also Hinnebusch, 1988). But when faced with pressure
to reduce its role after the 1979 peace with Israel, the armed forces protected
its interests not by launching a coup, but by launching agricultural, industrial
and infrastructure projects that maintained its role and status (Satloff, 1988;
Springborg, 1989). Once 'the role of the army had grown so large and had
begun to affect Egyptian life in so many ways ... it could no longer hide itself
from public criticism'. The architect of these policics (Field Marshall Abu
Ghazzaleh) was dismissed in 1990, and 'President Mubarak [has been] able to
reassert greater control over the military budget' (Owen, 1992: 204-5).
In Algeria, by contrast, the army was the dominant partner in the army1
party state, until the events of the early 1990s, and had always 'been the king-
maker at each critical j u n c t ~ ~ rin
e Algerian politics' (Mortimer, 1996: 20).
Especially throughout the 1980s, when the state was led by Chadli Benjedid
(the highest ranking military officer a t the death of Houari Boumedienne
in 1978), the armed forces managed t o maintain a high degree of institutional
autonomy and 'certain of its officers enjoyed lucrative import licenses or
access t o tidy commissions on state contracts' (Mortirner, 1996: 20). But the
process of political transformation that began in the late 1980s was a response
to the economic crisis of the 1980s, which crippled the ability of the army1
party state to continue its sentier status and t o 'buy off' other potentially
discontented or disenfranchised social groups. The 1992 coup t o stave off the
election victory of the Islamic Salvation Front (FIS) illustrated the inability
of the armed forces t o manage the process of change, and testified to the
weakness or discrediting of the traditional civilian political elite that had sur-
rounded the FLN (Front de liberation nationale), while simultaneously re-
inforcing the continued importance of the army as the 'custodian of national
values' and its institutional weight vis-a-visother social or political forces."'
The reasons behind these two diverging paths of development are doubt-
less complex, but at least two can be suggested. First, early military inter-
vention in the form of 'revolutionary officers' or reformist coups may have
'fixed' a certain pattern of politics that prevents the emergence of other 'mod-
ern' institutions (i.e. by instit~~tionalizing
economic corruption and inefficiency
tied t o satisfying demands of the armed forces, or by preventing the emergence
of an independent capitalist or technocratic elite). As Raymond Hinnebusch
notes in the Syrian case, 'from the moment Ba'thi officers brought the party to
power ... it was likely that the military would be an equal or senior partner in
the new military-party state, and that institution building would have to go
on in concert with military leadership, not apart from it' (Hinnebusch, 1990:
157). This contrasts with the Egyptian experience, in which the 1952 Free
Officers movement had to forge links with civilian technocrats and bureau-
crats, and middle-class nationalists, in order to perpetuate its rule and con-
struct a strong state apparatus (Hinnebusch, 1988: 12-39). Second, oil-rich
rentier states such as Iraq and Saudi Arabia, or states with strong patron-client
relationships with external powers (such as Syria and Jordan) have been able
t o 'purchase' security (directly o r indirectly) without mobilizing societal
resources. This has meant that whoever controls the means of violence has
220 Widening Security
been able to avoid the 'guns versus butter' trade-offs that could catalyze the
'civilianization' process, or have been able to enhance their position in this
allocative struggle by lining up powerful external supporters. The civil war
in Algeria illustrates what happens when this control breaks down.
Societal/lndividual Security
... was able to establish its control over the major paramilitary force, the
Central Security Police. ... As Field Marshall Abu Ghazzaleh was to
define the relationship later the same year: 'the role of the police and the
army are complementary and cannot be separated. To both of them falls
a unique task: to guarantee the security of Egypt both internally and
externally.' (cited in Owen, 1992: 204)
The CSP (also known as the Central Security Forces) numbered in 1990
about 300,000 (almost as large as the Egyptian army), and its principal mis-
sion was to serve as 'the army of the police, the army of the Ministry of the
Interior' (Middle East Watch, 1992: 29). The CSP was founded after the 1967
war, in order to provide Nasser's regime with an instrument of internal secur-
ity that would enable demonstrations and dissent to be crushed without the
direct use of the army. Likewise, in Iraq, 'for six decades the Iraqi army acted
as an agent for internal repression'; in Algeria, the armed forces are fighting
a civil war; in Saudi Arabia, the royal family tightly controls the upper ech-
elons of the defence ministry (al-Khalil, 1989: 21; Safran, 1985).
One consequence of this pattern of military development has been that
the emergence of 'pluralist' politics and an autonomous civil society has
Aimit. Insecurity and State Formation in the Global Military Order 221
Similar, if less brutal, processes can be seen, however, in Syria, Morocco and
Saudi Arabia, and in the activities of the armed forces against Islamic funda-
mentalists in Algeria, Israel and Egypt (Human Rights Watch, 1993: 331-8;
Middle East Watch, 1991, 1992). This development goes tar beyond 'militar-
ization' (defined as a prominent political role for the military) or even 'milit-
arism' (defined in terms of pervasive military values and attitudes in society),
and touches upon the ability of a small elite to control a state, and to impose
upon society a particular definition of politics (and understanding of secur-
ity) through repression and terror. The most chilling exan~plesof this can be
found in the laws concerning political activity in Iraq or Syria, and the way in
which the Ba'ath movement in both these states has created a party-army net-
work of spies, informers and torturers. Although the armed forces have not
been directly involved in many of these activities, internal and external secur-
ity functions are still consolidated at decision-making levels (as illustrated by
the Egyptian case), and the transformation from small constabularies to mod-
ern armies has brought with it the instruments of control (whether technol-
ogies or forms of organization) that made possible the mukhabarat state.
The rendering insecure of entire populations or groups within a state may
have little short-term impact on the external orientation of a state, and in
fact the effective application of state terror can provide at least a semblance
of stability. But this poses analytic problems for structural explanations of
state behaviour - either such considerations are ignored, and hence the
model is of limited explanatory utility (especially in dealing with the realign-
ments that can follow regime change, such as in Iran, Ethiopia, Somalia or
even Egypt), or they are included, which implies that one must incorporate
the dimension of 'societallindividual security' into the analysis. The problem
cannot be sidestepped by asserting that such issues fall outside the ambit of
security studies, since by Walt's own definition, security studies ought to con-
cern 'the ways that the use of force affects individuals, states and societies'
(Walt, 1991b: 212). Even a preliminary reading of the Middle Eastern case
shows that societalIindividual security is profoundly affected by the process
of military development itself, which is at least in part driven by a response
to interstate insecurities. The case for ignoring the domestic consequences of
external policies, and the 'feedback' of these policies into external relation-
ships, is thus not strong.
RegionaVlnterstate Security
The general nature of the links between the different levels of security can
be illustrated by focusing on the regionallinterstate dimension of the quest
for security - the threats states pose to each other. Not surprisingly, the bulk
of International Relations scholarship on the Middle East has concentrated on
this dimension (and on superpower involvement in the region) (Cordesman,
1993, 1994; Kemp, 1991; Walt, 1987; Yorke, 1988). I will not review the
details of the various regional conflicts here, but simply point out how sys-
temic influences can affect the process of military development and how
i r t - i Insecurity a n d S t a t e Formation in t h e Global Military Order 223
The quest for regionallinterstate security did not always involve huge
direct costs. As Middle Eastern states became caught up in the rivalries of
the cold war, patron-client relationships with external powers often meant
the flow of huge sums in military and economic assistance to states such as
Syria, Israel, Egypt and Jordan, and privileged access to modern weapons for
those states that could afford to pay for them (Algeria, Iraq, Saudi Arabia).
Although regional 'arms racing', fuelled and financed by the United States and
the Soviet Union cannot be easily correlated with the outbreak of wars, 'gov-
ernment spending priorities in the Middle East reflected not only the absolute
number of local conflicts but also ... the willingness of both the superpowers
and local regimes to deal in goods and services that fostered those conflicts to
the detriment of domestic development programs' (Anderson, 1992: 169). On
a more subtle level, these relationships allowed Middle Eastern regimes to
avoid compromises with local rivals, since the possibility always existed
that a patron would help bankroll or support a bid for regional hegemony
(or cover the losses from such a bid by replacing weapons, for example).
Such behaviour was manifest by Syria and Iraq in the 1980s, in their respect-
ive conflicts with Israel and Iran (arguably the same could be said of Egypt
and Israel). Of course, the yentier states of the region could avoid the guns-
butter trade-off not by depending on external support, but by avoiding any
reliance on 'taxation' altogether (Waterbury, 1994).The economic crisis of the
late 1980s, however, has somewhat altered this equation (Sadowski, 1992).
The second negative interaction, where insecurities at the domestic level
have an impact on regional security processes, is more difficult to grasp. In
principle, when the institutions of organized violence control the state (or a
particular regime depends on their support to control the state) then regional
conflict resolution processes (such as arms control or confidence-building
measures) that threaten the claim of the armed forces on national resources
and priorities will be more costly (to the regime) to entertain. A regime may
not be strong enough to withstand the resistance that would accompany ini-
tiatives to make peace with its neighbours. The opposition of the Egyptian
armed forces to the peace with Israel and their subsequent behaviour (and
President Sadat's assassination) is a case in point, as is the difference between
the Syrian and Egyptian stances towards the peace process with Israel. More
specific conflict resolution proposals such as controls on armaments, basing/
deployment restrictions, transparency measures or restrictions on the size of
the armed forces, could impede a regime's ability to counter perceived internal
threats to security. This makes Syrian (and to a lesser extent Jordanian) par-
ticipation in such agreements more difficult to imagine. Thus when Geoffrey
Kemp (1991: cover) notes that 'far-reaching arms control agreements ... will
remain elusive until the key regional players realize that they have more to
gain than to lose from such a process' it must be added that the most impor-
tant 'players' are not states, but regimes, and their calculations of gains and
losses may be different.
Finally, and more subtly, there remains the issue of who defines security -
are the strategies that are adopted for managing regional conflicts and external
t i t Insecurity and State Formation in the Global Military Order 225
Conclusion
The principal thesis of this article is that the quest for security in the develop-
ing world cannot be understood without reference to the process of military
development, the insertion of states into the global security order and the
state-building projects that new regimes have embarked upon. Thinking
of 'security' in the developing world within the framework of states locked in
a security dilemma has led scholars to ignore the broader forces that influence
security policies and practices in the process of military development, and their
complex interaction across the 'internal/external divide.'14 Such a narrow
focus cannot even adequately explain the most concrete manifestation of the
security dilemma (changes in military capabilities and the threats these pose)
without reference to internal political and social processes.
The most common response to this charge is that the orthodox concept of
interstate security is adequate for the analytical task at hand, and that the
other issues 1 have outlined (societaVindividual and regimehate dimensions of
security) are important, but not relevant. At a deeper level, however, this too
can be called into question, for what is at stake here is not only the appropri-
ateness of the analytic tools of security studies scholars, but the definition o f
the discipline itself. The definition promoted by Walt and others (Haftendorn,
1991; Nye and Lynn-Jones, 1988; Walt, 1991b) is historically myopic and
Western-centric. The reason security studies scholars can unproblematically
state that 'a subject that is only remotely related t o central political problems
of threat perception and management among sovereign states would be re-
garded as peripheral' (Nye and Lynn-Jones, 1988: 7) is precisely because this
rests upon a historically-specific resolution to the problem of evacuating the
threat of organized violence from political life. With this achieved, 'security'
became confined t o other things - in the international arena, to interstate
threats; domestically, to 'social security' and the pursuit of welfare goals in
advanced industrial societies. But transplanting this vision of security to the
rest of the world ignores precisely what is distinctive, interesting and import-
ant about its security problematic.
226 Widening Security
their citizens. Not only has this been neglected by security studies analysts,
but scholars concerned with the prospects for democratization and civil
society in the Middle East have also neglected the systemic influences of
interstate rivalries, and the itnpact of attempts to achieve interstate security
on the prospects for political, economic and social change." Until both
groups better understand the logic behind Middle Eastern states' military
development choices, and the way i n which these may he shaped by systemic
and internal forces, efforts to chart paths away from the pathological rela-
tionships that have characterized the region's political life will remain futile.
Notes
I have henefited from input from a variety of people o n this project, in particuLlr Mich,lel
Barnett, Jennifer Milliken, lkivid Mutinier, Michael Williams .lnd the anonymous referees for
this journal. Earlier ( a n d partial) versions were presented a t C o l u m b ~ a University, York
University, the [Jn~tersity of Wisconsin-Madison, Konstanz Un~versitya n d the Gr,ldu.lte
I n s t ~ t u t eof International Studies (Geneva). T h e Social Science a n d Humanities Research
C o u n c ~ l( C a n a d a ) has f ~ n m c i a l l ysupported this r e s e ~ r c h .
I . A, Daniel Ileudney put it ( 1990: 463-4). 'if everything that c'iuses a decline in Iium,in
well-heing is labelled a "secur~ty"threat, the term ... lwcomrs a loose synonym of "had"'.
2. Although I'ercival ad Homer-Dixon ( 1 9 9 5 ) d o focus o n the civil w a r in RwanJ.1,
rather r h ~ nexclus~velyo n its interstate dimension.
3. M o r e soph~sricated:lrea s t u J ~ e sanalysts re nor, howevcr, necessarily as state-centric '1s
the x h o l a r s cited above, and they d o often i~icorporatesuch issues as the use of force hy non-st,lte
actors, o r the complex of state-society relations (for example, see Ken-Dor, 1983; Migdal, 1988).
T h e target here, however, are the more conceptu,ll attempts t o dr'iw the h o u n d a r ~ e sof thc f~eld,
w h ~ c htend t o exclude such people from security stud~es.
4. A fully worked-our study could a l w , a t least in princ~ple,incorporate these iswcs into
Tilly's framework.
5. T h e term 'military development' has also been used by Kruce Arlinghaus ( 1984) t o rne,ln
'the growth and modernuation o f .irnied forces'. M y dcfinit~onIS consider:~bly broader.
6. T h e army w a s greatly reduced after 1 9 4 I, but it re-emerged after World War I1 w ~ t hthe
same role a n d nilsslon. O n the e.lrlicr role of army officers in the emergence of modern Iraq
after World War I, see Tauher (1993).
7. Tilly's account in turn leans o n trccleric L.ant., and ,tlthough I have replicated I.ane's
three c,ltegories, T ~ l l ysuggests that 'monarchic control' 31id control by a d o r n ~ n a n class' r {nay
not he the \Arne thing.
8. As Hurewirz (1969: 37) notes concernmg the C)ttorn,ln c.lse, what began a s rnilit'lry
modern17arion in the early 19th century evolved in t w o directions, a n d 13)- the 1860s 'the
modernization program / T t l t ~ z ~ t m... t / h~furcated,w ~ t hthe m i l ~ t ~ l rayn d civilians going t h c ~ r
s e p ~ r a t eways'.
d nature o f the [current Iraq11 systcn~,o n e
9. As l'ahir (IYX9: 1 6 ) notes: 'to ~ ~ n d e r s t a nthe
must return t o its structur.ll origins in the c o u p d'etat of 19.58 ( m y t r a n s l a t ~ o n )
10. For a n overmew o n A l g e r i ~see the contributions t o 'Algerie: la descentc a u x enfrrs',
LC Cahicrs de l'Orient, 36-7 ( 1994-5); Mortirner ( 1996).
I I. O n the debate o n c i v ~ lsoclety in the Middle East, see Norton ( 1 994,1995) and the
journal of the Ibn Khaldoun Center tor 1)evelopment Studies ((:am)), Gild Society.
12. Andrew Ross ( 19871, tor example, lists 'military regimes' a5 his only domestic p o l ~ r ~ c a l
228 Widening Security
13. The world average is 4.4 soldiers per thousand population. The figures are - Israel,
36.8; Syria, 28.5; Jordan, 26.2; Iraq, 21.2 (United States Arms Control and Disarmament
Agency, 1995).
14. For a recent example o f the persistence o f thinking about military development in
interstate terms, see Cordesman (1993),which discusses internal civil conflicts, but does not
analyse in any way how the pattern o f military development he exhaustively traces might be
connected with them.
15. This raises an issue much greater than can be treated here. For an extended discussion,
see Krause and Williams (1996).
16. This general neglect is reflected in most o f the contributions t o Norton (1994, 1995)
and SalamC (1994).
References
Abbas, A. (1989) 'The Iraqi Armed Forces, Past and Present', in Committee Against
Repression and for Democratic Rights in Iraq (CARDRI),Saddam's Iraq: Revolution or
Reaction?, pp. 203-28. London: Zed Books.
Abdel-Malek, Anouar (1975)L'Armee duns la Nation. Alger: SNED.
'Algerie: La descente aux enfers' (1994-5) Special issue of Le Cahiers de L'Orient, nos. 36-7.
Anderson, Lisa (1992) 'Remaking the Middle East: The Prospects for Democracy and
Stability', Ethics and International Affairs 6: 163-78.
Arlinghaus, Bruce (1984)Military Development in Africa. Boulder: Westview Press.
Ayoob, Mohammed (1989)'The Third World in the System o f States: Acute Schizophrenia or
Growing Pains?' International Studies Quarterly 33(1):67-79.
Ayoob, Mohammed (1991) 'The Security Problematic o f the Third World', World Politics
43(2):257-83.
Ayoob, Mohammed (1995) The Third World Security Predicament: State Making, Regional
Conflict, and the International System. Boulder: Lynne Rienner.
Azar, Edward and Chung-in Moon (1984) 'Third World National Security: Toward a New
Conceptual Framework', International Interactions l l ( 2 ) :103-35.
Baldwin, David (1995)'Security Studies and the End o f the Cold War', World Politics 48(1):
117-41.
Ball, Nicole (1988)Security and Economy in the Third World. Princeton: Princeton University
Press.
Baram, Amazia (1989) 'The Ruling Political Elite in Ba'athi Iraqi, 1968-86', International
Journal of Middle Eastern Studies 21(4):447-93.
Barnett, Michael N. and Jack S. Levy (1991)'Domestic Sources o f Alliances and Alignments:
The Case o f Egypt, 1962-73', International Organization 45(3):369-95.
Be'eri, Eliezer (1970)Army Officers in Arab Politics and Society. New York: Praeger.
Be'eri, Eliezer (1982) 'The Waning o f the Military Coup in Arab Politics', Middle Eastern
Studies 18(1):69-8 1.
Ben-dor, Gabriel (1983)State and Conflict in the Middle East. New York: Praeger.
Booth, Ken (1991)'Security in Anarchy: Utopian Realism in Theory and Practice', International
Affairs 67(3):527-45.
Buzan, Barry (1991)People, States and Fear, 2nd edn. London: Harvester Wheatsheaf.
Cooper, Mark (1982)'The Demilitarization o f the Egyptian Cabinet', International Journal of
Middle Eastern Studies 14(2):203-25.
Cordesman, Anthony (1984)The Gulf and the Search for Strategic Stability. London: Mansell.
Cordesman, Anthony (1993)After the Storm: The Changing Military Balance in the Middle
East. Boulder: Westview.
Cordesman, Anthony (1994) Iran and Iraq: The Threat from the Northern Gulf. Boulder:
Westview.
ik I,ILI-L. Insecurity and State Formation in the Global Military Order 229
Crystal, sill ( 1 994) 'Authoritar~anisn~ and its Adversartes in the Arab World', World Politics
46(2): 262-89.
Crystal, Jill (199.7) O d and I'olitrcs in tbe Gulf: Rulers '2nd M P ~ C / J L in
~ Mk'urcwrt
~S nnd Qatirr.
~rpdatededn. Cambridge: Camhridge linlversity I'ress.
Ilandeker, Christopher ( I 990) S u r ~ ~ c ~ l l a mI'olcw
e , and Modernity. London: Polity.
D a v ~ d Steven
, ( 1 99 I ) 'Explaining T h ~ r dWorld Alignment', World Polrtics 4312): 233-56.
Deger, Saadet and Kobert West (ed\) (1987) l>afensr, Sec-urity m i i I>evelopment. New York:
St M d r r i n ' h I't-r\\.
Deudney, Dan~el( 1990) 'The ( h s e Aga~nstlinking Environrnettt,il Ikgradation and National
Security', Millcnr~iumI9(.3): 46 1-76.
Downing, Brian ( 1992) 7%e Mrlrtary Rel~~/lrtron m d Polttrcal (,'I~~ztzge:Origms of I l r n z ~ ~ ~ ~ r i z c y
and Autocrilcy Early Modern Errrope. Princeton: I'rinccton University I'ress.
Drysdale, Alasdn~r(1985) 'The Succes5ion Question in Syri.i', Mrddle Edzst /ourrrill, 39(2):
246-57.
Eide, Ashjorn and hlarek Thcc (eds) ( 1 980) Problems of C:ontrmpornry Mrlrtarism. I ondon:
Croom Helm.
Farhi, David ( 1972) 'Nizan-i-cedid: M~litaryReform in Egypt under Mehmed hli', Asrilrr 'lnd
African Strrtftc,~8: 15 1-83.
Farouk-Sluglett, hlarlon and I'eter Sluglett (1990) l r q slrrc-e 19.58: From ~ e l ~ o / l l t l t~ ~t?
Dictntorshlp. l.ondon: 1.13. T;iur~<.
Finer, Samuel (1975) 'State- and Nation-Building In Europe: The Kole of the Mil~t~lry',in
Charles l ' i l l y (ed.) T / J ~tr~rrnalionof Nutronal Stdtes r t r W'wtern t:rfrop~,pp. 84-163.
I'riticeton: I'rinceton liniverhity Prcsb.
Fisher, S~dney N. (cd.) (1963) '1'17~MilltL7ry in the Middle h s t . Columbus: Ohio StLite
Ilniversity h e \ \ .
Giddens, Anrhon) (198 1 ) T/JCN i ~ t r ~ ~ i r - Snird
t d c Vlolcrz<-c.Camhridgc: Cambr~dgeIlntversit)
I'ress.
Gizewski, Peter a n d 'l'homas Homer-L)ixon (1995) Urbmz Growth m r i Violenrr: Wtll thc hrtlrrc,
Rpsen~hlet h I'izst?~ Prolect o n E'nvtron~nent,I'opulat~on and Security, Univers~tyof Toronto.
Gluhh, John ( 19.57) A Soldier u~rththr Ara/~s.l.ondon: Elodder ,lnd Stoughton.
tiaddad, <;eorge M. ( 1965, 1970, 1973) K ( W ~ / l f t l rrrrd
o ~ ~M r l r t q lirrle m the Middle East, 3 vols.
New York: Robert Spellel-,ind Sons.
Haftendom, tlelp+~( 1991 ) 'The Security I'urxle: l'heory-I%i~tlit~g . ~ n dDisupline-Building in
international Security', Itzt~rnat~(11~~11 Strrdies Qr~arterly3 i( I): 3-1 7.
Halpern, Manfred (1962) 'The Middle Eastern Armies 2nd the New Middle C:lass3, 111 John
lohnson (ed.) T / J ~Role of f/ie Milrtury irr U~zdcr(ic,ltelopi~cf( h n t r i e s , pp. 277-.1 15.
J'rinceron: Princeton Un~\w-sityI're\s.
Harkavy, Robert ,ind Edw.lrd Kolodr~el (eds) ( 1982) Sc,(-rcrrty Polr&s of l l e ~ ~ r l o p i r ~ l :
(:oitntrrcs. L.exlngton: I.ruington books.
Hernphill, Paul (1979) 'The Format~onof the Iraq1 Army, 1921-33', In hbhas Keltdar (ed.)
T1~cIrztcgrution of M o c i ~ IYLIY,
r ~ pp. 88-1 10. 1,ondotl: <:room Helm.
Herlxt, Jeffrey (1989) 'The C.rear~onand M:~lntenance ot Natioml Koundartes in A f r ~ a ' ,
Interm7tio11al Organizatlott 4314): 673-91.
Herhst, Jeffrey (1990) 'War ,lnd the State in Africa', Iriternczt~on~zl Sec-urity 1434): 1 17-39.
Hinnebusch, Raymond ( 1988) ~ ~ p t l i Politzcs ?n Undrr Sizdrt. updated edn. boulder: l.ynne
Reinner.
Hinnehusch, Raytnond (1990) Authoritilriatr Power m d Stiztr lwrmation in Bn'athist Syrm.
Army. Party '7nd Peasilnt. Boulder: Westview.
Hinneb~tsch,Ray~iiond(199.3) 'State and CIWISocrery in S!.rt,l', Mrddlr Enst Journirl 47iL):
243-57.
H i n t ~ e ,Otto (197.5) 'Mtlit;1rY Organi~~ttjon and the O r g a n t ~ ~ ~ t iofo nthe State', in Felix Gilbert
(ed.) The Historrcd Essilys of Otto Hrntze, pp. 178-2 15. New York: Oxford Un~versityPress.
Hirschrnan, Alhcrr 0. ( 1 977) The I'i~sstorrsa n d t l ~ eIntcrests. Princeton: Pr~nceronUn~t,ersity
Press.
230 Widening Security
O w e n , Roger ( 1 9 9 2 ) State, Pori~rrand Polrtrcs In the M~lkrrrg of the Modern Middle t.ast.
London: Routledge.
Parker, Geoffrey ( 1988) T / J Militdry~ Rcvolntion: Milrtrrry Innotwtion iznd the Kisc of the
West, 1 100-1 X 0 0 . Cambridge: Cambridge U n ~ v e r s ~ rPre\\. y
Perc~val,VCllerleand T h o m c ~ tsl o ~ n e r - l h o n( I 99.5) E~zvrro~17tr~r1t~71
S~arcrtyand V ~ o k n C:ontl~(-t:
t
I'rojecr o n tnviroti~nent,Populat~on, ~ n dSecur~ry,U n ~ v c r s ~ of
' [ b eCirsc of IZr~~~ztr(in. t y Toronto.
Perl~nutter, Amos ( 1977) Thcj Militizry m t i Politic-s in Moticrr~ Tirnes. New Haven: Y ~ l e
LJnivcr-sity P r r \ \ .
I'lcard, Elizabeth ( 1 9 7 9 ) 'Clans r n ~ l ~ t a i r eets pouvoir ba'thistc en Syrie', Orirnt: 49-62.
P ~ c a r d ,1:llzaheth ( 1988) 'Arab h11lit.lry in Politics: From R e v ~ ~ l u t ~ o nPlot , ~ r yto A u t h o r ~ t ' ~ r ~ , l n
State', In Adeed D a w ~ s h a~ t i dW ~ l l i a mZartrnan (eds) Keyiinti (:ocrcron: T h e llurnhrlrty of
t l ~ cArah St~ztc,.pp. 11 6-46. Imndon: Croorn Helm.
Rabinovitch, Ir,~mnr ( 1972) Syrio rrnder the Bn'ath, 146 3-66: T / J ( Army-Party ~ Symhrosrs.
N e w York: H,~lstrdPress.
Ralsron, I I a v ~ d( 1990) Importrng the E L W O P CArtny: L Z ~ TIJCI n t r i h ~ t r ~(ifnt;14riip~an Mrlitizr)~
'lcchnrqtr~s 'rnd Institritr~ns I ~ I ~ Othe t . x t r a - t , r i r o p ~ ~Vl/orld, ~~ 1600-1 91 4 , < : h i a g o :
IJniversity of C:hicago Pre\a.
Raslcl; Karen a n d William 'Iliompwn ( 1989) Wrzr ilnd State M~rkrng.R ~ s t o n Utiwin : H!I~JII.
Ross, Andrew ( 1 9 8 7 ) ' D i m e n s ~ o n sof M~litariznrionin the Third World', Arwzeti torcrs ma'
Sorrrtlj 1.3(4): 5 6 1-78.
Sadowski, Yayha ( 1 9 8 7 ) 'I'atrorl,~ge and the Ba'th: C o r r ~ ~ p t and i o ~ Control
~ 111 Contemporary
Syria', Arnlj Striifres Quirrterly 9 ( 4 ) : 442-6 I.
Sadowski, Yayha ( 1 9 9 2 ) S~ricisor Rrittcr! T h e Polrtrci71 I;c-orrotny of Arnzs Control 111 rhc
Mrddlr Lrst. Washington: T h e Brookings Instiruriorl.
Safr,ln, Nadav ( 1969) From \Y;w to LVm New York: P e g ~ \ u \ .
Safran, Naddv ( 198.5) Sarid~ArLrhiir:T h r ( : P O S ~ C S S Q r m t for .Sri-rlrrty.Harvard: Relknap h e \ \ .
Sal,~rne,G h x s a n (etl.) ( 1994) I)c~noi-racyz~,rtho~lt I ~ C I I I O C 1~ 011c1on:
~ ~ S ~ I.B. Tauris.
Satloff. Koherr ( 1988) Army m d I'i~litr(.s in M ~ l h i ~ r i l ktk, ~ y [ i tW . ~ s h ~ t l g t o nT:h e W , ~ s h ~ n g r o n
Institute for N e , ~ rEast Policy.
Sayigh, Y c z ~ d( I 9 9 0 ) ' C o n f r o n r ~ n gthe 1990s: Security in the lkvcloping C:ountriec', Adelphi
I'L7pcr 2 5 1. London: IISS.
Scale, Patrick ( 1 9 8 8 ) Asad of S~,rril:T h e Strrrgslc fijr tl!c, Mrdcil(' Fdst. London: I.K. Tz~uris.
Shnw, Stanford ( 1 9 6 5 ) 'The O r ~ g ~ of n \ O t t o m a n M ~ l i t a r yReform\: T h e Nizam-i-Ced~dArmy
of Sult,in Selim Ill', /ourrlol of Modtwi Hrstory 37(1):2 9 1-306.
S p r ~ n g h o r g ,Ilobert ( 1989) M ~ i l ~ r a 1.fiypt:
k ' ~ t.rirgtnrnti~timof the Political Orrfcr. Boulcicr:
Wesrview Pi-?\\.
'Ihhir, A h (198')) Ir'rk: Arrx 0r1grrrc.s ( ~ L IR6glrne M11rt~irr.c.l ' ~ r ~ \l.'H,~rrnatran. :
Tarlrhsh, M o l i a m ~ i ~ e(d1 9 8 2 1 7 ' 1 Kolc ~ c ~ the
f Militizry rrr I'ijlitrcs: A Cimv Strrdy of lrcrq t o
1941. 1.ondon: Keg311 l'.1u1 Internat~onal.
Tauher, Eliezcr ( 1993) The Eortnirt~ottof Modcrn S y ' r m d lr.,i~/.I.otldon: Frank C:as\.
Till lor, Alan ( I 9 9 1 ) The S r i p r ~ p o u ~ r in r s thr M ~ d d l et;crst. S! r.lcu\e, Syracuse Univers~ryPress.
T h o ~ n a s ,C a r o l ~ n e( 1987) In Srizrch of Scr~tuityHemel Hempste.ld: Harvester W h e a t s h e ~ t .
T~lly,Charles (198.5) 'War-Making , ~ n dS t a r e - h l a k ~ n g,I\ O r g , ~ n i ~ cCrime', d In I'cter- E v ~ t l s ,
L>irtrich Rue\chemeyer, Theda Skocpol (eds) Rringrng i l ~ eSti~teBack 117, pp. 169-9 1 .
C,~rnhridge:L ~ ~ n b r ~ dIln~verlity
ge 1'1-es\.
Till!, C:harles ( 1 9 9 0 ) Coc~rimirr. ( h p ~ t ~ rm l . d t;nropcnrr StLites, A.D. ')L,O-I090. O x f o r d :
Blackwell.
T'uchman M a t h e w , Jessicfi ( 1 9 8 9 ) 'Kedetining Secur~ty',F O ~ C IAffizrrs ~ I I 6 8 ( 2 ) : 162-77.
l i n ~ r e d Sratcs Arms Control a n d D ~ s a r m a m e n t Agency ( \ ~ r i o u syears) World Mrllt'7ry
Expenditnres iznti Arrm Tr~71rsfCrs.Washington: A(:L)A.
Vatlkiotis, l!J. ( 1 9 6 7 ) Po11tri.s arrii the Military I I I / o r d m : A Study of the Arnh I.egion
192 1-.$7. 1.ondon: Frank <:,IS\.
W ~ e v e r , Ole (199.5) 'IntroJuction', In Barry B L I Z J ~Ole , 'X'xver and J a a p d e W~ltie,
'Enwl-onrnent,il, Economic ,lnd Soc~etal Secur~ty', W r k ~ n gl'd[~rrs 10. <:openhagen:
(:entre fol- I'e~ce a n d C o n t l ~ c tKesc,~rch.
232 Widening Security
Walt, Steven (1987) The Origins of Alliances. Ithaca: Cornell University Press, 1987.
Walt, Stephen (1991a) 'Alliance Formation in Southwestern Asia: Balancing and Bandwagoning
in Cold War Competition', in Robert Jervis and Jack Snyder (eds) Dominoes and
Bandwagons: Strategic Beliefs and Great Power Competition in the Eurasian Rimland,
pp. 51-84. New York: Oxford University Press.
Walt, Stephen (1991b) 'The Renaissance of Security Studies', International Studies Quarterly
35(2):211-39.
Waterbury, John (1994) 'Democracy without Democrats?: The Potential for Political
Liberalization in the Middle East', in Ghassan SalamC (ed.) Democracy without
Democrats?, pp. 23-47. London: I.B. Tauris.
Wendt, Alexander and Michael Barnett (1993) 'Dependent State Formation and Third World
Militarization', Review of International Studies 19: 321-47.
Wolpin, Miles (1986) Militarization, Internal Repression and Social Welfare in the Third
World. London: Croorn Helm.
Yapp, Malcolm (1975) 'The Modernization of Middle Eastern Armies in the Nineteenth
Century: A Comparative View', in V.J. Parry and Malcolm Yapp (eds) War, Technology
and Society in the Middle East, pp. 330-66. London: Oxford University Press.
Yorke, Valerie (1988) Domestic Politics and Regional Security: Jordan, Syria and Israel: The
End of An Era ? Aldershot: Gower.
Constructing National Interests
JuttaWeldes
... [pol~t~call
actors have found ... the concept useful both as a way of
thrnkmg about t h e ~ goals
r and as a means of rnobd~ztngsupport for them.
234 Widening Security
That is, not only do political actors tend to perceive and discuss their goals
in terms of the national interest, but they are also inclined to claim that
their goals are the national interest, a claim that often arouses the support
necessary to move toward a realization of the goals. Consequently, even
though it has lost some of its early appeal as an analytical tool, the
national interest enjoys considerable favor as a basis for action and has
won a prominent place in the dialogue of public affairs. (Rosenau, 1968:
34, emphasis in the original)
With realists, I agree that 'the national interest' is crucial to our understand-
ing of international politics. In both the classic and the structural or 'neo-'
varieties of realism, the national interest - or what is sometimes called 'state
interest' or 'state preference' - carries a considerable explanatory burden.
IHowever, the way in which realists have conceptualized the national interest
is inadequate. In this section I briefly discuss the realist conception and then
point to two of its shortcomings in order to provide the starting point for a
constructivist rethinking of the national interest.
O n realist accounts, international politics differ from domestic politics pri-
marily in their anarchic character. The absence of a supra-state 'Leviathan'
places states in inevitable and perpetual competition - the so-called 'security
dilemma' (e.g. Herz, 1951 ). As a result, states must necessarily be concerned
with their survival. The general content of the national interest is thus deter-
mined deductively; it is inferred from the anarchic, self-help character of the
international system.' For Morgenthau this meant that the fundamental na-
tional interest of any state was to 'protect [its] physical, political, and cultural
identity against encroachments by other nations' ( 195 1: 972). More specific
threats to states are determined by their relative power in the international sys-
tem. That is, the particular threats facing a state or challenging its national
interest are (or should be) 'calculated according to the situation in which the
state finds itself', specifically with reference to the structure of the system -the
distribution of capabilities or the number of great powers. 'To say that a coun-
try acts in its national interest', Waltz argued, 'means that, having examined
its security requirements, it tries to meet them' ( 1979: 134).Power and wealth
supply the means necessary for states to survive, to meet their security require-
ments, and thus to continue to compete in a system i n which other states are
necessarily either actual or potential threats. Decisior1-makers and policy ana-
lysts are therefore advised realistically to assess the distribution of power; they
should overcome their 'aversion to seeing problems of international politics as
they are' (Morgenthau, 195 1: 7) in order objectively to assess their national
interests in light of the distribution of power. Every state, that is, must pursue
its national interest 'defined in terms of power' (Morgenthau, 19.52: 964)
because this is the surest road to security and survival.
O n this realist argument, then, the 'national interest' clearly plays a piv-
otal role in accounts of international politics. Through the need for security,
it connects the nature of the international system, specifically anarchy and
the distribution of power, with the policies and actions of states. There are,
however, two problems with this realist notion of the national interest that
are important for m y argument. First, its content - defined as the security
and survival of the state - is so general as to be indeterminate. Second and
more importantly for niy argument, this notion of the national interest rests
on a questionable empiricist epistemology which ignores the centrality of
processes of interpretation.
236 Widening Security
the national interest. Wendt has convincingly argued, against realist orthodoxy,
that 'self-interested', security-oriented conceptions of state interest are not
produced by or deducible from the systemic condition of anarchy: instead,
'anarchy is what states make of it' (1992: 395)."his is the case because
both the interests of states and the identities on which those interests depend
rest not solely upon the structure o f the system but also upon the 'collective
meanings that constitute thc structures which organire' state action. What is
needed to explain state interests and thus state action, Wendt reasons, is a
theory that accounts for the 'intersubjectively constituted structure of iden-
tities and interests' of states (1992: 401).
Constructivisnl provides an approach within which to generate such a
theory. It does so, specifically, on the basis of the fundamental principle 'that
people act towards objects, including other actors, on the basis of the mean-
ings that the objects have for them' (1992: 396-7), meanings that are inter-
subjectively constituted. Adopting a constructivist approach, that is, allows
us to examine the intersubjectively constituted identities and interests of
states and the intersuhjective meanings out of which they are produced.
Wendt's constructivist argument goes some way towards reconceptual-
izing the national interest as the product of intersubjective processes of
meaning creation. However, his analysis does not itself provide an adequate
account of national interests for at least one important reason. Wendt's
anthropomorphized understanding of the state continues to treat states, in
typical realist fashion, as unitary actors with a single identity and a single set
o f interests ( 1 992: 397, note 21)." The state itself is treated as a 'black box',
the internal workings of which are irrelevant to the construction of state
identities and interests. In Wendt's argument, the meanings which objects
and actions have for these unitary states, and the identities and interests of
states themselves, are therefore understood to be formed through intcr-state
interaction ( 1992: 401 ). But the political and historical context in which
national interests are fashioned, the intersubjective meanings which define
state identities and interests, cannot arbitrarily be restricted to those mean-
ings produced only in inter-state relations. After all, states are only analyt-
ically, but not in fact, ~lnitaryactors. The meanings which objects, events
and actions have for 'states' are necessarily the rneanings they have for those
individuals who act in the name of the state."' And these state officials do
not approach international politics with a blank slate on to which meanings
are written only as 3 result of interactions among states. Instead, they ap-
proach international politics with an already quite comprehensive and elab-
orate appreciation of the world, of the international system and of the place
of their state within it. This appreciation,
..
in turn, is necessarily rooted in
meanings already produced, at least in part, in domestic political and cul-
tural contexts. After all, as Gramsci argued, 'civil society is the sphere in
which the struggle to define the categories of common sense takes place'
( 1 9 7 l a : 112)."
In contrast to the realist conception of 'national interests' as objects that
have merely to be observed or discovered, then, my argument is that national
238 Widening Security
interests are social constructions created as meaningful objects out of the inter-
subjective and culturally established meanings with which the world, particu-
larly the international system and the place of the state in it, is understood.
More specifically, national interests emerge out of the representations - or, to
use more customary terminology, out of situation descriptions and problem
definitions - through which state officials and others make sense of the world
around them.12
This claim immediately raises three questions - constructed by whom?
why? and how? As to the first - the pre-eminent site for the construction of
the national interest is, not surprisingly, the institution or bundle of practices
that we know as the state. Because identifying and securing the national inter-
est is, in the modern international system, considered to be quintessentially
the business of the state, those individuals who inhabit offices in the state
play a special role in constructing the meaning of 'the national interest'. As
Morgenthau argued, statesmen are the representatives of the state who 'speak
for it, negotiate treaties in its name, define its objectives, choose the means
of achieving them, and try to maintain, increase, and demonstrate power'
(1978: 108). Exactly which state institutions and offices are involved in
national interest construction will of course vary across states, but it is per-
haps safe to say that the national interest is produced primarily, although not
exclusively, by foreign policy decision-makers.13
As to the 'why?' - the answer is quite simply that for 'the state' to act, 'it'
must have some understanding of its surroundings and some specification of
its goals. In order to make sense of international relations, state officials ne-
cessarily create broad representations, both for themselves and for others, of
the nature of the international system and the place of their state in that sys-
tem. And to enable 'the state' to make a decision or to act in a particular situ-
ation, state officials must describe to themselves the nature of the specific
situation they face. After all, people 'act in terms of their interpretation of,
and intentions towards, their external conditions, rather than being governed
directly by them' (Fay, 1975: 85). In the case of the Cuban missile crisis dis-
cussed below, for instance, US officials functioned with a broad representa-
tion of the international system as one of 'Cold War'. Within it, a narrower
situation description, 'the Cuban problem', defined the particular relations
that obtained between the US and Cuba and thus the narrower context of
the missile crisis.14 Even more specifically, the problem faced by the US in
October 1962 had then to be interpreted as the Cuban missile crisis, specif-
ically, rather than, say, as a Cuban missile nuisance which, while annoying,
demanded no US action.
Finally, and most importantly, as to the 'how?' - the construction of
national interests, I contend, works as follows. Drawing on a wide array of
already available cultural and linguistic resources, state officials create repre-
sentations which serve, first, to populate the world with a variety of objects,
including both the self (i.e. the state in question) and others. These others
include, prominently, other states, but may encompass as well the decision-
makers of other states, non-state actors, social movements, domestic publics,
I Constructing National Interests 239
To continue the example begun above, during the Cold War, once a situation
had successfully been represented as one in which one or more aggressive
totalitarian states were threatening the collapse of a domino, US national
interests had already been determined. The US, with its identity as the leader
of the free world, had an obligation - to itself, to its allies and to its moral
convictions - to act to forestall the toppling of that domino.
In short, the representations created by state officials make clear both
to those officials themselves and to others who and what 'we' are, who and
what 'our enemies' are, in what ways 'we' are threatened by 'them', and
how 'we' might best deal with those 'threats'. In the case of post-war US
foreign policy, for example, the Cold War representation of international
politics constructed a reality in which 'we' (the US) were the 'winners' of
World War 11, in which the United States therefore 'bore the burden of lead-
ership' in the 'free world' and was obliged to 'defend' both 'democracy' and
'freedom'. It was a reality in which the US was threatened -psychologically,
politically and militarily - by the 'expansion' of and 'aggression' from, among
others, a 'totalitarian' Soviet Union and the 'international Communist move-
ment' it sponsored. As a result, it was a reality in which the US had a
national interest in 'maintaining a position of strength' in order that it fulfill
its national interest in 'containing' this deadly threat to its very 'way of life'.
In this way, the orthodox US representation of international politics, the
prevailing description of the Cold War situation in which the US found
itself, fleshed out the skeletal, abstract conception of the national interest
in survival and power posited by realists by providing a rather more
detailed picture of who was to be protected, from what threat, and by what
means. National interests, then, are social constructions that emerge out of
a ubiquitous and unavoidable process of representation through which
meaning is created. In representing for themselves and others the situation
in which the state finds itself, state officials have already constructed the
national interest. l 9
In order to clarify the type of argument being made here, it is worth men-
tioning that, in examining the representations through which national inter-
ests are constructed, one is asking a particular type of question. Specifically,
one is addressing a 'how-possible question' which asks 'how meanings are
produced and attached to various social subjects/objects, thus constituting
particular interpretive dispositions which create certain possibilities and pre-
clude others' (Doty, 1993: 298). 'How-possible' questions are different from
the conventional questions of international relations and foreign policy analy-
sis since these ask 'why particular decisions resulting in specific courses of
action were made'. These 'why questions', as Doty explains, are incomplete.
In particular, they,
practices and meanings which make possible the practices as well as the
social actors themselves. (1993: 298, emphasis in the original; see also
Wendt, 1987: 362-5)
R e p r e s e n t a t i o n s a n d t h e Construction o f National l n t e r e s t s
are inherently or necessarily connected and the meanings they produce come
to seem natural, to be an accurate description of reality.
Despite this apparent naturalness, however, the connections or chains of
association established between such linguistic elements are in fact conven-
tional - they are socially constructed and historically contingent rather than
logically or structurally necessary. The contingent character of such associ-
ations is captured well in the term 'articulation' itself. As Stuart Hall has said,
... the term has a nice double meaning because 'articulate' means to utter,
to speak forth, to be articulate. It carries that sense of language-ing, of
expressing, etc. But we also speak of an 'articulated' lorry (truck): a lorry
where the front (cab) and back (trailer) can, but need not necessarily, be
connected to one another. The two parts are connected to each other, but
through a specific linkage, that can be broken. (1986b: 5 3 )
they couldn't interfere in Vietnam', that ' W e should retaliate against the
Japanese for their unfair trade practices' and that 'Wc kicked Saddam's
butt'." Part of the common-sense status a n d hence the legitimacy of post-
war US national interests has resulted precisely from the often unquestioned
identification of individual Americans with 'the US', the imagined subject of
the US national interest. This process of interpellation thus helps t o explain
why pronouncenients by US state officials are often unhesitatingly accepted
by much of the American public.
T h e process of interpellation is facilitated hy the fact that representa-
tions of international affairs generally contain multiple subject-positions
into which concrete individuals can be interpellated. Claims about the US
national interest, for exarnple, make sense t o most Americans because they
are interpellated into a variety of already familiar subject-positions. As noted
above, they are hailed into the position of 'the US', into the imagined national
community of Americanness. In addition, they are sinlultaneously hailed
into other familiar subject-positions, including such comfortable identities as
the 'freedom-loving democrat' w h o opposes communism, the 'concerned
American patriot' w h o believes that 'we' should protect Americans abroad,
and the 'civilized Westerner' w h o is appalled by the excesses of Middle
Eastern terrorism. These identities help t o make sense of the claims entailed
in discussions of US national interests. For example, since 'we' Americans
are 'freedonl-loving democrats' and 'civilized Westerners', it makes sense that
'our' US interventions abroad are designed to advance liberty and freedom,
not t o promote self-interest o r tyranny.
As this discussion begins to indicate, the dual processes of articulation and
interpellation are of central irnporta~lcein the c o ~ ~ s t r u c t i oofn 'the national
interest'. Through these processes, visions of the international system - includ-
ing descriptions of one's own state, of other states and of threats - are created.
These representations, in turn, already entail national interests. An exarnple
will hopefully make this rather abstract argument more concrete. To illustrate
the way in which articulations create conventional representations that simul-
taneously interpellate subject-positions and bring with them particular
national interests, I examine the US construction of its national interest during
the so-called 'Cuban missile crisis'.
W ~ t h ~the
n US, the nature of the so-called 'Cuban m~ssdec r ~ s ~ISs ' treated as
self-ev~dent- the sltuatlon faced by the US In October o t 1962 was, and st111
IS, unproblemat~callyunderstood to have been the threat created by the Sowet
deployment of offenswe, nuclear-capable mlss~lesIn Cuba. T h ~ sdeployment
was seen as a clear threat t o the US because ~twas an Instance o f secretive,
dupllc~tousand dangerous aggression by a t o t a l ~ t a r ~ aSowet
n Unmn agalnst
246 Widening Security
ni~ss~les, w m e t ~ m e sappears to have been the malor cause for the crlsls. In
111s speech on 22 October, for Instance, Kennedy tns~stedthat ' t h ~ ssecret,
s w ~ f t ,and e x t r ~ o r d ~ n a rhyu d d ~ ~ofp Commun~stm~sstles... t h ~ ssudden,
clandestine d e c ~ s ~ oton statton strategic weapons for the f m t tune o u t s d e
of Sovlet s o ~ l wa\
' 'A deltherately provocative and unjust~ftedchange in the
status quo' ( 1 962: 5-6, emphas~sadded). H~ghlightmgthe 'cloak of secrecy'
(Kennedy, 1962. 5 ; R u s k , 1962: 720) under which the Soviet rnrssrle deploy-
ment proceeded was an tntentlonal strategy adopted by US state offic~als.
As Sorenson has stnce explamed, Kennedy
... worried that the world would say, 'What's the difference between
Soviet missiles ninety miles away from Florida and American missiles
right next door to the Soviet Union in Turkey?' It was precisely for that
reason that there was SO much emphasis on the sudden and deceptive
deployment. Look at that speech [of 22 October] very carefully; we
relied very heavily on words such as those to make sure the world didn't
focus on the question of symmetry. We felt that helped to justify the
American response. (quoted in Blight and Welch, 1989: 246, emphasis
in the original)
The outrage produced by the secrecy with which the Soviet missiles were
being deployed was rivaled only by the affront of Soviet duplicity. In his
missile crisis speech, Kennedy stressed this duplicity, arguing that the Soviet
deployment 'contradicts the repeated assurances of Soviet spokesmen, both
publicly and privately delivered, that the arms buildup would retain its ori-
ginal defensive character and that the Soviet Union had no need or desire to
station strategic missiles on the territory of any other nation' (1962: 3 ) . In
his speech to the OAS, Rusk emphasized Soviet deception as well, charging
that the Cubans and the Soviet Union were engaged in a 'partnership in
deceit'. 'The Communist regime in Cuba', he asserted,
with the complicity of its Soviet mentors hus deceived the hemisphere,
under the cloak of secrecy and with loud protestations of arming in self-
defense, in allowing an extracontinental power, bent on destruction of
the national independence and democratic aspirations of all our peoples,
to establish an offensive military foothold in the heart of the hemisphere.
( 1962: 720, emphasis added)
O n the US view, clearly, the missiles were 'offensive' in nature" and any
claims to the contrary were Soviet 'deception'.'"
According to this representation, then, the Soviet missiles in Cuba were
offensive weapons, deployed secretively and with duplicity by an aggressive
totalitarian state for the purpose of threatening the US and the Western hemi-
sphere. The US national interest entailed in this representation was unam-
biguous and quite obvious to US state officials. As General Maxwell Taylor
later explained, 'the President announced his objective within the hour of
248 Widening Security
seeing the photographs of the missiles: it was to get the missiles out of
Cuba' (quoted in Blight and Welch, 1989: 77).
The Puzzle
The question I want to ask is, how was this 'obvious' understanding of the situ-
ation, and the equally 'obvious' US national interest, arrived at?" After all,
the situation could have been represented quite differently. The official
Soviet account of the 'Caribbean Crisis' (e.g. Gromyko, 1971; Khrushchev,
1970) and the official Cuban story of the 'October crisis' (e.g. Dorticbs, 1962;
Castro, 1992), for example, provide alternatives to the orthodox US repre-
sentation. In both cases the Soviet missile deployment was understood as a
defensive measure designed to protect Cuba from anticipated US aggression.
Moreover, one can imagine other narratives that would present these events,
and the attendant US national interest, in ways quite different from the offi-
cial narratives of any of the participating states. Yet in the US, a single repre-
sentation - that of the 'Cuban missile crisis' - has 'assumed genuinely mythic
significance' (Blight et al., 1987: 170). To highlight the constructed character
of the 'Cuban missile crisis' and thus to make it clear that the US representa-
tion of that crisis does not simply reflect 'the facts', I briefly present two alter-
native accounts of the events of October 1962. The first alternative, which I
will call the 'defensive' narrative, is an amalgam of some of the salient aspects
of the stories of the 'Caribbean' and 'October' crises; the second, which I will
call the 'strategic' narrative, is a partially hypothetical account constructed to
illustrate the possibility of yet other representations of these events.
The stories of the 'Caribbean' and 'October' crises depict an altogether
different crisis than does the US account of the 'Cuban missile crisis'.38 This
'defensive' narrative highlights the defense of Cuba against US aggression. In
this alternative account, the crisis has its genesis in a long history of US hos-
tility toward and aggression against Cuba. The 'neocolonialist methods of
imperialism' (Castro, 1981: 87) pursued by the US in the Western hemisphere
and towards Cuba in particular were challenged by the Cuban Revolution of
1959 and the model of a socialist system that it presented to the other states
of Latin America. As a result, the US began almost immediately to pursue
aggressive policies against Cuba that were 'organized with a view to
forcibly changing its internal system' (Khrushchev, 1961: 9). In 1960, for
example, the US effectively cut off Cuba's supply of oil, its main source of
energy, by refusing to allow American-owned refineries to process Soviet
crude oil. In January of 1961 Kennedy severed diplomatic relations with
Cuba. In March he eliminated the Cuban sugar quota, threatening the highly
specialized and dependent Cuban economy with complete collapse. Then, in
April of 1961, the US orchestrated the infamous counter-revolutionary inva-
sion of Cuba at the Bay of Pigs. This attack was designed to trigger an anti-
Castro revolt which, the US hoped, would lead to the overthrow of the
legitimate revolutionary government of Cuba. Both the Soviet and the
Cuban governments were well aware of the clandestine plans and activities
\\ I t h 3 i Constructing National Interests 249
As Castro explained, the missiles were a logical solution because they could
protect Cuba; their presence in Cuba would have 'insured us against the
danger of a local war, of something similar to what the United States is doing
in North Vietnam, a war that, for a small country, can mean almost as
much destruction and death as that of a nuclear war' (quoted in Lockwood,
1967: 201). O n this view, then, the 'crisis' of October 1962 was caused by
US rather than Soviet aggression. The Soviet rnissile deployment in Cuba
was designed to protect Cuba, and especially the sovereignty and territorial
integrity of the revolutionary Cuban state, from imminent US a t t a ~ k . ~As"
Castro explained, Cuba 'flatly' rejected
... one thing Khrushchev might have in mind is that ... he knows that
we have a substantial nuclear superiority, but he also knows that we
don't really live in fear of his nuclear weapons to the extent that ... he
has to live under fear of ours. ... [W]e have nuclear weapons nearby, in
Turkey and places like that. (Trachtenberg, 1985: 177)
Khrushchev later put it in similar terms, arguing that the missiles were to,
... have equalized what the West likes to call 'the balance of power'. The
Americans had surrounded our country with military bases and threat-
ened us with nuclear weapons, now they would learn just what it feels
like to have enemy missiles pointing at you; we'd be doing nothing more
than giving them a little of their own medicine. (1970: 547)
O n this view, lJS national interests were not threatened because the outcome
was a more stable strategic relationship.
Second, one might have argued, as did then-US Secretary of Defense
Robert McNamara, that the Soviet missiles did not change the strategic bal-
ance in any significant way at all." At one point during the ExComm dis-
cussions of 16 October 1962, for example, McGeorge Bundy asked, 'What
is the strategic impact on the position of the United States of MRBMs in
Cuba? H o w gravely does this change the strategic balance?' McNamara
responded - 'Mac, I asked the chiefs that this afternoon. And they said sub-
stantially. My own personal view is, not at all' (Trachtenberg, 1985: 184).
More recently, McNamara has forcefully reiterated this point of view, argu-
ing that 'As far as I am concerned, it made no difference.' In fact, he argued,
'What difference would the extra 4 0 [Soviet missiles] have made to the over-
all balance? If my memory serves me correctly, we had some five thousand
strategic nuclear warheads as against their three hundred. Can anyone ser-
iously tell me that their having 340 would have made any difference? The mili-
tary balance wasn't changed. 1 didn't believe it then, and I don't believe it now'
(quoted in Blight and Welch, 1989: 23). According to McGeorge Bundy,
'most of us [the members of ExComml agreed with McNamara's summary
judgement at the outset, that the Cuban missiles did not change the strategic
balance' (1988: 452). O n this view, the Soviet missile deployment might have
been understood, strategically, as irrelevant to US national interests since
US nuclear and strategic superiority remained intact. As a result, according to
this representation, the US had no reason to seek the removal of the missiles
from Cuba. Its national interests simply were not at stake in these events of
October 1962.
Thc orthodox US representation of the 'Cuban missile crisis' was not, then,
self-evident. What has come to be understood as quite obviously the 'facts of
the matter' is, instead, a particular, and an interested, construction. The story
of the 'Cuban missile crisis' and the existence but marginalization of possible
alternative narratives thus bring to the forefront an important puzzle - How
was it possible for the events of October 1962 to he represented in the US in
this one, and not another, way? It is my contention that creating the represen-
tation of what became known as 'the Cuban missile crisis' required significant
constructive labor. What follows is a brief description of a few of the salient
aspects of that labor.
The orthodox US understanding of the 'Cuban missile crisis' and the attend-
ant US national interest hinged on the invocation and articulation of a variety
of objects and quasi-causal arguments and on the attendant interpellation of
many individuals, Americans and others, into the resulting representation. In
particular, the 'missile crisis' was constructed out of articulations that defined
the Soviet Union, the US, Latin America, the 'Western hemisphere', Cuba, the
Castro government and 'the Cuban people' as particular kinds of objects.
252 Widening Security
use the secrecy of the totalitarian state and the discipline to mask the effect-
ive use of guerilla forces secretly undermining independent states, and t o
hide a wide international network of agents and activities which threaten
the fabric of democratic government everywhere in the world. And their
single-minded effort to destroy freedom is strengthened by the discipline,
the secrecy, and the swiftness with which an efficient despotism can move.
(1961a: 367, emphasis added)
l:c 4 t i t > i Constructing National Interests 253
Long before the events of October 1962, the Soviet Union had already been
constructed as a state which would use, and in fact relied extensively on,
secrecy and duplicity in the pursuit of expansion. In a 1 9 8 7 interview, Paul
Nitze indicated the importance of this understanding to the construction of
the 'Cuban missile crisis':
(1965: 683, emphasis added). In this representation, then, the Soviet Union
was understood necessarily to be aggressive while the US, in contrast, was
necessarily peaceful.
During the 'missile crisis', the US was further distinguished from the
treacherous and secretive Soviet totalitarians through descriptions of the US
as a state that would only pursue 'open covenants of peace, openly arrived
at' (Wilson, 1918: 333). As Kennedy said in his speech of 22 October:
Stevenson reiterated this point, arguing that 'the North Atlantic Treaty
Organization, without concealment or deceit, as a consequence of agree-
ments freely negotiated and publicly declared, placed intermediate-range
ballistic missiles in the NATO area' in response to the threat posed to NATO
by Soviet missiles (1962: 729, emphasis added). This emphasis on the 'secrecy'
surrounding the Soviet missile deployment in Cuba and the contrasting 'open-
ness' of US extraterritorial missile deployments helped to obscure the sym-
metry between the two. It was part of an attempt to generate support for US
policy in the US, among US allies and in world opinion in general by pree-
mpting the thorny issue of the 'superficial symmetry' between the Soviet mis-
siles in Cuba and US missile deployments abroad, particularly those in Turkey.
As the US State Department explained, 'the distinction between Soviet missiles
in Cuba and US missiles in NATO countries' hinged on the fact that,
... our missiles abroad were established under open and announced
agreements with sovereign states. They serve to strengthen the inde-
pendence of those countries. Soviet missiles were placed in Cuba in secret,
without any public statements and without an alliance. Soviet bases in
Cuba symbolize that country's subjection to alien control and domination;
they were established without the knowledge of the Cuban people and
were manned by Soviet personnel. (US Department of State, 1962: 7-8,
emphasis added)
The Soviet missiles in Cuba, because they both belonged to and had been
secretly and treacherously installed in 'totalitarian' states, were necessarily
understood as 'offensive'. This image helped to preclude an understanding
either of the missiles themselves as 'defensive' weapons and of the Soviet
missile deployment as a 'defensive' act or of the deployment as an attempt
by the Soviet Union to rectify the severe strategic imbalance under which
they suffered. Since the Soviet Union was an 'aggressive totalitarian' state
and the US was a state which acts 'openly', an understanding of the Soviet
missile deployment either as the defense of Cuba against US aggression, such
as was provided in the 'defensive' narrative of the 'Caribbean' and 'October'
I 4 i Constructing National Interests 255
... there ,Ire those who wonder why we lthe US] have a r e s p o n s ~ b ~ l ~ t y
there. Well, we [the US] have ~tthere for the same reason that we [the US]
have a responslbil~tyfor the defense of Europe. World War I1 was fought
In both Europe and Asla, and when ~t ended we [the US] found ourselves
w ~ t hcontmued r e s p o n s ~ b ~ l for
~ t ythe defense ot freedom. (1965: 395)
and with surprisingly few casualties, given the extent of the fighting involved'
(1982: 3, emphasis added). That World War I1 was a US victory has typically
been taken for granted, although sometimes, as in Gaddis's case, Soviet
'Mephistophelean' assistance is grudgingly acknowledged. A central assump-
tion of post-war representations of the United States was therefore that the
US had 'won' World War I1 and this assumption carried part of the weight
of claims to legitimacy for US 'world leadership'.
This view can, however, be contested and its contestability highlights its
constructed nature. The notion that the US 'won' World War 11 has been
disputed, in particular by Soviet writers (e.g. Marushkin, 1970; Sivachev
and Yakovlev, 1979). In their view, not only was the Soviet role in World
War I1 decisive, but the United States suffered the 'surprisingly few casual-
ties' mentioned by Gaddis precisely due to the enormous effort of, and the
enormous casualties suffered by, the Soviet population. As is well known
but generally ignored, the brunt of allied fighting and the overwhelming
bulk of allied casualties in World War I1 were borne not by the US, nor by
the soon-to-be 'free world', but by the Soviet Union. As one scholar has sug-
gested, we would do well to recall the 'strategic arithmetic of 1944-5' -there
were 80 German divisions along the eastern front where the Red Army was
fighting, and only 20 on the western front where the American army was
fighting (Hallida~,1990: 9). O n this interpretation, the Soviet Union might
well be credited with victory in World War 11. Should the Soviet Union thus
have claimed 'world leadership'? For most Americans, of course, certainly
not. Yet, within the US, the articulation of 'world leadership' to 'the US' has
been justified as the natural consequence of its having emerged victorious
from the battle with fascism.
This representation of US 'world leadership' formed a leitmotif for post-
war US national interests. The US responsibility for world leadership pro-
vided a warrant for the claim that the US had the legitimate duty to defend
and promote freedom and to establish a stable world order. This particular
construction of the US also had at least three important consequences for the
US national interest, and thus for US actions, in the 'Cuban missile crisis'.
First, it legitimized, and indeed mandated, an activist US response to the
missile deployment - pursuing the removal of the missiles through whatever
means were deemed necessary - because it was part of the 'leadership' role
of the US to protect the free world, and especially the Western hemisphere,
from totalitarian aggression. Second, it marginalized other understandings
of this 'crisis', for example as an overreaction by the US either to a Soviet
attempt to protect Cuba from further US aggression or to a Soviet attempt
to begin to redress their embarrassing strategic inferiority. After all, 'we' who
are democratic and open, who 'stand for freedom' and for 'the independence
and equality of all nations' (Kennedy, 1961b: 396, 397), do not engage in
aggression against our smaller, weaker neighbors. The orthodox US repre-
sentation of the 'missile crisis' thus precluded any understanding of that cri-
sis as brought on either by US aggression against Cuba or by the US attempt
to maintain its already immense strategic superiority.
!I l-lt /is-. Constructing National Interests 257
On this argument, it was not possible for the US to tolerate the Soviet missile
deployment in Cuba. Such a policy would have been interpreted by the
adversary as weakness. It would therefore have undermined US credibility,
which in turn would have prompted further Soviet aggression in the Western
hemisphere, creating an even more dangerous situation to which the US
would be forced to respond in the future. As a result of this logic of escalation,
the US was compelled to act promptly and forcefully. In part through the
articulation of 'Munich' and the dangers of 'appeasement' to any US decision
to ignore or tolerate the missiles in Cuba, any such alternative understanding,
whether based on the defensive narrative, a strategic narrative or some other
representation of these events, was rendered infeasible and the US national
interest in forcing the removal of the missiles from Cuba was both constructed
and legitimized.
... enabled to demonstrate that the intellectual theories and ethical stand-
ards of utopianism, far from being the expression of absolute and a priori
principles, are historically conditioned, being both products of circum-
stances and interests and weapons framed for the furtherance of interests.
Notes
1. An earlier version of this article was delivered at the 1993 Annual Meeting of the
American Political Science Association, The Washington Hilton, 2-5 September 1993. I would
like t o thank Sanjoy Banerjee, Jean-Marc Blanchard, Bud Duvall, Jim Mahoney, Nicholas
Onuf, Dan Reiter, Diana Saco, Martin Sampson, Ann Tickner, Alex Wendt, the members of the
International Relations Colloquium at the University of Minnesota, the anonymous reviewers
at the European Journal of International Relations and especially Mark Laffey for comments
on various earlier versions of this argument.
2. For a recent survey of criticisms of the concept, see Clinton (1994: Chapters 2 and 4).
3. More recently it has been argued that there are 'two faces of state action', one international
and one domestic, and that additional state interests should be deduced from the location of the
state in domestic society (Mastanduno et al., 1989: 461). While this analysis adds state interests
related to the 'second image' to the traditional realist model, these interests are still treated as
given and as deducible from structures external to the state, rather than as socially constructed.
4. This limitation was, of course, touted as an advantage by Waltz, who argued that an
'elegant' systemic theory of international politics will explain 'what pressures are exerted and
what possibilities are posed by systems of different structure', but cannot, and should not
strive to, explain 'just how, and how effectively, the units of a system [i.e. states] will respond
to those pressures and possibilities' (1979: 71).
5. At least two recent literatures might be thought to provide a more substantive account of
national interests. The first addresses the role of 'ideas' (e.g. Goldstein, 1993; Goldstein and
Keohane, 1993) and the second addresses the role of 'epistemic communities' (e.g. Haas, 1992)
in the making of foreign policy. While both of these literatures provide a progressive problem
shift within realist theory by tackling the problem of policy indeterminacy, they d o not them-
selves address the question of the national interest. Instead, they consider the question of policy
alternatives within the confines of a single national interest without providing any information
on the origins of those interests themselves.
6. To see that two realists can come to quite dramatically opposed conclusions about the
national interest, one needs only to examine Hans Morgenthau's (1969: 129) and Henry Kissinger's
(1969: 130) conflicting prescriptions concerning US involvement in Vietnam.
7. A variation on this problem also undermines the otherwise useful discussion of the national
interest by Clinton (1994). Despite his welcome emphasis on argumentation and 'good reasons',
Clinton grounds his analysis in an objective notion of the 'common good' which particular
national interests approximate more or less well (Chapter 3, especially pp. 51-5).
8. Another useful demonstration of the inability t o deduce state interests and actions from
system structure can be found in Haggard (1991: 406-10).
9. It is to avoid the pervasive anthropomorphization of the state that I use the more trad-
itional term 'national interest' rather than the currentlv fashionable 'state interest'.
Anthropomorphizing 'the state' helps t o obscure, for example, the importance of processes
located primarily within domestic society in the construction of national interests, of state
action and thus of outcomes of international politics. Of course, the term 'national interest'
also brings with it unwanted baggage, specifically the ideas that what is in the interests of 'the
state' is also in the interests of some 'nation' and that there is a single
" interest which can be
attributed t o all members of a national community. By using the term 'national interest', I d o
not mean to endorse either of these connotations.
10. Furthermore, once one recognizes that interests and identities are constructed, as
Wendt does, there is n o theoretical reason to assume that the process of construction occurs
only, or even most importantly, at the interstate level. Unless one makes a prior, substantive
commitment to a state-centric analvsis., , it makes more sense t o assume that this constructive
process occurs in many places, including in the domestic context from which the linguistic and
cultural resources of most state officials are drawn.
11. These claims are not meant to reproduce the traditional distinction between 'unit-level'
or 'domestic politics' and 'system-level' or 'international politics' as alternative sources o r loci
of explanation. I would want, with others (e.g. Walker, 1993), to reject these as distinct 'levels
I: d d i i Constructing National Interests 261
of analysis' and instead t o understand the disttncr~onitself as a discursive strategy that allocates
power a n d helps t o construct a particular (realist) world. M y crltlque of Wendt therefore does
not imply that the national interest i\ 'really' t o be explained with reference t o 'domestic' rather
than t o 'systemic' factors.
12. And it 1s not just the content of interests, national o r otherwise, that are constructed.
'The very notion t h ~ 'interest'
t motivates action a n d s o should h e referred t o in e x p l a n a t ~ o n sof
b e h a v ~ o ra n d social outcomes is itself a relative novelty. It is with liberalism and the rise of cap-
itali5m t h ~ 'inrereit'
r first camc t o bc u n d c r m m d '1s the ~ n o t i v ~ ~forcr
t i n ~driving the actions ot
individuals. T h a t '~nterest'as J general c'ltegory, regardless of its content, should be of central
importance t o social analysis IS thus ~tselfa social construction rather than a natural fact. T h e
laborious ideologic.il process of e ~ t ~ ~ b l ~ s lthe i i n gprimacy of 'interests' is described by Albert
H ~ r s c h m a n(19 7 7 ) in his description of the vlctory, ,~cconipanyingthe 'triumph' of cap~t,ilism,
of the 'interests' over the 'pass~ons''15 the motivation for hum.un ,icrlon.
13. For a more elaborate discussion of the specific agents tnvolved in the construction of
post-war US national interests in p;lrticular, see Welcles ( 1993).
14. For a det'uled analysis of the US construction of 'the (:uhan problem', see Weldes and
Saco ( 1 9 9 6 ) .
15. Whtle 111s ,~drnittedlysomewhat , ~ n n o y i n gt o the reader, I often use inverted c o m m a s
t o highlight I~ngut\ticelements that 'Ire typically treated ,is o b \ ~ o u r l yreferential h ~ t h~ . ~t t'Ire
In tact contestable \oclal construction\.
16. For extensive discussion\ of the l o g ~ cof these argument\ w e W'eldes (199.3). <:rit~c,ll311~1-
Iyses of the ' h l u n ~ c hanalogy' m d the danger, o f appeasement c.ln he found in I.anyt (196;),
Kysrad (198 1-2), Rich.lrdsot1 ( 19881, and Beck ( 1989). The so-c,llled 'domino theory' is discussed
in Ross ( 1Y78), Sl,lrer ( 1 9 8 7 ) ,ind Jervis , I ~Snyder J ( 19 9 I ) .
17. Clcliniing that these qux,-causal .lrguments mLlynot he 'empirically valid' o r 'accur,ite'
does nor undermine o r contradict niy o w n constructtclst posttion. R'ither, I a m arguing t h ~ t
these empirical clatnis may he t,llse o n their o w n terms - t h ~ IS, t even if o n e treats such c o w
strucrtons a s given. t o r example, even if we clccept the construction o f some st,ltes a \ donli-
nos, the cioniino theory turns o u t t o I x t'llse. As Jerome Slater ( 1987) has argued, In n o case
has the logic o t the theor!, r h ~ ot n e small states' 'coll,lpse' W O L I I ~ precipitate the coll,~pseof
others, been fulfilled.
18. This IS r o ~ t g t i lthe~ sequencc ot collapse envisioned by Eisenhower in h ~ famous s artlcu-
latlon of the ' "fall~ngdomino" p r ~ n c ~ p l (19.54). e' Other U S o f h c ~ a l ssaw the sequence of trilling
dominos ( o r rotting apples and the I ~ k e\omewh,lt ) d~fferently,hut always with the same net effect:
the US must step in t o stop the coll,lpse ( o r rot o r wh,lrever). See, for example, Kull~tt( 1948),
Acheson ( 1969h) and US Sen,~te( 1947).
19. While n a t ~ o n a linterests, l ~ k eall \ o c d f ~ c t s are , s o c ~ a lconstructions, they belong t o 1'
spec~ficclass of social facts - that o t Interest\ - that are of p C ~ r t i c ~ ~importance ldr t o the mod-
ern explanation of s o c ~ a lphcnomena hecause the notion of interect, ,IS Connolly h ~ .lrgued, s
'is o n e of those concepts t h ~ connects r descriptive ~ n explan.ltory
d statements t o n o r n u t i v e
judgements'. T h ~ sis so t w x u s e reterence t o Interests 'c,irr~e\ ... into polltical discourw' the
presumption 'that people lor states] ought t o he able t o d o w h ~ they t choose o r want to d o
unless o v e r r t d ~ n gcons~derations~ n t e r v e ~ i since e' 'the sort of wants' designated by the term 'are
exactly those deemed t o he somehow important, perslsrent, h.lsic o r fundamental t o politics'
(198.3: 4 6 ) . It is tor this reason, a s 1 argued earlier, that the ' l a n g ~ ~ a gofe the national inrere\['
I S the 'internal I : u ~ ~ u o, f~d~ e ce~ s i o nin
' the making of foreign p o l ~ 111 c ~that it both refers t o the
goals pursued hy \tare o f t i c ~ ~ i111 l s f o r e ~ g npolicy a n d functions t o generrite the legitimacy of
a n d \ u p p o r t for t h . ~ tforeign pol~cy.( F o r a brief description of the c o n ~ p l e xhistory of the term
'interest', see Hirschman, 1977: 3 1-42.)
20. The tern1 'arttculat~on'is d ~ s c ~ i s s eind Hall ( 1985, 19 8 6 h ) , Grossherg (19 9 2 ) and Eagleton
(19 9 1 ). For a brief suggestion that the notion of ' a r t ~ c u l , ~ t ~ onnl ~' g h the useful in studies of inter-
national relations, see Jacohsen ( 1995).
21. M y chin1 that national Interests are social conrtructlons o h v ~ o u s l yrests o n a n under-
standing of lang~lage,IS constitutive o r productive of meaning. This model of language 1s c o n -
nion. in o n e form o r another, t o ,I wide r m g e of 20th-century philosophy a n d theories o t socir~l
262 Widening Security
inquiry. As Laclau and Mouffe have argued, if perhaps a bit strongly, 'the entire development
of contemporary epistemology has established that there is no fact which allows its meaning to
be read transparently' (1987: 84). Although often associated with so-called 'post- structuralists'
like Michel Foucault or 'deconstructionists' like Jacques Derrida, this conception of language
as constitutive is by no means limited t o them. See Shapiro (1981) for a useful overview of some
contemporary developments in theories of language and meaning of particular use to analysts
of politics. See also Gibbons (1987).
22. It is because the raw materials out of which representations, and thus national interests,
are constructed are cultural and linguistic that it is not possible to explain state identities and
interests purely in terms of interactions among states, as Wendt attempts to do. Such cultural
and linguistic resources, after all, are found, prominently, within states.
23. This rearticulation occurs, for instance, in the work of some revisionist historians such
as W.A. Williams (1962) and Kolko (1980).
24. This notion of 'articulation' - defined as a continuous and contested process of meaning
creation - refuses the assumption that dominant representations are determined, whether in the
first or the last instance, by 'the economic', by any other specific structure of social relations,
such as patriarchy, or by putative physical or material 'facts'. At the same time it also refuses the
complete arbitrariness of the connection between linguistic elements. As Raymond Williams has
cogently argued,
The notion [of arbitrariness] was introduced in opposition to the idea that the sign was an
icon, and it is certainly true that there is in general no necessary relation of an abstract kind
between word and thing in language. But to describe the sign as arbitrary or unmotivated pre-
judges the whole theoretical issue. I say it is not arbitrary but conventional, and that the con-
vention is the result of a social process. If it hits a history, then it is not arbitrary - it is the
specific product of the people who have developed the language in question. (1981: 330,
emphasis added)
national interest' can he both I'lrger a n d smaller than 'the state'. Larger objects niight be global,
such as human rights o r the environment. Smaller objects might he individuals, in particular
their economic, ecological a n d personal security interests. See, for example, Barnet (1988),
R u z ~ n( 1 9 8 3 ) and Matthew\ ( 1 9 8 9 ) .
31. T h e use of 'we' t o mean 'the US' and, specifically, actions taken by the US state is per-
vasive In Amencan culture. It c,ln he observed in public fora such a s newspaper editorials a n d
t e l e v ~ s ~ o~ntervicwc
n in which journ.llists, politicians a n d 'ordinary' folk routinely refer t o 'the
U S ' as 'we'. I n discussion with c o l l r ~ i g u t~. ~h o u this
t plicnorncno~iit has become apparenr t h ~ t
university students are also widely prone t o use this locution. An ~nrerestingresearch question
COIICC~II~ the extent t o which this ~ n t i n ~ a tidentification
e of ~ndiviciualc i t ~ z e n swith the stllte
a n d state policy is unique t o the US. On the basis of anecdot'll evidence p r o v ~ d e dby friends
a n d colleagues from diverse cultural hackgrounds, ~ n c l u d ~ ning p ~ r t i c u l a rCanada, India and
New Z e a h n d , this Intlmacy looks t o he a peculiarly Americ'in phenomenon or, a t least, t o he
more prevalent rn the US than elsewhere. If this is true, then the interpellat~onof i n d i v ~ d u ~ l s
Into the language of national Interecrs in other states either 1s ,iccompl~shedo n other grounds
o r is not accomplished a s successfully as ~r is In the US.
32. W h a t follows is J very abbrev~atedexamnle of the kind o t analysis reauired t o demon-
m a t e the construction of national Interests. t o r a much more cl.lborate analysis of the construc-
tion of the 'Cuban m i s d e crisi\' and thus of US n,irional interest5 in that crisis, see Weldes ( 199 1).
3 3 . T h e notion of the 'Western hemisphere', especially one thar IS protected hy the US under
the ,luspices of the Monroe Doctrine. is dlso a social construction, hut o n e that 1 d o not have
the s p c e t o d ~ s c u s shere. See, for example, van Alstyne ( 1 9 7 1 ) . ~ n dWeldes (1993: 453-66).
34. Academic representarlolls typ~callcreproduce the orthodox US narrative of the '(:uhan
missile crisis'. See, a m o n g others, Ahcl ( 1966), Alliwn ( 1 9 7 1 1, Blight a n d Welch ( 1 9 8 9 ) a n d
C;arrhoff( 1 9 8 8 ) .
3 5 . Even the putative 'oftensive' character of the S o v ~ e rm ~ s s ~ l ewas s in fact J US con-
struction rather thcln a self-el d e n t tact. T h e lJS defined the Soviet missiles a s 'offensive' hy
using the rtzpa0ilitrcs of the weapons, which could s t r ~ k edeep Into the US a n d Latin Anier~c,l,
'1s the c r i r e r ~ o no t offensivenesc. For the Soviet Union. in contr'lst. the character of the m~esile\
was definrd in term\ of their projected ~ i s e .Since the missiles had been deployed t o defend
Cuba from US a t t ~ c k ,the missiles were c o n s ~ d e r e dt o he detensive rather than offensive
( K h r ~ ~ s h c h e 1962:
v, 186).
36. This 'decept~on theme' was highlighted by Rrockricdc ~ n Scott d in their a n a l y s ~ sof
Cold War rhetoric. They argue that in Kennedy's speech 'the d e t a ~ l e daccount of S o v ~ e Jupll- t
city ... put the mildne\s of Anier~canresponse in brighter rehet land1 probably gave the 'idmin-
i s t r a t ~ o nthe adcantage in communicating with f r ~ e n d l ynations ,ind neutrals' (1970: 8 4 ) . Tlns
analysis mlsscs an important point. It represents the US response '1s mild in fact and neglects
the possibility thar the US response was constructed '1s niiltll hy the rhetoric ~tself.After ~ l l ,
from a perspective e r n p h a s i ~ i n gCuban sovereignty a n d the history of US aggression agalnst
Cuha, the US ' q ~ ~ a r ~ ~ n tofi nCe u' h ~ for
, from being 'mild', was ,In act of war. Furthermore, the
course chosen hy the US ,ldministr,ltion could be, and has heen, interpreted J S quite aggres-
cively setting the Soviet Union u p for humiliation. As J'lrnec N ~ t h a nput it:
37. This is not t o deny that differences of opinion a m o n g US state officials exlsted. In fact,
US officials disagreed over both the extent a n d the exact nature of the cris~s.As the p u h l ~ s h e d
ExConim transcripts ~ndicate,some US officials, notably the so-called 'hawks', certa~nlyt h o ~ ~ g h r
the problem more devastating than did those w h o came t o he labeled 'doves'. These same offic~,lls
264 Widening Security
also disagreed vehemently over the most appropriate policy response t o the missile deployment,
ranging in their views from the dovish 'negotiate with Khrushchev' to the hawkish 'invade
Cuba' (see, for example, Trachtenberg, 1985; Blight, 1987188; Blight and Welch, 1989; Garthoff,
1962). Nor is it to deny that one might interpret Kennedy's public pronouncements during the
'missile crisis' as significantly more hawkish than the statements he made in private at the
ExComm meetings. But these differences, which have been amply analyzed elsewhere (in addition
t o the sources just mentioned, see, among others, Abel, 1966; Acheson, 1969a; Allison, 1971;
Bundy, 1988; Schlesinger, 1965; Sorenson, 1965), are not the subject of this analysis. What I
am interested in is an issue which has received virtually n o attention - the surprising unanimity,
among a diverse set of state officials encompassing both 'doves' and 'hawks', on the existence
of a crisis for US national interests understood 'obviously' to require a response from the US.
Put another way, I am interested not in US policy choices but in the prior definition of the
problem to which these policy choices were to be a response.
38. The stories of the 'Caribbean' and 'October' crises can be told together because their
conception of the crisis itself, specifically its causes and its character, are the same. It is these
similarities that are highlighted in my brief rendition of this alternative account. Nonetheless,
the Cuban 'October crisis' also demonstrates at least one important difference from the Soviet
'Caribbean crisis'; specifically, it provides a significantly different portrait of the resolution of
these events. The story of the 'Caribbean crisis' typically ends on a positive note, albeit a dif-
ferent one than in the US narrative. O n this view, the crisis was resolved peacefully because the
US agreed, as the result of the Soviet missile deployment, not t o invade Cuba. The outcome
was thus not only a victory for peace, but a vindication of Soviet foreign policy and a triumph
both for socialism and for the Cuban revolution (e.g. Major General I.D. Statsenko, quoted in
Pope, 1982: 248). The 'October crisis', in contrast, ends on an ambiguous and at least par-
tially sour note. On this view, while the crisis did preserve Cuba and the Cuban revolution
from an imminent US invasion, it also highlighted the pawn-like status of Cuba in Cold War
international politics (e.g. Castro, 1992: 339).
39. Operation Mongoose is described in various US government documents recently pub-
lished by Chang and Kornbluh (1992). That the Cuban government was aware of these plans
was evident in the speech made by Cuban President Dorticos (1962) during the 'missile crisis'
and reasserted by Cuban representatives to the 1989 Moscow Conference on the crisis (Allyn
et al., 1992).
40. At least two US state officials ~ r o m i n e n in -
t constructing the orthodox 'Cuban missile cri-
sis' have in recent years acknowledged that there might be something to the 'defense of Cuba'
argument. In 1989, Robert McNamara announced that 'if I were a Cuban and read the evidence
of covert American action against their government, I would be quite ready to believe that the US
intended to mount an invasion' (quoted in Blight and Welch, 1989: 329). Similarly, McGeorge
Bundy has since acknowledged that 'Khrushchev certainly knew of our program of covert action
against Cuba, and he could hardly be expected t o understand that to us this program was not a
prelude to stronger action but a substitute for it' (1988: 416). Bundy is therefore now willing to
admit that,
In retrospect it seems likely that Khrushchev was also trying, although clumsily, to take account
of our warnings [against an offensive weapons deployment] by offering assurances that all his
deployments, of whatever sort, were defensive. Since we found it impossible to accept this
reading, we assumed too easily that his assurances reflected only a vicious deception. (414)
41. McNamara, who offered this analysis of the strategic situation in October 1962, nonethe-
less saw the 'Cuban missile crisis' as a significant threat to the US. Rather than interpreting the
threat as an upsetting of the existing strategic balance, as did some of his colleagues on the
ExComm, McNamara understood the threat to be largely a matter of the credibility of the
Kennedy administration with the American public (e.g. Trachtenberg, 1985: 186 ff)
42. By now, many critical analyses of the orthodox US 'Cold War narrative' exist. Particularly
intriguing examples are Carmichael (1993), Campbell (1992) and Dalby (1988, 1990).
43. The claim to US global leadership also has its roots in the allegedly unique character of
the United States as a nation. The exceptional character of the American nation has persistently
\\t.idc . Constructing National Interests 265
been understood to confer upon the United States certain rights and responsib~lities;in fact, it
has legitimized a global US missmn. According to Kennedy, tor example, the US had the 'right
to the moral leadership of this planet' (quoted in L.undest,td, 1989: 527). This vlew was, of
course, not specific to Kennedy. As Geir L.undestad has recently wrltten, 'Americans tradition-
ally have seen themselves as a unique people with a s p e c d mission in the world.' 4 s a result,
'While other states had interests, the Unxed States had responsihilrtirs' (Lundestad, 1989: 527,
emplias~sadded).
44. Prohlrni\ with thc logic <~uidthr empirical adt.qu.icy <,f this qunsi-causnl urgumcnt <lrc
discussed by Richardson (1988) and Keck (1989).
45.1 do not intend to imply either that 311 individ~i.lls,ire convinced by this particular proccss
of legitimation or that all ~ n d ~ w d ~ tthink
a l s the resulting 'comn~onsense' 1s sensible, only that
many or even most individuals do, most of the time. (See note 27 on p. 308) It should 3 1 ~
he noted that ichosc, consent 15 wanted or purs~tedvanes over time. Before the 'rise o f the ni;isses',
popular consent to toreign policies was not a central concern for decision-makers. Since the 'rise
o f the masses', however, popular consent to forelgn policy has become increasmgly important.
References
Carmichael, V. (1993)Framing History: The Rosenberg Story and the Cold War. Minneapolis:
University of Minnesota Press.
Carr, E.H. (1964 [1946]) The Twenty Years' Crisis, 1919-1939: An Introduction to the Study
of International Relations. New York: Harper and Row.
Castro, F. (1981) 'Angola: African Giron', Speech at Havana's Karl Marx Theater, 19 April
1976, reprinted in M. Taber (ed.) Fidel Castro Speeches: Cuba's Internationalist Foreign
Policy, 1975-1980, pp. 86-97. New York: Pathfinder Press.
Castro, F. (1992) 'Transcripts of Fidel Castro's Remarks at the Havana Conference on the Cuban
Missile Crisis', 11 January 1992, reprinted in L. Chang and P.A. Kornbluh (eds) The Cuban
Missile Crisis, 1962: A National Security Archive Documents Reader, pp. 3 3 0 4 5 . New York:
The New Press.
Chang, L. and P.A. Kornbluh (eds) (1992) The Cuban Missile Crzsis, 1962: A National Security
Archive Documents Reader. New York: The New Press.
Clinton, W.D. (1986) 'The National Interest: Normative Foundations', Review of Politics
48(4): 495-519.
Clinton, W.D. (1994) The Two Faces of National Interest. Baton Rouge: Louisiana State
University Press.
Connolly, W.E. (1983) The Terms of Political Discourse, 2nd edn. Princeton: Princeton
University Press.
Cox, R. (1981) 'Social Forces, States, and World Order: Beyond International Relations
Theory', Millennium 10(2): 126-55.
Dalby, S. (1988) 'Geopolitical Discourse: The Soviet Union as Other', Alternatives 13: 4 1 5 4 2 .
Dalby, S. (1990) 'American Security Discourse: The Persistence of Geopolitics', Political
Geography Quarterly Y(2): 171-88.
Dorticos, O.T. (1962) 'Address to the United Nations General Assembly', 8 October, Plenary
Meetings, Volume 2, 5 October-20 November, pp. 369-76.
Doty, R.L. (1993) 'Foreign Policy as Social Construction: A Post-positivist Analysis of US
Counter-insurgency Policy in the Philippines', International Studies Quarterly 37(3):
297-320.
Eagleton, T. (1991) Ideology: An Introduction. London: Verso.
Eisenhower, D.D. (1954) 'The President's News Conference of April 17, 1954', in Public Papers
of the Presidents, Dwight D. Eisenhower, 1954, pp. 382-3. Washington: Government
Printing Office.
Everett, M. (1989) Breaking Ranks. Philadelphia: New Society Publishers.
Fay, B. (1975) Social Theory and Political Practice. London: George Allen and Unwin.
Gaddis, J.L. (1982) Strategies of Containment: A Critical Appraisal of Postwar American
National Security Policy. New York: Oxford University Press.
Garthoff, R.L. (1962) 'The Military Significance of the Soviet Missile Bases in Cuba', memo-
randum, 27 October 1962, reprinted as Appendix D, Reflections on the Cuban Missile
Crisis, revised edn, pp. 202-3. Washington: Brookings Institution, 1989.
Garthoff, R.L. (1988) 'Cuban Missile Crisis: The Soviet Story', Foreign Policy 72 (Fall): 61-80.
Gibbons, M.T. (1987) Interpreting Politics. New York: New York University Press.
Goldstein, J. (1993) Ideas, Interests, and American Trade Policy. Ithaca: Cornell University Press.
Goldstein, J., and R.O. Keohane (eds) (1993) Ideas and Foreign Policy: Beliefs, Institutions,
and Political Change. Ithaca: Cornell University Press.
Gramsci, A. (1971a) The Modern Prince. New York: International Publishers.
Gramsci, A. (1971b) Selections from the Prison Notebooks, ed. and trans: by Q. Hoare and
G.N. Smith. New York: International Publishers.
Gromyko, A. (1971) 'The Caribbean Crisis, Part I: The US Government's Preparation for
the Crisis' and 'The Caribbean Crisis, Part 11: Diplomatic Efforts by the USSR to Eliminate
the Crisis', reprinted in R.R. Pope (ed.) Soviet Views of the Cuban Missile Crisis: Myth
and Reality in Foreign Policy Analysis, pp. 161-226. Washington: University Press
of America.
. .i Constructing National Interests 267
Grossberg, I.. (1992) W e Gottir Get orit of this I'lncr: Pvprrlirr C:onser~~atrsnr irnd Moiicwz
Ctrltzrrr. I.ondon: Koutledge.
Hans, I). (ed.) ( 1992) Knozc~ld,yc,I'o~uer arid Interrmtronirl I'olri-y C:oordinirtion, special issue
of lnternatrond Organrzntron 461 1 ).
Haggard, S. i 199 1 ) 'Structuralism and Its Crit~cs:Recent I'rogrcss in lnternat~onalRelat~ons
'Theory', in E. Adler ;und K. Crawford (eds) I'rogrrss in I'ostlc~irr lnternntronul Rc/irtiom,
pp. 403-37. New York: C:olumhi~.Un~versityPress.
Hall, S. (1985) 'Signification, Repl-esent~~tirm, Ideology: Alrliu\scr and the Post-structuralist
Debate', (:ritrciil Studies in M i i ~Cottzniu~ncation212): 9 1 - 1 14.
Hall, S. (1986a) 'The Problem of Ideology - Marxism W ~ t h o u tGuarantees', Jorrr~iiilof
Co~nrnrinici~trotr Inqnrry I O(2):28-44.
Hall, S. ( 1986h) 'On Postmodernisrn and Articulation: An Interbiew with Stuart Hall',]i~urn~rI
of Co~nnzunrr~~tion lnyrrrr?) l0i2): 45-60.
Hall, S. (1988) 'The Toad In the G.lrden: Thatcherism Among the Theorists', in C. Nelson and
I.. Grossberg ieds) Marsrsrit unri t h t Interprc~tatiort of C~rItrir~~, pp. 35-73. Urhana:
University o t Illinois I'ress.
Hall~day,I' ( 1990) 'The Ends of Cold War', N r w Left R C ~ W I180: I , .3-23.
her^, J. ( 195 1 ) Politrcal Rrirlrsrn m d Polrtrcal Idmlrsnr: A Strrdy in Theorres und Re 1 I rtres. '
Chlcago: Univers~tyof Ch~cagoPress.
Hirschnian. A. ( I 977) The lJ~7ssi~trs and the Interc3sts: I'olrtrc.Lrl Arguments for Cnprtizlisn~
Oc3forr its Trirrntph. Princeton: Princeton University I'res\.
Hoffrnann, S. ( 1978) Primizry or World Order: Aincrican Forcrgn Policy Since, thr, Cold Wilr.
New York: McCraw-Hill.
Hollis, M. and S. Smith ( 1990) Explirrnin~and Undrrstilndiizg 1iztcrnational Relations. Oxford:
Clarendon.
Jacohsen, J.K ( 199.5) 'Much Ado About Ideas: The Cognitive t:,ictor in Economic Policy', World
Politrcs 47: 283-3 lo.
Jervis, K. m d J. Snyder (ed<i (199 I ) L)ornrnos arid B~rtztin~a~ons: Striitegic Beliefs i i r d Grnrt
P o w ~ rCo~npctrtronrn t l ~ rEtiri7srm Rinzl~ind.New York: O v h r d University I'ress.
Johnson, 1..R. (1965) 'Address at Johns Hopkins Univers~ty:Peace w ~ t h o u Conquest', t 7 Apr~l
1965, Pzihlir Papers of the I'resrdrnts, I.yndon H. /ohnsorr. 1965, pp. 394-9. Washington:
Governnienr P r ~ n t ~ nOffice, g 1966.
Kahn, J.H. and h.K Long ( 1 972) 'The C u h a n Missile Crisis: .A Study of its Strategic Context',
Polrticid Srrcncr Quirrtrrl)~8714): 564-90.
Kelly, J. (199.5) "'Amicable Divorce" Could Turn Nast); Evperts Say', USA X)dily 22
November: I 2A.
Kennan, G.F. (1967) Mcinorrs. Boston: Little, Brown.
Kennedy, J.F. (19613) 'Address to the 39th Annu-il Convention of the National As\oci,ltion
of Broadcasters', 8 May 196 I, Public Papcus of t / ~ cI'rrsrdcnts, / o h F. Kennedy 196 1 ,
pp. 367-70. Washington: Govcrnnwnt Printing Office, 1962.
Kennedy, J.F. ( I96 111) 'Speci,~lM e s a g e to the Congress on Urgent National Needs', 25 May
I 96 I, P L ~ / ) /l'irpe~s
IL of the Presidents, l o h n E Krnncdy, 1'16 1, pp. 396-406. Washington:
Government Print~ngOft~ce,1962.
Kennedy, J.F. (1962) 'The 115 I<esponse to the Soviet M~lit.iry Buildup in Cuba', lieport to the
American people, 22 October 1962, State Department P u h l ~ c a t ~ o7449, n Inter-American
Series 80. Wa\h~ngton:(;overnment Printing Ott~ce.
Kht-ushchev, N. (1961) 'Measage from N.S. Khrushchev, Chairman of the USSK Counc~lof
Ministers, to US President 1. Kennedy', 2 3 April 1961, repr~ntedin Current Digest of t l ~ e
S o m ~ I'YCSS
t 1 3 ( 1 6): 9.
Khrushchev, N. ( 1 962) 'Letter to Kennedy', 26 October 1962, reprinted in L. Change and
P.A. Kornhluh (eds) T l ~ eCrthirn Missile Crisis, 1962: A Ni~tional Smrrrty Arc-l~i~~e
L)ocuinents Kc'7tlcr. pp. 18.5-8. New York: The New Preys.
Khrushchev, N. ( 1970) K h r r t d ~ c h rR~wrc~nrbers,
~~ wtth an ~ntroduction,commentary and notes
h y E. C:r:inksh,iw, trans, and cd. h y 5. Talhot. New York: Bantam Books.
268 Widening Security
Kissinger, H.A. (1969)American Foreign Policy: Three Essays. New York: W.W. Norton.
Kolko, G. (1980) Confronting the Third World: United States Foreign Policy, 1945-1980.
New York: Pantheon Books.
Lacan, J. (1977 [1966])Ecrits: A Selection, trans. A. Sheridan. New York: W.W. Norton.
Laclau, E. (1979)Politics and Ideology in Marxist Theory. London: Verso.
Laclau, E. and C. Mouffe (1985)Hegemony and Socialist Strategy. London: Verso.
Laclau, E. and C . Mouffe (1987)'Post-Marxism Without Apologies', New Left Review 166:
79-106.
Lanyi, G.A. (1963)'The Problem o f Appeasement', World Politics 15(2):316-28.
Lockwood, L. (1967)Castro's Cuba, Cuba's Fidel: An American Journalist's Inside Look at
Today's Cuba. New York: Macmillan.
Luce, H.R. (1941)The American Century. New York: Farrar and Rinehart.
Lundestad, G. (1989)'Moralism, Presentism, Exceptionalism, Provincialism, and Other Extrava-
gances o f American Writings on the Early Cold War Years', Diplomatic History 13(4):
52745.
Marushkin, B. (1970) 'American Falsifiers and the Facts o f History', International Affairs
(Moscow) 6 (June):15-22.
Mastanduno, M., D.A. Lake and G.J. Ikenberry (1989) 'Toward a Realist Theory o f State
Action', International Studies Quarterly 33(4):457-74.
Matthews, J.T. (1989)'Redefining Security', Foreign Affairs 68(2):162-77.
Milliken, J. (1994)' A Grammar of State Action: US Policymakers' Social Construction of the
Korean War'. PhD dissertation, University o f Minnesota.
Morgenthau, H.J. (1951) In Defense of the National Interest: A Critical Examination of
American Foreign Policy. New York: Alfred A. Knopf.
Morgenthau, H.J. (1952) 'Another "Great Debate"': The National Interest o f the United
States', American Political Science Review 46(4):961-88.
Morgenthau, H.J. (1969)A New Foreign Policy for the United States. New York: Frederick
A. Praeger.
Morgenthau, H.J. (1978)Politics Among Nations: The Struggle for Power and Peace, 5th rev.
edn. New York: Alfred A. Knopf.
Nathan, J . (1975)'The Missile Crisis: His Finest Hour', World Politics 27(2):256-81.
Norris, J.G. (1961) ' N o Missile Gap Exists, Defense Study Shows', New York Times 7
February: 1.
Paterson, T. (1988)Meeting the Communist Threat. New York: Oxford University Press.
Pope, R.R. (ed.) (1982)Soviet Views of the Cuban Missile Crisis: Myth and Reality in Foreign
Policy Analysis. Washington: University Press o f America.
Purvis, T. and A. Hunt (1993)'Discourse, Ideology, Discourse, Ideology, Discourse, Ideology
...', British Journal of Sociology 44(3):474-99.
Richardson, J.L. (1988)'New Perspectives on Appeasement: Some Implications for International
Relations', World Politics 40(3):289-316.
Rosenau, J . (1968) 'National Interest', in D.L. Sills (ed.) International Encyclopedia of the
Social Sciences Vol. 1: 34-40. New York: Macmillan.
Rosenberg, J. (1990) 'What's the Matter With Realism?' Review of International Studies
16(4):285-303.
Ross, G. (1978)'The Domino Theory,' in A. de Conde (ed.)Encyclopedia of American Foreign
Policy, Vol 1: 275-80. New York: Charles Scribner's Sons.
Rothstein, R.L. (1972)'On the Costs o f Realism', World Politics 87(3):347-62.
Rusk, D. (1962)'American Republics Act to Halt Soviet Threat to Hemisphere', Statement to
the Council o f the Organization o f American States, 23 October 1962, Department of
State Bulletin 12 November 1962: 720-3.
Rystad, G. (1981-2) Prisoners o f the Past? The Munich Syndrome and the Makers of American
Foreign Policy in the Cold War Era, Vol. 2. Studier utgivna av Kungl. Humanistika
Vetenskapssamfundet, Lund, Sweden: CWK Gleerup.
A c i t i c l i Constructing National Interests 269
Schlesmger, A.M. ( 1 965) A 7'hozrsarzd Days: / o h ): Ketznrefy 111 the Whrte House. Boston:
Houghton Mifflin.
Shaplro, M.J. ( 198 I ) Langi~agc,anti lJolrtrcal llnderstnntiittg: Tlx. Polrtrcs of Discursrl~cPrizrtices.
New Haven: Yale Univrr5ity Press.
Siv,lchev, N.V. and N.N. Yakovlev (1979) Rrtssia a n d the Urtrtc~eiS t a t ~ strans.
, O.A. Titelbau~n.
Chicago: Un~versityo f C h ~ c a g oI'ress.
Sl'lrer, J . ( 1 9871 ' I h m i n o s in Central America: Will They FiiII? I>oes it Matter?' 1nterrt~7tro~1aI
Srrrrrrty 1 I ( ? ) : 105-.34.
S m t h , 1.' ( 1989) Discertrilig the SrrO~~ct. Minneapolis: University of Minnesota I'ress.
Sni~th,S. ( 1986) 'Theories of Foreign Policy: ,411 H ~ s t o r ~ c over a l vie^', RCLGPW of Intcr~ratiomzl
Strrtircs 121 1 ): 13-29.
Sonderman, ]'.A. ( 1987) 'The (hncepr of N'ltional Intere\t', in W.C:. Olson (cd.) T/JC T / J C ( J ~ ' ~
irnd I'rarticc, of Itztrrttirtiorrill R C ~ L ~ ~ I O 7th
I I Sedn,
. pp. S7-65. Englewood Cliffs: I'rentice-
Hall.
Sorcnson, T. ( 1 965) Ke~~rreti?: New York: Harper & Row.
Sreel, K. (1969) 'Endgame', review of R.F. Kennedy, Thrrtccw D~rys.N e t i ~York Kelwc, of
Hooks 13 M x c h : 18.
Steel, R. ( 1970) I'irx Atttcwrrltra: 717r Cold W'zr Ewprre attti t l ~ cPolltics of (;oz4r1terrevol11ti~111,
rev. edn. New York: V ~ k ~ nI'ress. g
Stevenson, A. ( I 962) 'UN Securit) Council Hears US <:Iiarges of Sovier Mtllt.iry Buildup In
<:uha', Speech t o the U n ~ t e dNations General Assembl~,2 3 October 1962, Depart~ncntof
Stirtc. Hrilletirr I 2 Novctnher: 723-34.
'l'cxt o f IJN-Culi,tn Notes' ( 1962) 2 7 October, Neu' York 'lrrtrr~s2 8 Octoher: 3. I .
Tomlinson, J . ( 199 1 ) Crrlt~trirlIrnprrii7lrsv1: A Crrtrc-01 I~ltrodrr<-tir~rr. Baltimore: Johns Hopkins
l i n ~ v e r s ~ Pres\.
t)
Trachtenberg, hl. (ed.) (1985) 'Wli~tetlouse Tapes . ~ n dM ~ n u t e sot the Cuban M ~ s s ~ Cris~s: lc
The ExComm Meet~ngsof October 1962', 1ntcmi7tiotral Scclrrity 1 O(1): 164-203.
Truman, H.S. ( 1 94.5) 'Specul h2essage t o Congress Recommending the Establish~nentof a
lkparrment of Nation.11 Defense', 19 December 194 5. Prrhlic Papers of the I'rcsrcicnts,
Horry S. Trr~nrirn,IWi, pp. 546-60. Washington: Government Printing Office.
Tucker, 1i.W. ( 196 1 ) 'I'olitical Ke,llism , ~ n dForeign Pol~cy',World Polrtirs l 3 ( 3 ) : 4 6 1-70.
US Department of State, Bureau of Publ~cAffatrs ( 1962) 'Developments in the Cuhan Siruation:
Quc\tions rid Answers', k o r c ~ g rAffmrs ~ Ot4tlr17es, I l e p a r t ~ i i ~ on ft Stare I'uhlic~tion 7454,
Inter-Anicric,in Series 8 1. W,i\Iiington: Government I'rint~ng Office.
US Natlonal Securiry Counc~l(1950) 'NSC' 68: Un~red Sr.lto Objectives and Program\ for
National Secur~ry',14 April 19.50, reprinted in T.H. I:r;rold . ~ n d1.1.. Gaddis ( e d ) Co~~tirrm~lc'rtt:
Docrrttrrrrts oil Anzencm I'olic!' find Strrztec<q<tWT-t9.YO, pp. 1 8 5 4 4 2 . New York: Columh~a
IJniversity Press, 1978.
US Senate, Conirnirtec o n Foreign I<el,itioni (19471 t'orclgr~ Rrlref Assistnnc-e Act of IY3R.
Hearings, ',+\s\istance to (;rec.cc and Turkey3.Washington: Government Printing Office.
van hl\ryne, R.LY (1971) 'Thc Monroe llocrrine', in Alexander cic C h d e (ed.) t x c y l o { ~ c d r ~ i
of AII~~'~IL.LIII ~ I J Y P I R MPoll(-y VoI. 2: 584-961. New York: Charles Scr~hner'sSon\.
W'llker, li.K.,I. ( 1993) Irrsri~c~lO~ctsiiic: 117te~~rti7trottol
k'liltiorls '7s P d i t i r d T / ~ c ~ o r<:,imhr~dgc:
y
(:an~hridge Llnivers~t)1'1-cis.
W,iltz. K ( 1979) T/~eor?,of Intrrr~dtionir/Po/itrt.s. New York: klcC;raw-Hill.
Welch, D.A. ,uid ,J.G. Blight (1987188) 'The tleventh Hour of the Cuban missile (:r~si\:An
Introduct~onto the E\(:ornm Transcr~pts',InternLrtiorr~rl .Set-zrrity I2(.3): 5-92.
Weklri, 1 . (199.3) '(;orrstr14~trr7fiNi7tro~ldIrlterests: T/J? 1.091~of (1.)' Ni7tro17t11 . k r ~ r r t ?111 ' ~/JC
I'osl- War I-rir'. PhD lli\irrtation, lJn~\ersit)of M ~ n n e i o t ~ l .
Weldcs, 1 . and I). Saco ( 1996) ' h l a k ~ n gState Action Possible: The US Construction of "the
Cub,ln problem", 1960-1994'. Mrllennirrr?~2.5121, torthco~ning.
Wendt, A. ( 19871 'The Agent-SII-ucture I'roblcm in Inrcrnation,~lIlelations Theory', Irrtcw~rtroni7l
0rgL1~rrzL7tro~r 4 l ( 3 ) : .3.3 5--0.
270 Widening Security
Wendt, A, (1992) 'Anarchy is What States Make of It: The Social Construction of Power
Politics', International Organization 46(2): 3 9 1 4 2 5 .
Williams, R. (1981) Politics and Letters: Intervxws with New Left Review. London: Verso.
Williams, W.A. (1962) Tbe Tragedy of American Diplomacy, rev. edn. New York: Delta Books.
Wilson, W. (1918) 'Address to Congress', 8 January 1918, reprinted in T.A. Bailey, Woodrow
Wilson and the Lost Peace, pp. 3 3 3 4 . Chicago: Quadrangle Books.
Multiple Identities, Interfacing Games:The Social
Construction of Western Action in Bosnia
K.M. Fierke
T he end of the Cold War raised serious questions about the dominant
paradigms of International Relations, and particularly neorealism,
given the failure to predict one of the most dramatic changes of the
century (Allan and Goldmann, 1992; Bowker and Brown, 1993; Caddis,
199211993).Some realists now emphasize that it was not realism per se that
was put to test by these events, but the rigid structural realism of Kenneth
Waltz, which dominated at the time (Wohlforth, 1994l1995: 92). While real-
ists have traditionally emphasized historical contingency, Waltz abstracted
from the detail of any particular historical context in order to formulate a
more generalized theory regarding the continuity and repetition of balanc-
ing behaviour hy states. In his view, to form a theory 'requires envisioning a
pattern where none is visible to the naked eye' (Waltz, 1986: 37).
The historical particularity of the events giving rise to the end of the Cold
War, as well as the greater emphasis in recent years on ideas, perception and
interpretation by scholars of various stripes (Campbell, 1993; Gagnon, 19941
1995; Owen, 1994; Wendt, 1992; Wohlforth, 199411995),' suggest that Waltz
may have got it wrong in arguing that greater explanatory power is gained by
abstracting and moving away from the detail (Elshtain, 1995: 273, 277). One
purpose of this article is to suggest an alternative approach to the analysis of pat-
terns in International Relations, a form of analysis that requires moving closer
to the detail rather than abstracting. These patterns are not to be found in cause-
effect sequences which are repeated throughout time,' but in shared rules,
drawn from the past, by which actions are constituted. The metatheoretical
approach examined here builds on the later work of Wittgenstein (1958),
and particularly his use of 'language game^'.^ A second purpose is to apply this
approach to a cursory analysis of a post-Cold War context: the war in Bosnia-
Herzegovina. It is unusual to combine this kind of metatheoretical exploration
with a concrete application within a single piece; in this case the two parts are
interdependent since the significance of the analytic tools can only be demon-
strated by putting them to use.
This exercise is less explanatory of the Bosnian context in any complete
sense than illustrative of a particular approach to analysis. The choice of con-
text did, however, result from a number of questions that arose against the
background of the dramatic events during the summer of 1995. The first
was how to understand the apparent stalemate or inability of 'the West' to
act. The second was how to understand the transformation of the Western
position by the end of August 1995 towards more interventionary strategies
thought originally to be unrealistic in this context. The analysis does not
extend beyond the NATO bombing campaign at that time.
Multiple Identities/Multiple G a m e s
description of discrete objects; agents, actions and objects are given meaning
within the context of a game, that is, a set of practices based on rules within
which they are constituted in relation t o one another (Wittgenstein, 1958: 1,
7, 23, 65, 66).
A chess analogy is useful for elaborating the significance of this
approach.Vmagine a chess board with all its pieces. Based on the 'words
as labels' approach, we are immediately confronted with the question of
whether to attach the label 'piece of wood' or 'piece of metal', whatever the
case might be, to the various pieces or, by contrast, the labels knight, bishop,
pawn, etc. Once we concede that the latter is the most concise label, we are
forced to recognize the dependence of these identities on the larger game of
chess. The identity of a piece of wood as a knight, what one does with it, that
is, move two spaces one way and a single space another, cannot be detached
from the rules of the game of chess (Wittgenstein, 1958: 31). Likewise, we
could not begin to observe two players moving objects around on a hoard
and say anything meaningful or strategic about these moves or the process
by which the game unfolds without knowledge of the rules (Wittgenstein,
1958: 33). Any move made within a game of chess can be understood to be
an expression of following or breaking the rules of chess, since these rules
prescribe the boundaries of what can reasonably be said about it or done
within it. It would be meaningless, as well as nonsensical, to begin invok-
ing the rules of monopoly to describe the interactions between players of
chess.
A central point of this chess analogy is to begin thinking about patterns
belonging to social relations in a way that can be distinguished from the regu-
larities and patterns presupposed by the notion of n causal law. The search
for causal laws is considered to be important precisely because of a desire to
establish the existence of recurring features of International Relations. The
source of regularity in this case is assumed to be independent of human
meaning. To explain something is to identify that which necessarily caused
it. This relationship, at least in reference to a covering law model, is neces-
sary because of a recurring pattern under which it can be subsumed. A law
either exists or it doesn't. The purpose of falsification is to make a valiant
effort to demonstrate that it probably does by looking at the most difficult
case in which it might not.
By contrast rules are explicitly social and thc patterning or regularities
we associate with them are dependent on people following them over and
over again.' The game of chess would change significantly i f we stopped
following the rule that knights move two spaces forward and one sideways
or vice versa. A rule cannot be applied just once; it is like a custom that is
continuously reproduced through our practice (Wittgenstein, 1958: 199).
Rules d o not determine behavior in the way that causal laws are said to. We
follow rules in acting but it is perfectly possible to break a rule or begin fol-
lowing a different set of rules (Wittgenstein, 1958: 201). Failing to follow a
rule in n o way falsifies it. However, in a situation governed by a consistently
applied set of rules, if everyone for some reason stopped following them
274 Widening Security
and took up another game, we could say that one set of rules had replaced
another. While laws are the basis for identifying a singular cause, there are
multiple rules belonging to multiple games.
The question is why choose a metatheory and method based on one or
the other approach, that is, causal laws or rules? The standard argument is
that causal laws are superior because they allow us to explain why one vari-
able necessarily caused another by identifying this relationship with a recur-
ring pattern. The goal is to construct theories of international relations of
equal status to the theories of the natural sciences. The problem is how we
ever identify any two events across time as the same, which is a necessary
step in order to make the claim that a pattern has recurred. O n the basis of
the positivist model, this involves an act by the scientist of naming two con-
texts as similar. Explanation, in this case, begins with the categories of the
scientist which he sets out to compare with the world.
In this case attention shifts to acts of naming by the subjects of study. An
analysis of this kind is not explanatory in the way that a positivist model
claims to be explanatory. Following rules does not involve the determinancy
associated with causal law. However, by providing a descriptive account of
a particular world, including the meaning of acts in relation to objects and
in relation to the acts of others, we do explain what happened. We explain
the unfolding of a context in much the same way that the observer of a
chess match explains to an audience the relationship between different moves
and the eventual outcome of the game. As the analogy suggests, the unfold-
ing of one game is not a guide to how future matches will unfold. Such an
approach makes it possible to explain the particularity of outcomes by situ-
ating them within the rules of a game. This approach is useful in a case like
Bosnia since it is not recurrence that needs to be explained but a change in
strategy and, in addition, a diversion from that which had initially been
defined as most 'realistic'.
The specificity of an outcome can be understood by reference to a system
of rules. Rules are social in nature and, therefore, inseparable from human
meaning. If one says she would like to play a game of chess but does not
know the rules, and the other responds by saying 'sorry, they are a secret', it
is not possible to engage in playing. Rules constitute not only the identity of
the pieces with which the game is played, but the meaning of any particular
move, which can be repeated by anyone who engages in play (Wittgenstein,
1958: 54). Moving a knight two spaces one way and a single space another
is meaningful precisely because it relies on a rule which is the basis for innu-
merable players - and even a computer6 - to move a knight in this w a y in
each game of chess that is played. The pattern is evident in what is done, that
is, an act, repeated over and over again by players of chess who will never
know one another but know what it means to play this game and how one
goes about the playing. No two games of chess will follow precisely the same
course, however. In fact, the future chess champion may recognize, in the
range of possible moves from any one position on the board, the wisdom of
avoiding certain past mistakes. The only sense in which one can meaningfully
I t i Multiple Identities, interfacing Games 275
The first point is more useful for thinking about the process by which
meaning is attributed to a context as observations are situated within a
coherent framework. This framework represents a selective interpretation,
emphasizing certain features and ignoring others, which circumscribes the
range of reasonable responses. The second point is useful for understanding
a change in Western strategy toward Bosnia as the larger game unfolded in
the spring and summer of 1995. The naming of a context is not static, but
is part of an ongoing process. As a game unfolds. the relationship between
the pieces and the range of possible moves is transformed. What is rational,
and therefore realistic, from one position during a match, may become less
so at a later stage as the configuration of the game changes. The notion of
historical tournaments belonging to a larger game of war also sheds light
on the fact that most strategies described below did represent an effort to
avoid certain mistakes of the past. The epistemological point of the chess
metaphor is that social reality, like a game, is constituted on the basis of
rules, meaningful because of a history of past use, by which players know
'how to go on'. The world is not simply given, and apprehended through
observation, but is constituted, and made meaningful, as actors apply one
set of distinctions as opposed to another.
Naming Games
Before one can set out to play a game a decision has to be made about the
particular game to be played or - more appropriate to a social context - one
has to determine the type of context within which one is situated and the
actions meaningful to it. In everyday social life, this process of naming hap-
pens as a 'matter of course' (Wittgenstein, 1958: 217, 238). The rules are
lived rather than consciously applied. The range of actions belonging to a
context of 'greeting someone' or the types of situations in which one might
'offer a cup of tea' are so familiar that they don't even seem to fit the cat-
egory of rules by which we know 'how to go on' in particular contexts.
Similarly, within the Cold War one might argue that moves by the super-
powers had become so familiar after several decades of playing that they
seemed to belong to a natural order. As the Cold War crumbled, and with it
old practices, the difficulty of situating ourselves in a game and therefore
knowing how to go on, has become more apparent, and most particularly in
former Yugoslavia where the naming of this context has, since the beginning,
been very controversial. While generally referred to as a war, the issue of
which war it most closely resembled - World War I or 11, Vietnam, the Gulf
War, etc. - was significant in establishing the parameters of how to go on in
this context, not to mention the identities of the different players involved.1
What follows is a brief sketch of various interpretations which have
been drawn on to name the Bosnia context. It is important to emphasize
that these represent Western interpretations, not those of factions within
Bosnia itself. These constructions are based on clusters of related categories,
I L r i :* Multiple Identities, Interfacing Games 277
In this interpretation, the actions of the Serbs share a family resemblance with
those of Hitler; they are trying to capture territory in the name of an ethnic-
ally pure state and to ethnically cleanse territory of a particular category of
'
people: the Muslims.' This naming constitutes clear categories of aggressor
(Bosnian Serbs), victim (Bosnian Muslims) and potential liberator (the West,
NATO). Within the context of this game, inaction on the part of the West is
a form of appeasement which will have predictahle consequences. The most
rational action by the potential liberator, by contrast, is to stop the Serhs and
liberate the Muslin~sfrom the extreme suffering to which they have been sub-
jected.'"he consequence of not taking this action at an early stage in the
conflict will he an increase in the power of the aggressor which will only
make the larger confrontation that will necessarily follow more bloody. While
familiar from the context of the Cold War, within which arguments against
appeasing the Soviet Union were the standard fare of NATO, this interpret-
ation was more likely to be heard from European peace movements or parties
to the left most concerned about the injustice being done to the Muslim popu-
lation in Bosnia." Like other interpretations, this one emphasized avoiding a
mistake of the past, which in this case is Chamberlain's appeasement of Hitler
at Munich. Appeasement is a sign of weakness which will only increase the
strength of the aggressor. Intervention would lead to liberation of those who
suffer and thereby result in a winning strategy. Intervention involves a range
of primarily military actions including fighting on the ground, as distinguished
from talking which was said to have resulted in appeasement. Talking and
fighting are in an oppositional relationship within this game.
In contrast to the asgunlent for intervention, n~any,in the early stages of the
war, argued that Bosnia had the potential for becoming another Vietnam, an
argument with particular salience in the United States as the 20th anniversary
of the withdrawal of American troops was approaching. The logical conse-
quence of this type of reasoning is that the West shouldn't get involved. It is
a Bosnian conflict based on nationalist and ethnic differences going back
centuries, anlong peoples who have been trained in guerrilla warfare. The
United States does not want to repeat the experience of Vietnam. As in the
former interpretation, a mistake from the past shapes what is understood to
278 Widening Security
Gulf War
World War I
control, drawing in other major powers.'y Sarajevo is the site at which World
War I broke out, and is on the faultline of historical great power conflict. Peace-
keeping, as a strategy, is an attempt to avoid the mistake of World War 1. Great
power conflict is to be avoided by involving the major contemporary powers
directly in decision-making over this conflict in a peaceful way within the
Security Council. Peace-keeping would preserve the balance of power politics
within the United Nations, thereby preventing an escalation of tensions at
this level, while attempting to respond to the humanitarian disaster in Bosnia
by sending troops to protect refugees and to facilitate the passage of humani-
tarian aid. In contrast to the Cold War, during which warnings of appease-
ment constituted a 'realist' approach, this interpretation was largely viewed
as the most realistic. As Robert Howse (1995: 2) states:
In the realist view, national conflicts are inherent in the deep structure of
international politics in the post-Cold War era. These conflicts cannot he
prevented or solved, but rather the major task is to prevent their escalation
into unhounded and unstable competition between the major powers.
This, for different reasons, suggested a minimalist response to the Yugoslav
crisis, a response that would not require a hard choice between the dif-
ferent traditional allegiances of the European powers in the Balkans ...
and would therefore prevent the Yugoslav crisis from escalating into a
conflict among the major powers. Of course, an underlying assumption
was that decisive intervention would require the intervening powers to
choose sides. ... Unless either of these main perspectives on the post-Cold
War world order have misunderstood the character of nationalism in the
contemporary world, we are compelled, whatever our moral sensibilities
and instincts, to view the Western response to the Yugoslav crisis as
entirely reasonable. As for the sanctions against Serbia, UN intervention
in the form of peacekeeping, negotiations, and so forth, these can best
be seen as relatively low-cost, politically rational responses to an unedu-
cated public opinion, which demands that 'something must be done'. To
decry the failure of these measures is to assume that Western statesmen or
policy bureaucrats ever seriously believed they would lead to a resolution
of the war.
Public Reasoning
barbed wire fences tapped the public consciousness; it was not merely the raw
observation of starving men, but rather the meaning of this image, 50 years
after World War 11, and after 50 years of saying 'never again'. O r from the
American side, the significance of the Vietnam scenario was the meaning of
sending American troops abroad into a conflict that was potentially as unwin-
nable and complex as the debacle 20 years earlier.
The question of how to respond to Bosnia had a clear public dimension,
and was not merely a matter of the rational calculation or the intentions of
individual^,'^ as is often emphasized in the study of International Relations.
Acts of naming a social game relate t o processes of public reasoning by
which leaders attempt to establish the greater rationality of one game over
another. Kratochwil (1989: 11) makes a distinction between the rationality
of individual choice and processes of public reasoning:
Since rules and norms influence choices through the reasoning process,
the processes of deliberation and interpretation deserve further attention.
While various choice models have attempted to give a coherent account
of certain aspects of choosing, such as specifying rational action as a
maximizing choice under certainty, risk or even certain conditions of inter-
dependence, these models are of limited help in understanding the re-
asoning procedures we use when we argue about our grievances. In that
case the reasonableness, fairness or appropriateness of our valuations and
their attendant claims to priority are at issue. Here the rational-choice
models are of little help precisely because the criteria of traditional ration-
ality presuppose the independent and fixed valuations of the actors.
However, most of our arguments concerning policy or rights are not so
much about the determination of the likely result, given a certain distri-
bution of 'preferences', as they are debates over which preferences deserve
priority over others, which ones ought to be changed, and which judge-
ments deserve our assent. Here the overall persuasive 'weight' of claims
rather than their logical necessity or aggregation is at issue.
ideas about morality and what the 'ordinary man' is thinking (Carr 1964:
146-9). Public opinion, in addition to economic and military capabilities, is
an important category of power in his analysis, which is a point that has
been largely lost on later realists. One might argue that the significance of
this opinion has only increased with the advent of television, and even more
so with the globalization of communications in the post-Cold War world.
President Clinton articulated the difficulties of foreign policy decision-
making in the post-Cold War era, given the need to explain policy choices
to the public very quickly and the lack of stable categories for framing each
new situation. As presented by Jonathan Alter (1993: 4 ) -
The role of the media in framing these games means that the choice of
the most 'realistic' strategy is not totally in the control of experts or diplo-
mats, who are forced to fit their analyses into sound bites. Media depictions
take on a life of their own. O n the one hand, they become both an import-
ant source of information for those making decisions o n the ground and in
Western capitals. O n the other hand, the media simultaneously responds to
and constitutes the public response.
T h e Analysis of G a m e s
Actions are dependent on language for their meaning. While experience may
be individual it can only be meaningfully understood or communicated on the
basis of language, the rules of which are shared.lZIt is not possible to simply
observe behavior, to understand its meaning in the absence of language, any
more than we know or can learn the meaning of the various chess pieces or
the rules by which they are used in the absence of language.24 Language is
woven into the range of acts constituting a game and language is the vehicle
by which we are socialized into, or learn the rules of how to proceed in any
context. Analysis of language games does not deny the importance of material
objects or capabilities. This is not an argument about the importance of ideas
over military and economic capability. Rather, the instruments of action take
on meaning or a particular use or avoidance of use is justified within the fram-
ing of a particular game. The capability of the US or NATO to use force was
less at issue in this context than the rationale, political will or moral necessity
to do so. The 'realist' response to Bosnia was initially to avoid the use of force
and to emphasize peace-keeping and negotiations, given fears that the conflict
would spiral out of control. The central question here is how the 'West' moved
toward alternative strategies by August 1995 which had initially been con-
sidered 'unrealistic'.
The naming of a context is an act in itself which establishes a set of
distinctions and the boundaries of action (Hinds and Windt, 1992: 9). The
public reasoning behind these interpretations is also a part of this act of
naming in so far as it contributes to the constitution of one game or another
as dominant. When put into place, each of the resulting games specifies the
moves specific to it, such as intervening, threatening o r facilitating the move-
ment of convoys. One class of acts is not by definition undertaken with lan-
guage, but the meaning attached to them is dependent on language. Particular
movements, which to the observer may look similar have distinct meanings
within different games; intervening and invading, for instance, cannot be dis-
tinguished on the basis of pure observation.
There are also classes of acts which, like naming, cannot be undertaken
without language. Within the Cold War, the 'threat' to use nuclear weapons if
the Soviet Union crossed a line in Central Europe and the 'promise' to the
Western Europeans that the United States would protect them were two such
acts. The dependence on nuclear weapons does not subtract from the fact that
284 Widening Security
'threatening' and 'promising' are speech acts and they are speech acts that
were not only undertaken by state leaders but were part of the shared lan-
guage by which the Cold War was c o n s t i t ~ t e d In
. ~ ~that context, threatening
and promising were part of the same game - the threat to the Soviet Union
was part of the realization of the promise to protect Western Europe.
These same two acts are also undertaken within Bosnia, although their
meaning is constituted within different games. In 1992 the UN's 'promise
to protect' focused on the humanitarian convoys supplying relief to civilians
suffering as a result of the conflict. The idea of a 'safe haven' was first applied
in March 1993, in response to attacks by Bosnian Serb forces which resulted
in thousands of Bosnians seeking refuge in S r e b r e n i ~ aThe . ~ ~ protection of
refugees was understood within the traditional UNPROFOR mandate and
was not supposed to detract from UN 'impartiality'. In this context UNPRO-
FOR was authorized to act in self-defense, including the use of force, in
reply to attacks against the safe areas.27 The Security Council also decided
that member states could, acting nationally or through regional arrange-
ments, use all necessary powers, including air power, to support UNPRO-
FOR. In January 1994 NATO issued a declaration which, in addition to
emphasizing the importance of a negotiated solution, reaffirmed their readi-
ness, under the authority of the Security Council 'to carry out air strikes in
order to prevent the strangulation of Sarajevo and other threatened areas'
(UN, 1995: 84). While previously any air support had been explicitly des-
ignated for purposes of self-defense of UN personnel, NATO was author-
ized to use air strikes for pre-emptive or punitive purposes, but only on the
basis of a decision by the North Atlantic Council. The deterrent threat was
first and foremost intended as protection of UN personnel who were engaged
in protecting the refugees in the 'safe havens'.
The 'threats' and the 'promises' in this construction can be understood
as actions belonging to two separate yet interfacing games, with the UN
peacekeepers at the intersection of both. Bennett and Thorson (1991: 133)
distinguish different types of deterrence, one of which is extended deter-
rence involving the protection of third parties, as in the US protection of
Western Europe with its nuclear umbrella. They state the difference between
two types of deterrence as follows -
Notice the structure of the interfacing threats and promises in the Bosnian
context, with p representing the UN peace-keepers, s the populations in the
safe havens, n NATO and b the attackinghhreatening party in Bosnia.
P attempts to dissuade b from doing harm to p, who is protecting s, a situ-
ation of direct deterrence in so far as the threat to use force is in self-defense,
and not directly tied to the protective task of the peace-keepers toward the
f ~ i s lLe
i Multiple Identities, Interfacing Games 285
safe havens. This can be distinguished from the formula n hopes t o avert
attack by b on p, a third party, who is also protecting a fourth party, s. The
peacekeepers are a t the intersection of the two threats within two poten-
tially conflicting games.
O n the one hand, the threat to use force in self-defense is a move in a
game in which the peace-keepers as the protectors of refugees are 'impartial'.
The NATO threat, as a form of third party deterrence, intended t o protect
the peace-keepers, who are t o protect the populations in the safe havens, is
much more conducive t o an interpretation of 'partiality' in which the peace-
keepers and those they protect blur t ~ g e t h e r . ' Also,
~ this game constructs a
clearer distinction between threatener and potential aggre~sor.~'
In the one case that the deterrent threat from NATONN actually worked,
the two games were closely interfaced and reinforced the 'impartiality' of actors
under UN auspices. The first articulation of the threat was inspired by inter-
national outrage in response to the 58 civilian deaths in the bombing of Central
Market in Sarajevo on 5 February 1994. Boutros Boutros-Ghali argued, in
a letter t o the Security Council, that the incidents made it necessary, in accord-
ance with Resolution 836 ( 1994), to prepare 'urgently for the use of air strikes
to deter further attacks' (UN, 1995: 86). An ultimatum was issued demanding
that, within 10 days, all parties move their heavy weapons outside the ex-
clusion zone surrounding Sarajevo o r be subject to NATO air strikes. The
Russians stated that the call for both the Bosnian Serbs and the government to
place heavy weapons in Sarajevo under UN control or withdraw them was
close to their position, but disagreed with 'interpretations' of the ultimatum
by some NATO members as a 'one-sided ultimatum to the Bosnian Serbs'
(UN, 1995: 87).
While interpretation of the Sarajevo ultimatum allowed for a specific focus
on the Bosnian Serbs, the 'impartiality' so central to the peace-keeping game
was maintained since both sides were implicated, if not equally. In this con-
text, both parties did, for the time being, move their heavy weapons outside
the exclusion zone. After Sarajevo, the use of the NATO threat increasingly
focused on the Bosnian Serbs who were attacking safe havens populated by
Bosnian Muslims, which set the stage for alternative moves by the Bosnian
Serbs within a Gulf War game.
the actors themselves as well as extending the analysis over a longer period
of time. The goal of this sketch is to illustrate the transition from one set of
interfacing games to another at a time of dramatic change (see Figure 1 on
page 289). This section is written in the present tense in order to situate the
reader within the changing games, based on the action categories used at
the time.
Between the Sarajevo ultimatum in February 1994 and the massive tak-
ing of UN hostages by the Serbs at the end of May 1995, moves are made
by each side which transform the interfacing games by which the Bosnian
context had been constituted. Bosnian Serbs step up acts of 'harassing'
peace-keepers, 'hijacking' their equipment, 'blocking' convoys of aid and
'shelling' safe havens, at a time when they are increasingly 'isolated', 'los-
ing morale' and falling behind the Bosnian government army. In the months
prior to the hostage taking, the credibility of the threat of air strikes erodes,
as requests for air support are 'overruled' by the UN and avoided because
of the appearance of 'impartiality'. The United Nations, at the same time,
is 'bowing' and 'making concessions' to the Serbs. By contrast, the UN tri-
bunal on war crimes names Karadzic and Mladic, the two foremost leaders
of the Bosnian Serbs, to be suspected war criminals, which transforms them
from one of two perpetrators of a conflict into the perpetrators of genocide,
torture and 'ethnic c l e a n ~ i n g ' . ~ ~
While the decision to introduce the threat of air strikes in 1993 repre-
sented an interfacing of a Cold WarIGulf War and a peace-keeping game, by
late May 1995, as UN hostages are taken en masse by the Bosnian Serbs, the
dominant playing field begins to shift toward two alternatives. The first illus-
trates the distinction between threatening within a Cold War and a Gulf War
game. The Cold War was constructed around mutual threats, buttressed with
nuclear weapons, between two major powers. By contrast, taking hostages
and placing them at the site of potential military retaliation is an act within a
game involving a major power possessing a significant military advantage
over a weaker power. Saddam Hussein, in an effort to deter the realization of
the threat to bomb by the US-led coalition, used Western hostages as a human
shield.
Like the latter, the Bosnian Serbs - not only weaker in relation to
NATONN, but increasingly at a disadvantage in relation to Bosnian gov-
ernment forces - retaliate against NATO air strikes by taking UN peace-
keepers hostage. Many of these 'hostages' are handcuffed to military targets
and used as 'human shields' to deter further air strikes. The main demand of
the Bosnian Serbs, now named 'terrorists' in the Western press, is a 'prom-
ise' to halt the air attacks. NATO is unwilling to rule out further bombing;
the UN, on the other hand, refuses to authorize any further NATO actions.
While applying the name 'terrorist' to the Bosnian Serbs, Western or UN
actors make moves that are contrary to the conventional wisdom of how
one deals with terrorists, that is, they 'make concessions', against the back-
ground of threats by the Bosnian Serbs that any attempt to 'liberate' the
hostages would be writing their death warrant. A secret deal is made between
I Multiple Identities, Interfacing Games 287
UN officials and the Bosnian Serbs for a release of the hostages in exchange
for a promise that there will be no more bombings (Cohen, 1995; Evans
and Boyes, 3 995). The hostages are gradually released as it becomes appar-
ent that no further air strikes will be undertaken. The promise to protect the
UN peace-keepers is at this point - in so far as these allegations are correct
- coupled with a promise to the Bosnian Serbs that the UN will not attack,
instead of being coupled to either the deterrence threat or the promise to
protect the safe havens.
As hostages, the peace-keepers are unable to protect the Muslim popu-
lations and public attention is diverted from this goal to 'protecting the
peace-keepers', a pattern that reappears at a later point as Dutch peace-
keepers in Srebrenica are taken hostage in mid-July. The impossibility of
protecting the Muslim population, forced to flee as the 'safe haven' col-
lapses, is recognized and, while concern is expressed about the plight of the
refugees, energy is directed to getting the Dutch soldiers out o f Bosnia.
With the effective collapse of the peace-keeping game, another historical
analogy is reinforced as a defining feature of a second game - Chamberlain's
appeasement of Hitler at Munich. Within this naming of the context, Serbian
aggressors are once again advancing on the Muslims who, as targets of 'eth-
nic cleansing', are victims in the conflict. The Bosnian Serbs, refusing to call
the UN peace-keepers 'hostages', refer to them as 'prisoners of war', who are
aligned with the Muslim 'enemy', and therefore clearly 'partial'. The Bosnian
Muslims, especially by the time of Srebrenica, clearly emphasize their pos-
ition as 'victims' of Serb aggression, condemning, along with many inter-
national commentators, the failure of the West in this desperate situation,
and emphasizing Western 'appeasement' of the Bosnian Serbs, against the
background of criminal acts such as 'ethnic cleansing'.
There is a family resemblance between the two new games. 'Appeasing'
and 'conceding' or 'bowing' are similar acts. Both games are structured
around an 'aggressor', 'victim' and potential 'liberator'. 'Liberating' and
'appeasing' or 'conceding' are opposing possibilities within these games. The
identity of the victim in each game is quite different, however. In the 'hostage
taking' game, the peace-keepers are in the position of 'victim' and the United
NationsINATO in that of potential liberators who, rather than 'liberating',
are suspected of making secret 'concessions' to the terrorists in the form of a
promise to forego further air strikes in return for release of the hostages. In
the 'ethnic cleansing' game, the Muslim population of Bosnia is the 'victim',
and the United Nations the potential liberator, who instead is accused of
'appeasing' the aggressor. 'Concessions' were made to the Bosnian Serbs in
this case as well."
Against the background of two cases of hostage taking en masse hy the
Serbs, France, Britain and The Netherlands make an effort to launch a Rapid
Reaction Force for the purpose of 'beefing up' the protection of UN personnel
and making a more 'muscular' response. Clinton uses the same language in
relation to the air strikes, drawing more explicitly now on a Gulf War 'recipe'.
Both become controversial and deepen divisions within the Atlantic Alliance.
288 Widening Security
The main question regarding the Rapid Reaction Force is whether it will have
an interventionary role or be merely an extension of the peace-keeping man-
date. The French in particular, with the British by their side, step forward
as the leaders of this new more 'muscular' and 'firm' approach. UN Special
Representative Akashi, about the same time, reassures the Serbs that this force
will not step beyond the traditional mandate for peace-keeping, a move for
which he is severely criticized. The transatlantic conflict is exacerbated by
European concern about the air strike strategy and American demands to lift
the arms embargo on the Bosnian government, as well as mixed signals from
Clinton regarding the possibility of deploying UN troops to assist in a with-
drawal of UN peace-keepers.
The American Congress, beginning with the Senate vote in July, calls for
the arms embargo to be lifted and various Islamic countries promise, about
the same time, to provide arms to the B ~ s n i a n s In
. ~response,
~ Clinton threat-
ens to veto the Senate proposal, pleading that NATO's bombing strategy be
given one last chance. On the same day, NATO makes an announcement that
it will respond to all Serb actions against the remaining safe havens with
intensive bombing of Serb command and supply targets.34 Senate majority
leader Dole makes it quite clear that the Senate vote on the arms embargo is
meant as a 'signal' to both NATONN and the Bosnian Serbs, regarding the
consequences of their respective inaction or action. As these steps are taken,
the two games that were explicitly avoided in the first instance, move into the
realm of possibility, accompanied by talk of the impending collapse of the UN
mission. A 'beefed up' Rapid Reaction Force, possibly for interventionary
purposes, and 'deciding to lift the embargo' become the symbol of 'doing
something' at a time when the United Nations has been exposed to repeated
'humiliation' for failing to act effectively to protect either the Bosnian popu-
lation or its own peace-keepers.
Constructing a Stalemate?
Conclusions
Given the central role of the moral imperative to 'do something' in constitut-
ing the possibilities for action at different points in time, the relationship
between the moral and the 'realistic' needs some rethinking. Realists have trad-
itionally argued that morality is secondary to national interest as the basis for
state action. However, many realists emphasize that moral discourse can play
an important role in constituting the power of the state, even if the ultimate
rationale for action is national interest.35In this context, there is a direct rela-
tionship between moral outrage, expressed in international public opinion,
and diversions from the 'realist' course of doing as little as possible in order to
keep the conflict from spreading. The articulation of the threat of air strikes
emerged immediately in response to international outrage over the death of 58
civilians in Sarajevo. Demands for withdrawal of the peace-keepers emerged
after the May 1995 hostage taking. Actions to lift the arms embargo against
Bosnia were taken against the background of two hostage takings and the
'ethnic cleansing' of 'safe havens'. A logical consequence of the 'realist' rela-
tionship between moral discourse and power is that too large a gap between
moral appearance and action (or inaction) diminishes that power.
While some realists recognize a role for moral discourse in constructing
state action, they cannot account for the underlying significance of this
~ u k i p l eIdentities, Interfacing Games 291
for this context, as the basis for a range of contradictory games; based on
a second cut, the UN - and the West - were engaged in a stalemate game
constituted by acts which reinforced indecision and division. While the con-
sequence of both is the same - an erosion of the credibility of multilateral
institutions - the first arises from the inability to construct coherent action
and the second from a deliberate strategy of inaction.
These sketches are simplified representations of a range of interpretations
and moves in this context of change. A 'thicker' description, adding an analy-
sis of documents from the various actors, might provide the basis for a more
detailed understanding of the structure of moves by which the war was con-
stituted. The purpose of this analysis has been to introduce an alternative way
to think about the patterning of International Relations, based on shared
rules, drawn from the past. The patterning is to be found in the constitution
of identity and action, based on the rules, rather than a similarity in outcome.
Empirically, this preliminary analysis points to the role of interfacing
games as a factor in constituting Western inaction and action in Bosnia.
One question for further investigation, which emerges from this analysis, is
how particular games or strategies come t o be understood as the most 'real-
istic'. 'Avoiding appeasement', a realist strategy in the Cold War and the
Gulf War, was considered unrealistic in the early stages of Bosnia. A largely
non-military strategy of peacekeeping and negotiation, by contrast, was
considered 'realistic'. The contrast harks back to the classical realist con-
cern with the contingency of historical context, in contrast to the greater
emphasis on abstraction and the search for universal laws more character-
istic of neorealism. The contrast also highlights the intersubjective nature of
these processes of naming and of power, which is implied in classical real-
ist thought, but never explicitly recognized.
Notes
This piece was written while the author was in residence at the Amsterdam School for Social
Science Research, University of Amsterdam. She would like t o thank the Amsterdam School
for their generous support of this project and the following people for their comments on draft
versions of the article: Tarak Barkawi, Andreas Behnke, Shampa Biswas, David Blaney, Bert
Bomert, Sherry Gray, Keith Krause, Peter Lawler, Jennifer Milliken, Iver Neumann, Nicholas
Onuf, Richard Price, David Sylvan, and the referees of the EJIR.
1. With the constructivist move of the last decade, many scholars of International Relations
have argued that the identity of states is constituted rather than given. More recent literature in
the positivist tradition has focused on the causal role of ideas. This is particularly evident in the
'democratic peace literature', much of which argues that democratic attitudes cause peace.
There is also an increasing emphasis o n the perceptions or interpretation of leaders, by both
realists and liberals.
2. Many scholars have argued that the scientific study of world politics has not found any-
thing of importance. See, for instance, Ferguson and Mansbach (1988: 220) o r Hawthorn
(1991: 160-1). The latter states that 'generalisable answers of what we conventionally think
of as a causal kind have ceased t o be persuasive. The casual connections or runnings-on that
we have been able to detect in human states of affairs have turned out either t o have t o be
i 1c.r i r Multiple Identities, Interfacing Games 293
phrased at a level that is so general as to be insufficiently informative and not address our
Interests in explan.ltion; or to he so conditional as not t o be general'.
3. This IS not meant t o he an exegesis of Wittgenstein's thought, hut rather an elahoration
o n the signif~canceof his notion of a language game for the analysis of International Relations.
Wittgenstein was nor a social sc~entistand therefore 1 w ~ s ht o 'lvoid any pretension of following
his &as to the letter. although 1 hope I have captured the splrir.
4. For a related, but distinct, analysis of Wittgenstein's chess analogy, see H o l l ~ sand Smith
( I YC) I ) a n d 1 1<1lli\ ( 199.5).
5. 1 a m referring t o constltutlvc rules, although there is cons~derabledebate about the e p -
arahil~tyof constltutlve and regulative rules. See Onuf (1989: 5 1 ) and Kratochwil (1989: 26).
6 . The tact th.it a computer can be programmed t o engage in a game o f chess, t o such a
high degree of conlplexity ;is to compete with a chess~mstersuch :IS K.isparov, dramatizes the
social nature o f rules, that is, that they 'Ire acquired, rather th,in based o n 'mental processes'
of individuals.
7. Wittgenstein eniphasues that rules of language games are not fixed in the way they are in
a rrame o f chess. It IS ~reciselvbecause the rules are not fixed and because there are nl~~ltiple
poss~blegames, t h ~ we t need to tocus on how they are put t o use in practice, rather than con-
structing ideal models (Witrgenstein, 1958: 8 1, 84, 85, 90, 100, 10 1).
8. Th15 reterence to histor~calanalogy m,lkes one t h ~ n kimrned~atelyof the work of Kohert
J e r v ~ s(1976). There is a significant difference, however, In so f,lr as he examines the role of
these .unalogie\ In the cho~cesof ind~wdualpolicy-rmkers, I,awd on their belief cystcrns.
I empIias17e the fund,lrnentally social nature of these analogles and r h e ~ rrole In processes of
p u h l ~ creasoning. Yucn Foong Khong (1992) has done more recent work o n the role of hts-
torical analogy in the context of the Vietnam W'lr.
9. 1 a m indehted to I h v d Blaney, Macalcster (:ollegc, for the ~ngeniousinsight thnt the
naming of games, descr~bedin the following, can be understood a s sets o f strategies, drawn
from the experience of past w:lrs, which belong to the repertoire ot poss~blemoves. Rather than
thinking ot each (1t the game.; as dict~nct,they should he understood to be nested in a larger
game. Each h i s t o r d strategy i j a s p e c ~ f ~chess
c match, with111which momentous blunders or
SUCCCSS~UI I ~ I O V C Swere nude, ~ n probide
d a model for reasoning J ~ O L I current
~ strateg!.
10. The distinct~onhet~vccna name ,IS a 'label', '1s opposed to naming as an 'act', hy which
we selectively interpret realit), making certain kinds of distinctions and constituting certain
pos\ihilities, needs to be cmphasizcd agair (W~ttgenstein,19.58: 27, 49, 59, 257, 4491.
I I. Wittgensrein (1958: 202, 2 3 8 ) says following a rule is ,111alogoust o obeying an order,
t h ~ IS,t it IS practice, done '1s J matter of course, rather than someth~ngone consciously thinks
about. The idea that leaders consc~ouslychoose str,ltegles based o n identification with a past
context would s e e r to he ~nconsistentwith rhis point. However, in this case, the process of
narnung is less choos~ngfrom 1' repertoire of past strategies; rather the naming acts were insep-
~ r a h l efrom ohservat~on,w h ~ c hselect~belyattr~butedIneanlng on the b a s ~ sof one I,uiguagc
game or another. It is less a matter of choosing which rule to obey than obeying a rule in the
act of presenting Bosnia as one type o f context or another.
12. For the relationship hetween interpretation and rule, we W~ttgenstein(19.78: 1981.
13. I f one were t o focus o n the texts of local, as opposed t o Western actors, t h ~ sscript
would he pos~tioned ditfererrtly, with the Serbs a w ~ i a t ~ nthe g Croats w ~ t hthe IJmshe,
H~rler'spuppets d u r ~ n gWorld War 11 who massacred t h o u s a n d of Serbs, Jews, etc.
14. The precise move that constitutes 'stoppmg an aggressor' may differ from one contest
ro another. When pl~tyedwithui the Cold War, it was an argument for deterrence; in this context
it is 311 argument tor ~ntervention.
1.5. O n e example of rhis is a plece hy Martin Shaw (199.i) which begins with an analysis
of a change in the position of the Western peace movement ,lnd the Left in general towards
intervention since the end of the Cold War. While oppwition to Western intervention had heen
a p o ~ n tof con<ensuc, various examples of genocide, and former Yugoslavia is the most note-
worthy, were calling the old position ~ n t oquestion. In analysing Bosnia he points to several
missed opportunit~est o halt the contlict e.lrly on, which 'might have inhibited the appalling
carnage of the p ~ s rime t months'. He states, 'In a situation like Bosnia, the determined use of
294 Widening Security
limited military force is necessary to halt the massacres, to bring their perpetrators to inter-
national justice and to begin to restore civilian economy and society in a pluralist state. Without
such clear evidence of Western determination to protect the people, war is likely to spread until
everlarger-scale and less discriminating Western intervention is the unhappy consequence'.
16. The positive historical example that should be repeated, and which might help the US
go beyond the paralysis of Vietnam, it is argued, is the Reagan doctrine, by which freedom
fighters around the world, such as the Nicaraguan Contras and the Afghani Mujahadeen, were
supplied with arms by the United States. See, for instance, Helms (1995).
17. This game might also be given the name Cold War, which is the prior example constitu-
ting its rules; there are a number of reasons, aside from the conventional nature of the two later
conflicts, for giving it the name Gulf War, however, which will become clear later in the analysis.
18. A 1500-page plan for this large-scale campaign was prepared under the title 'Operation
Determined Effort'.
19. I uncomfortably use the term peace-keeping game throughout this text for two rea-
sons. First, some may find the word 'game' offensive in this case, given the human suffering
involved. I want to emphasize that my use of the word relates to rules and the attribution of
meaning, and does not carry a connotation of artificiality or lightness. Second, peace-keeping
games contrast uncomfortably with references to Gulf War or World War I1 games, in which
the potential strategy is more directly tied to the historical analogy. The fit is less direct since
peace-keeping, as a relatively new development, was not an available option in the World War
I context, even though the rationale in Bosnia was to avoid the mistake of this era.
20. This game was played in a number of locations around the world during the Cold War.
The playing field has changed in this case since the notion of a peace-keeper presumes the exist-
ence of a peace which is to be kept. No such agreement had been found at the time of writing
and the numerous ceasefires that had been declared by both parties were consistently violated.
21. Their identities can be distinguished from the other game, however, in so far as they
are not aggressor and victim but constitute the conflict together, although they are recognized
as possessing different capabilities.
22. For a discussion of the embeddedness of intentions in human customs and institutions,
see Wittgensteiu (1958: 337).
23. Wittgenstein (1958: 241) makes the distinction between the expression of opinions,
which people often do not share, and the shared rules of language, as follows: 'So you are say-
ing that human agreement decides what is true and what is false? - It is what humans say that
is true and false; and they agree in the language they use. This is not agreement in opinions but
in forms of life'.
24. One might, by means of observing a series of chess games, pick up on patterns by which
different moves are made but these could only be communicated to another by means of language.
25. Bennett and Thorson (1991: 129) make the point that one cannot have a policy of
deterrence secretly. 'In fact one must utter a threat in order to execute a deterrent act. The
party intended to be influenced must hear and comprehend the threat in order that it succeed.
This understanding makes the linguistic component of deterrence essential'.
26. The UN Security Council adopted Resolution 819 on 16 April 1993. Resolution 824,
6 May 1995, added Sarajevo, Tuzla, Zepa, Gorazde and Bihac to the list of 'safe areas'. See,
UN (1995: 78).
27. While the peace-keepers were authorized to use force in self-defense, they were lightly
armed and it was initially assumed that their presence, more than the threatened use of force or
the capability to do so, would have a deterring effect. The focus of the promise was the people
populating the safe areas.
28. This blurring is evident in the logic of extended deterrence as applied during the Cold War.
American soldiers were placed in Europe as a 'trip wire' for the express purpose of blurring the
distinction between Americans and the Europeans they were there to protect. The logic was that
the presence of American soldiers would immediately draw the USA into the conflict, thereby
assuaging fears that the USA would never sacrifice New York for Berlin in a nuclear exchange.
29. Campbell (1993) has argued that action within the Gulf War was constructed on the
basis of a range of blacklwhite distinctions in which responsibility for evil was unambiguously
Multiple Identities, Interfacing Games 295
located in one agent, that is, Irltq, and good in another, that IS, the West. Both the Cold War
and Gulf War scrlpt5 identity ,I clear aggressor who 15 the target of the threat.
30. These accounts were drawn from the daily select~onof articles from a range of Western
newspapers made hy the Western European Union. Specific references have not been footnoted
due t o space cons~derations.
3 1. While the language of 'ethnic cleans~ng'far preceded the explicit naming of Karadric
a n d M l a d ~ c appIy111g
, t h ~ name
s to the des~gnatcdleaders of one side is clearly taking a parti'il
pc>\iti<>r~.
32. Dutch cornmand~ngofticers apparently signed a sraternenr that expressed acceptance
of the Bosn~anSerb decision t o separate Mushm men from the women and children. In add-
ition, 1.t Col Karrenians made public statements ahout thi. 'correctness' of Bosni,~n Scrh
'ictions in Srehrenic'l, and that there were no 'good' and 'bad' guys In thls situation, which
caused cons~derahlcembarrassment for the 1)utch Ministry of Defense as the mass executions
of M u s l ~ mmen became ev~dent.
33. It has since hecome known, of course, that arms s h ~ p m e n t swere channeled through
Croatia and that the Cltnton atltnin~stratlonwas aware of chi\.
34. In some reports the new threat was attached specif~callyt o Goradze, where British
peace-keepers were located, In contrast t o Bihac, populated by Pakistani peace-keepers, and
was presented hy many cornrnentators In terms of Br~tishnational Interest. In other reports,
the threat was more general In nature. In any case, the hollowness of the new thredt was
~ m n i e d i a t e levident
~ as NATO did nothing in response to attacks o n Zepa and Bihac.
3.5. As Donnelly (1992: 94) notes, most realists allow for an instrumental morality, that IS,
moral arguments c,tn be used ~tistr~unentally as moral just~f~cation for pursuing power. Kiss~nger
(1977: LOO) stated that Arner~cnnvalues In United States foreign policy 'contributed to our unlty,
gave focus t o our priorities and sustained our confidence 111 ourselves'. The moral d~scourseof
foreign pol~cy-makers,some realists imply, plays a role in constituting the state's power to act.
Why keep up the ,ippearance In the first place? Because the source of state power, the ability t o
mobilize resources, including t a r doll:irs and personnel, IS a state'\ populat~on.Realists may
exclude the possibility that st'ttes act with moral purpose, ~f they are rat~onal,hut some recog-
nize the political value of a puhlic moral reasoning. See also Mnchiavelli ( 1 950: 63-6).
.%. A s po~ntedour in .I W r s l ~ r ~ r ~Post
t r ~ neditorial ( 6 J u n e I995), although the Bosni,in
Serbs preterred the term 'pr~sonerof war' to 'hostage', the UN peace-keepers were nor tre,ttcd
as POWs in so far ,ts this category entails certain well-known protections of a sort denied to
soldiers who are sh,tckled to possihle ~ n i l ~ t a targets.
ry
References
Allan, Pierre and Kjell <;oldm,tnn (eds) ( 1992) T h e Errd of thc Cold War: Eualuatirrg Tlieorrc.~
of lntcrnationul Relations. Dordrecht: Martinus Nijhoff Publishers.
Alter, Jonathan (199.3) '1.ess l'rof~le, More Courage', Nezosu~cck( 1 November).
Bennett, James P. m d Stuart J. Thorson (1991) 'Reasoning 'tnd Intelligibility', in Valerie
M. Hudson, (ed.) Artrficial lntelligcnc~and lnternatiorm/ Politics, pp. 127-48. Boulder,
CO: Westv~ewI'ress.
Bowker, Mike and Robin Brown ( I 993) From Cold W7r t o C o l / i l / ~ r7%eory
: and World Politrcs
in the 1980s. (:ambridge: Cambridge University I'ress.
Campbell. David ( 1 993) I'olrt~<-sWithorit Prrnciple: Sovereignt): Lthics and Narratives of thc
Gulf War. Boulder, CO: I.ynne R~enner.
Carr, E.H. ( 1964) T h e T u ~ e n t yTears' C ~ I SI 9, 1 9-1 9.39: A n Introduction to the Study of
Interniitron~71Rclutions. New York: Harper and Row.
Cohen, Roger ( 1995) 'Par~sMade I)eal t o Free Hostages in Bosnia, Officials Say', interrzatrorral
Herald Trrbuwc ( 2 3 June).
Donnelly, lack ( 1 992) 'Twentieth-<:ent~iryRealism', in Terry Nardin and D a v ~ dK. Mapel, (eds)
'fiadrtrorrs o f Intrrnationul Ethics, pp. 85-1 1 1 . Ctrnhridge: Cantbridge University Press.
296 Widening Security
T he dramatic events that marked the end of the Cold War and the
subsequent early end of the twentieth century require the United States
to reconsider its national security policy. What are U.S. interests and
objectives? What are the threats to those interests and objectives? What are
the appropriate strategic responses to those threats? What principles sho~tld
guide the development of U.S. policy and strategy? In short, what should be
the new grand strategy of the United States?
Four grand strategies, relatively discrete and coherent arguments about
the U.S. role in the world, now compete in o u r public discourse. They may
be termed neo-isolationisn~;selective engagement; cooperative security; and
primacy (see Tahlc 1 for a summary presentation of the four alternative
visions). Below, we describe each of these four strategies in its purest form;
we borrow liberally from the academics, government officials, journalists,
arid policy analysts w h o have contributed to this debate, but o n iss~les
where others have kept silent, o r been inconsistent, we impose consistency
in the interest of clarity. O u r purpose is not advocacy; it is transparency. We
hope to sharpen the public debate, not settle it. We then offer our charac-
terization and critique of the evolving grand strategy of the Clinton admin-
istration, an uneasy amalgam of selective engagement, cooperative security,
and primacy. Finally, we speculate on what might cause the United States to
make a clearer grand strategy choice.
The state of the U.S. economy, the national finances, a n d persistent
social problems largely drove foreign a n d defense policy out of the 1992
presidential race. The 1996 campaign was little different. The first months
of the first Clinton administration were characterized by indirection, and
later by a nearly single-minded focus on economic issues. Security matters
were dealt with sequentially and incrementally; n o obvious grand scheme
emerged until Assistant to the President for National Security Affairs Anthony
Lake proposed in September 1993 that U.S. policy shift "From Containment
t o Enlargement." N o t until July 1994 were the ideas initially advanced hy
improbable in any event. The United States controls about one quarter of the
gross world product, twice as much as its nearest competitor, Japan, and
while not totally self-sufficient, is better placed than most to "go it alone."
U.S. neighbors to the north and south are militarily weak and destined to
stay that way for quite some time. The United States is inherently a very
secure country.Yndeed, the United States can he said to be strategically
immune."'
The new isolationism is strongly motivated by a particular understanding
of nuclear weapons. It concedes that nuclear weapons have increased the
potential capacity of others to threaten the safety of the United States. But
nuclear weapons make it very hard, indeed nearly inconceivable, for any
power to win a traditional military victory over the United States. Nuclear
weapons assure the political sovereignty and the territorial integrity of the
United States. The collapse of the Soviet Union has so reduced the military
resources available to its successor states that a counterforce attack on U.S.
nuclear forces, an old and exaggerated fear, is out of the question. There can
be no politically rational motive for any country large or small to explode a
nuclear weapon on North America. U.S. retaliation would be devastating.
Moreover, the fact that Britain, France, the People's Republic of China, and
Russia have nuclear retaliatory forces makes it quite likely that these powers
will deter each other, further reducing the risk that an ambitious hegemon
could dominate and militarily exploit the econonlic resources of the Eurasian
landmass.
the United States stay out of political conflicts and wars abroad, it has no
particular need for political instruments. Even traditional alliance relation-
ships that obligate the United States in advance, such as NATO, ought to
be dismantled. International organizations are a place to talk, perhaps to
coordinate international efforts to improve the overall global quality of life,
but not to make or keep peace. This would implicate the United States and
draw it into conflicts.
Most of the foreign policy issues now facing the United States would dis-
appear under the new isolationism. The future of NATO, for instance,
would be left to Europe. Neo-isolationists would have the United States
abandon that anachronistic alliance, not lead the way in its ill-conceived
expansion. Bosnia, too, is a European problem in which the United States
has no concrete, material stake. The United States would no longer be pre-
occupied with Russian political and economic reform, or the lack thereof.
Arabs and Israelis would have to sort out their affairs (or not) without U.S.
meddling. Islamists would be deprived of the Great Satan. The North
Korean threat would be left to South Korea, the country whose interests are
actually threatened. In Latin America and Africa, the United States would
no longer rescue Haitis and Somalias. Humanitarian assistance, if and when
provided, would be confined to disasters - famines, epidemics, earthquakes,
and storms. The United States might be willing to help clean up the mess
after foreign wars have sorted themselves out. But intervention of any kind
during wars would be viewed as a mistake, since at least one side is likely
to be disadvantaged by humanitarian assistance to the others and would
thus come to view the United States as an enemy.
Force Structure
The United States can, more easily than most, go it alone. Yet we do not
find the arguments of the nco-isolationists compelling. Their strategy serves
U.S. interests only i f they are narrowly construed. First, though the neo-
isolationists have a strong case in their argument that the United States is
currently quite secure, disengagement is unlikely to make the United States
more secure, and would probably make it less secure. The disappearance of
the United States from the world stage would likely precipitate a good deal
of competition abroad for security. Without a U.S. presence, aspiring
regional hegemons would see more opportunities. States formerly defended
by the United States would have to look to their own military power; local
arms competitions are to be expected. Proliferation of nuclear weapons
would intensify if the U.S. nuclear guarantee were withdrawn. Some states
would seek weapons of mass destruction hecause they were simply unablc
to compete conventionally with their neighbors. This new flurry of c o n -
petitive behavior would energize many hypothesized immediate
causes of war, including preemptive motives, preventive motives, economic
motives, and the propensity for miscalculation. There would likely be more
war. Weapons of mass destruction might he used in some of these wars,
with unpleasant effects even for those not directly involved.
Second, if these predictions about the international environment are cor-
rect, as competition intensified U.S. decision-makers would continuously
have to reassess whether their original assumptions about the workings of
the balance of power in Eurasia and the deterrent power of nuclear weapons
were still valid. Decision-makers require both good political intelligence and
compelling cause-effect knowledge about international politics to determine
that a policy shift is in order. More importantly, decision-makers woiild have
to persuade the country that a policy reversal is necessary, but U.S. foreign
policy is n tough thing to change. Given these problems, how much trouble
would have to occur before the United States returned to a more active role?
Would the United States return in time to exert its influence to help prevent
a great power war? If the United States did decide that a more active role
was necessary, how much influence would it have after years of inactivity?
l d United States return in time to prevent a n aspiring hegemon from
W o ~ ~ the
getting a jump ahead, as N a n Germany did In World War II? If not, the costs
of containment or rollback could prove s u b s t ~ n t ~ a l .
306 Widening Security
Third, though the United States would save a great deal of money in its
defense budget, perhaps 1-1.5 percent of GDP, or $70-100 billion per year
relative to the budgets planned by the Clinton administration, these annual
savings do not seem commensurate with the international influence the
strategy would forgo. Though this is a lot of money, which has many worthy
alternative uses, the redirection of these resources from the military is unlikely
to make the difference between a healthy and an unhealthy economy that is
already some seven trillion dollars in size. Neo-isolationists seem willing to
trade away considerable international influence for a relatively modest im-
provement in domestic welfare. Given the potential stakes in international
politics, the trade-off is imprudent. Engagement in international politics
imposes obvious burdens and risks. Shedding an active role in international
politics, however, increases the risks of unintended consequences and reduces
U.S. influence over the management of those consequences, and over issues
that we can hardly anticipate.
Selective Engagement
Selective engagement has its own problems. First, the strategy lacks a cer-
tain romance: will the cool and quiet, steady, long-term exercise of U.S.
power in the service of stable great power relations win the political sup-
port of any major constituency in the United States? Compared t o other
strategies, there is relatively little idealism or commitment t o principle
3 10 Widening Security
of preventing war. A traditional realist position accepts the risk of war, and
the costs of waging war, to prevent aggressors from building sufficient
power to challenge the United States directly. Neo-isolationists, however,
argue that if you want to avoid war, you must stay out of the affairs of others.
They remind us that it is quite unlikely that the results of even a great power
war could decisively shift the balance of power against the United States. If
the United States goes out into the world to prevent hypothetical wars, it
will surely find some real ones. Advocates of selective engagement resist this
deductive logic for two reasons: the United States was drawn against its
intentions into two costly world wars that started in Eurasia; and the
United States pursued an activist policy during the Cold War which both
contained Soviet expansionism and avoided great power war.
C o o p e r a t i v e Security
Issues a n d Instruments
Cooperative security advocates believe that they now have more effective
means to achieve their goals. The United States is presumed, based on the
Desert Storm victory, to hold decisive military-technological superiority and
thus to be able to wage speedy, low-casualty wars. In the past, advocates of
collective security relied on world public opinion, and on economic sanc-
tions. They understood that it is difficult to get self-interested states to sup-
port military intervention on the side of peace in distant places, so they
stressed the impact of these less costly measures. Cooperative security advo-
cates still like these mechanisms, but history has taught them to be skepti-
cal that they will prove sufficient. Instead it is argued that real military action
is cheaper than it once was.28
Advocates of cooperative security have added the arms control mechan-
isms developed in the last three decades to the traditional collective secur-
ity repertoire. With enough arms control agreements, transparency, and
confidence-and security-building measures (CSBMs), and enough intrusive
I 1 I Competing Visions for U.S. Grand Strategy 3 13
verification, states around the world will be able to avoid conflicts arising
from misperception or first-strike advantages. The offensive military cap-
abilities that enable states to engage in aggression will thus be acquired by
few countries. Peace-loving states will adopt defensive military postures and
an international military division of labor that will provide only their com-
bined forces with an offensive capability. The few "rogue states" left after
all this arms control and i~istitution-buildingcan either be intimidated by
the threat of high technology warfare or decisively defeated in short order.
A cooperative security strategy depends on international organizations
to coordinate collective action. They are part of the complicated process of
building sufficient credibility to convince all prospective aggressors that
they will regularly be met with decisive countervailing power. The threat of
great powers to intervene - even when they have n o immediate interests at
stake - must be made credible. A standing international organization with
substantial domestic and international legitimacy is necessary to coordinate
multilateral action and to create the expectation of regular, effective inter-
vention for peace.
Its advocates stress that cooperative security is a work in progre~s.~'
Global
cooperative security structures will not emerge fully developed. Indeed it is
argued that they need not: existing "overlapping, n~utuallyreinforcing arrange-
ments" provide the foundation upon which cooperative security can be built.
As three leading proponents have written, "military establishments around
the world already are entangled in a large web of internationally sanctioned
restraints on how they equip thenlselves and operate in peacetime. Cooperative
security means making the effort to thicken and unify this web.""' That,
clearly, entails a long term project.
In at least one area of the world, the project is seen as already well under
way. Europe has begun to practice cooperative security with a web of diplo-
matic, econonlic, and security arrangements, particularly the arms control,
transparency, and CSRMs associated with the Organization for Security and
Cooperation in Europe. The Clinton administration views NATO enlarge-
ment, in part, as an extension of the cooperative security project." If Europe,
even during the Cold War, could develop such arrangements, the proponents
of cooperative security ask, can other regions not do the same now that the
distractions o t the Cold War are hehind us?
Proliferation is a key issue for cooperative security advocates. They sup-
port very strong measures to prevent and reverse i t . ' V h e y supported not
only the indefinite extension of the Nuclear Non-Proliferation Treaty in
1995 but also the strengthening of its safeguards. The demonstration effect
of any new proliferation is presumed to be great. It is therefore reasonable
to oppose any new nuclear power beyond those declared nuclear weapons
states in the original treaty. Moreover, the policy must be pursued equally
versus friends, enemies, and neutrals. Israeli, Indian, and Ukrainian nuclear
weapons are all bad, regardless of the fact that the United States has no
political conflict of interest with any of these countries. Proliferation must
also he headed off for another reason: the more nuclear powers there are in
3 14 Widening Security
Force Structure
Advocates have suggested that this force would be smaller than the
"Bottom-Up Review" force advocated by the Clinton administration (see
Table 2)." But their assessment focuses on means, while assuming that others
will cooperate t o the maximum extent of their ability - i.e., that they will
maintain larger forces than they currently plan. Moreover, it ignores the
necessity for a period of regular and consistent military action if there is t o
be any hope of building the international credibility necessary t o affect the
calculations of prospective aggressors everywhere.
A true cooperative security strategy could involve the United States in sev-
eral simultaneous military actions. U.S. forces were recently engaged in Iraq
and in Somalia simultaneously, while advocates clamored for a third US. mili-
tary action in Bosnia. Haiti subsequently replaced Somalia on this list, even
as the U.S. military role in Bosnia expanded. UN forces were deployed in
several other places - arguably in insufficient n ~ ~ m b e to r s accomplish their
missions completely. The experiences in Desert ShieldIDesert Storm and in the
Somali relief operation suggest that U.S. leadership is often the key ingredi-
ent for substantial international c ~ o p e r a t i o n . It
' ~ is not the subtle diplomacy
of the United States that proves critical, but rather its military reputation,
which depends on large, diverse, technologically sophisticated, and lushly
supplied military forces capable of decisive operations. At least initially, the
United States would have to provide disproportionate military power to
launch a global cooperative security regime. A force structure in the range of
the Clinton administration's "Bottom-Up Review" force and the "Base Force"
(see Table 2) may be necessary to pursue a true cooperative security poltcy
with a good chance of success.
Primacy
the U.S. must show the leadership necessary to establish and protect a
new order that holds the promise of convincing potential competitors
that they need not aspire to a greater role or pursue a more aggressive
posture to protect their legitimate interests. ... In the non-defense areas,
we must account sufficiently for the interests of the advanced industrial
nations to discourage them from challenging our leadership or seeking
to overturn the established political and economic order. ... We will
retain the pre-eminent responsibility for addressing selectively those
wrongs which threaten not only our interests, but those of our allies or
friends, or which could seriously unsettle international relation^.^'
Present and aspiring major powers are to be persuaded, it seems, that they can
rest easy, and need not bother investing in the political, economic, and mili-
tary means they might otherwise require to safeguard their interests. Indeed,
any assertion of strategic independence by the likes of Germany and Japan
would only erode the global and regional stability sought by all.46
In addition to maintaining U.S. primacy by reassuring others of the purity
of its intentions, the draft DPG envisioned the United States seeking to pre-
vent the rise of challengers by promoting international law, democracy, and
free-market economies, and precluding the emergence of regional hegemons.
It is important to note that though primacy focuses on the maintenance of
overwhelming U.S. power and influence, it remains strongly committed to
liberal principles. It is simply more judicious about the commitment of U.S.
military power to particular liberal projects than is the cooperative security
strategy. Support for political and economic transformation are seen as the
best way to ensure that Russia will not revert to the authoritarian, expan-
sionist habits of old, though the United States should hedge against the fail-
ure of such reform. In Europe, the United States would work against any
erosion of NATO's preeminent role in European security and the develop-
ment of any security arrangements that would undermine the role of NATO,
and therefore the role of the United States, in European security affairs. The
countries of East and Central Europe would be integrated into the political,
economic, and even security institutions of Western Europe. In East Asia, the
United States would maintain a military presence sufficient to ensure regional
stability and prevent the emergence of a power vacuum or a regional hegemon.
The same approach applied to the Middle East and Southwest Asia, where the
United States intended to remain the preeminent extraregional power. The
United States would also endeavor to discourage India's hegemonic ambitions
in South Asia. The regional dimension of the strategy outlined in the draft DPG
is thus consistent with the global dimension: the aspirations of regional as well
as global hegemons are to be thwarted.
Proponents of primacy are more than a little upbeat about the post-Cold
War international position of the United States. Even though all too few
I I , Competing Visions for U.S. Grand Strategy 3 19
United States "to be the global hegemon of the regional hegemons, the boss of
all the bosses" has explicitly called for the "potential" or "latent" containment
of both Russia and China, while others prefer a more active version.55
Calls for containing Russia are most prominently identified with
Zbigniew Brzezinski and Henry Kissinger, and have surfaced with the great-
est clarity in the debate on whether NATO should formally expand and
offer membership and protection to former Eastern European members of
the Warsaw Pact. Both fear the seductive effect of a "security vacuum" in
Eastern (newly re-christened "Central") Europe. "A Russia facing a divided
Europe would find the temptation to fill the vacuum irresistible."j6 Observers
should not be lulled by the relative decline in capability precipitated by the
dissolution of the Soviet Union, the collapse of the Soviet economy, and the
deterioration of the Soviet (now Russian) military. Containment advocates
cite a new Russian assertiveness, demonstrated in diplomatic, military, and
economic interventions large and small around its periphery.j7 Russia
brings three dangerous qualities to the table: it possesses tremendous inher-
ent strategic reach, considerable material reserves; and the largest single
homogeneous ethnic-cultural population in Europe. Brzezinski asserts that
Russian culture somehow contains within it the seeds of e x p a n s i ~ n (One
.~~
notes here echoes of Cold War logic, which viewed Communism as inher-
ently aggressive.)
Because the new containment is so closely tied to NATO expansion, advo-
cates say little about other regions of the world. It seems, however, that NATO
expansion is part of a much more ambitious policy. Brzezinski adds a more
forward U.S. policy around the Russian periphery.j9 In some recent work, he
describes an "oblong of maximum danger," which extends from the Adriatic
to the border of the Chinese province of Sinkiang and from the Persian Gulf
to the Russian-Kazahk frontier.60Here he expects a stew of ethnic and nation-
alist conflict and proliferation of weapons of mass destruction - a "whirlpool
of violence" - although the precise nature of U.S. interests here is not well
developed. Similarly, Kissinger alludes to the role of a revived NATO in the
resolution of the crises that will surely attend the adjustment of Russia, China,
and Japan to the changed circumstances of the post-Cold War world;
Kissinger has also alluded to a NATO role in Korea, Indonesia, Brazil, and
India.61
Two elements in the case for NATO expansion suggest that its advocates
perceive the Russian threat as less imminent than they often imply. First,
they think that Russia's fears of an expanded NATO can be rather easily
assuaged. Second, they see the Russian military threat as quite manageable.
Advocates of NATO expansion usually advocate a simultaneous diplomatic
approach to Russia in the form of some sort of "security treaty."62 They
concede that NATO should not move large forces forward onto the terri-
tory of new members.63The combination of a formal diplomatic act of reas-
surance and military restraint is expected to ameliorate the possibility that
the eastward march of a mighty and formerly adversarial military coalition
could be perceived by Russia to pose a threat. These expectations seem
inconsistent with the image of a looming Russian threat.
i i3 $I i ,iri( I 1' i, Competing Visions for U.S. Grand Strategy 32 1
conflicts or concerns that they cannot credibly deter aggression. Even a hege-
monic power will, from time to time, find it useful to exploit the diplomatic
cover provided by international organizations. If the facade of multilateral-
ism renders the rule of an extraordinary power more palatable to ordinary
powers, as it did during the Gulf War, international organizations are a stra-
tegic asset.
Proliferation is as much a concern for primacy as it is for cooperative secur-
The threat to U.S. interests posed by the proliferation of nuclear and
other weapons of mass destruction and their means of delivery was high-
lighted in the draft DPG. Proliferation is a problem because it undermines
U.S. freedom of action by increasing the costs and risks of U.S. military inter-
ventions around the world. Because they serve to perpetuate a U.S. military
advantage, current nonproliferation efforts should be continued. But while
prevention is a useful first line of defense in combating proliferation, by itself
it is inadequate to the task. The United States must also be able to deter and
defend against the use of nuclear, biological, or chemical weapons by present
and future powers which might develop such capabilities.
Proponents of primacy view regional conflict, ethnic conflict, and humani-
tarian intervention in much the same light as do the advocates of selective
engagement. Regional conflict matters most when it impinges on major power
relations and the rise of potential peer competitors and regional hegemons.
Outside of the Persian Gulf, most conflicts in what was once referred to as the
Third World will be of little concern. Much the same can be said for ethnic
conflict, however reprehensible it may be, and the need for U.S. humanitarian
i n t e r ~ e n t i o n .There
~ ~ is no obvious security rationale, under primacy, for
humanitarian military operations, though some operations (such as Bosnia)
may offer opportunities to demonstrate and assert U.S. power and leadership.
Force Structure
One of the foremost advocates of primacy has argued that "it matters
which state exercises the most power in the international system"; that U.S.
primacy is to be preferred to that of another power and is superior to a
world in which no one is able to exercise primacy (the balance-of-power
world implicitly embraced by selective engagement); and that primacy
enables a state to achieve its objectives without resorting to war.'; However,
although primacy may offer many benefits for the United States and even
for the world, the quest for primacy is likely to prove futile for five reasons.
First, the diffusion of economic and technological capabilities -precipitated
in part by the open international economic system that the United States sup-
ports, in part by the spread of literacy, and in part by the embrace of mar-
ket economics - suggests that other countries will develop the foundations
to compete in international politics. New great powers will rise in the future.
Indeed, though there is no recognized rule of thumb that specifies the share
of gross world product a state must command in order to bid for hegemony,
it seems peculiar to suggest that the situation today is not much different
from the end of World War 11, when an unhombed United States produced
40 percent of gross world p r o d ~ c t . ' ~
324 Widening Security
both British and U S . officials admit that differences over Bosnia brought
U.S.-British relations to their lowest point since the 1956 Suez crisis. In the end,
the United States and the allies compromised on a Bosnia settlement: the United
States agreed to commit troops t o support an effort to achieve a Bosnia settle-
ment more to its liking, while the allies agreed to support such a settlement so
long as it included a very high level o f autonomy for the three communities of
Bosnia. Finally, in August 1996 the United States initiated a dispute with its
allies and trading partners over their economic relations with countries that the
United States intended to sanction economically. The U.S. proposed unilater-
ally to punish the citizens of countries who d o business with Cuba, Iran, and
Libya. While in the latter two cases the allies may broadly agree with the anti-
terrorism principles that motivate U S . actions, they do not consider these
actions to be commensurate with their own national interests. More inipor-
tantly, they recoil from what they perceive as the arrogance of U.S. policy.
If friends and allies have their own interpretations of U.S. actions, "rivals"
are even more likely to be suspicious, and less likely to prove cooperative.
Though the Clinton administration has gone to great lengths to portray NATO
expansion in cooperative security terms, Russian political figures and policy
makers d o not seem to accept the notion that NATO expansion is good for
their country. Clinton administration officials remain optimistic that the
Russians will accommodate themselves to NATO expansion. This is probably
true in the sense that since there is nothing they can d o about it, at some point
they have nothing t o gain by opposition. This does not mean, however, that
a positive Russian consensus will develop around the project. Indeed, it seems
equally plausible that the fact of NATO expansion will be a continuing sore
point in Russian domestic politics. Similarly, the llnited States initially pur-
sued a very energetic policy of "engagement" with the People's Republic of
China, "engaging" the Chinese simultaneously on their domestic politics, their
economic policies, and several aspects of their foreign policy. Engagement
usually took the form of the United States explaining to Chinese officials how
they should change their behavior, and ignoring Chinese sensitivities about
interference in their internal affairs, and the status of Taiwan. The result was
a generally non-cooperative China.
Because international and regional security institutions are weak, more
U.S. leadership is required t o make things happen than cooperative security
advocates had hoped. Resources are necessary t o supply this leadership, and
resources for international affairs have become more scarce than they were
during the Cold War. In particular, foreign aid and the State Department
budget have been cut in half since 1984, largely a t the instigation of the
Congress, and are destined t o fall another 2 0 per cent by 2002.8XThe defense
budget remains large, even by Cold War standards; real defense spending
nearly equals the outlays of the 1970s, and is roughly 80 percent of what it
was in the early 1960s. It is also very large relative to the rest of the world,
equaling the total defense spending of the next five major military powers in
1994 (Russia, China, Japan, France, and Germany).xyYet these resources,
328 Widening Security
address these conflicting pressures. The accommodations that the Clinton ad-
ministration strategy has made with the obstacles it has encountered have
been incremental, rhetorical, disjointed, and incomplete. In theory, the inco-
herence of the current strategy could produce a series of new difficulties for the
administration, and conceivably a disaster. In practice, the Clinton admin-
istration may succeed in avoiding a disaster through its well-known skills at
"triangulation." At the first sign o f serious resistance on the domestic or inter-
national front, it adapts or backs away in order to keep costs under control.
The second Clinton administration may muddle through.
What is the longer-term prognosis for U.S. grand strategy? What could
cause this strategy to change and in what direction might it change? The
answer depends upon a number of contingencies.
Ironically, the Clinton administration grand strategy has already evolved
to a point where it has many of the trappings of primacy. Indeed, Clinton's
foreign and defense policy team has discovered that considerable U.S. lead-
ership and major commitments of U.S. power are necessary for the pursuit
o f the transforn~edworld order they seek. The Republicans would prohably
follow a somewhat purer version of primacy, and move even further away
from cooperative security than the Clinton administration already has, if
they could take back the presidency.'" What might cause U.S. foreign policy
makers in hoth parties to abandon primacy?
One likely source of a major change in t7.S. grand strategy is change in
U.S. domestic politics. The aging of the "bahy boomers" will put substantial
pressure on the federal budget after the turn of the century. An increasing
portion of the politically active adult population will have dim memories of
the Cold War. Even the Persian Gulf War is heginning to fade into the past.
The combination of these developments could produce decreasing budgetary
and political support for an activist U.S. foreign policy. U.S. leaders will have
to husband these scarce resources; selective engagement may become the US.
grand strategy by default.
Primacy could die the death of a thousand cuts. The overall U.S. share of
global power will decline a little. Scientific, technological, and productive
capacities will spread across the world. Niche players will develop in eco-
nomics, warfare, and even ideology. Close allies will grow tired of incessant
U.S. demands. Traditional adversaries will balk as the United States tries to
set the criteria for responsible membership in the "international commu-
nity." A series of not very costly but ultimately indecisive interventions could
exhaust the patience of the U S . public. Selective engagement again could be
the default strategy, but retreat to isolationism is also possible.
Alternatively, the U.S. share of gross world power could decline signifi-
cantly. Though some skepticism is in order on this score, the prospect ought
not to be ruled out entirely. Russia may recover economically and politi-
cally; the Japanese economy could improve, the Chinese economy might
330 Widening Security
Conclusions
This brief overview cannot do justice to the full range of argumentation about
which the advocates of neo-isolationism, selective engagement, cooperative
security, primacy, and engagement and enlargement disagree. But it is a start.
By way of conclusion we offer three general points.
First, it should be clear that these strategic alternatives produce different
advice about when the United States should use force abroad, and the
advice is not equally explicit. The new isolationism suggests "almost never."
Cooperative security could imply "frequently." Selective engagement advises
"it all depends," but suggests some rough criteria for judgment. Primacy
implies the employment of force whenever it is necessary to secure or improve
the U.S. relative power position, but permits it whenever the United States is
moved to do so. An understandable desire for clear decision rules on when
to use force should not, however, outweigh the more fundamental concerns
that ought to drive the U.S. choice of strategy.
\ r I Competing Visions for U.S. Grand Strategy 33 1
Authors' Note
The original version o f this essay was submitted by Barry R. Posen as written testimony for the
House Armed Services Committee on March 3, 1993. Earlier versions o f this piece appeared in
Strategy and Force Planning Faculty, eds., Strategy and Force Planning (Newport, R.I.: Naval
War College Press, 1995), pp. 115-134; and in Robert J. Lieber, ed., Eagle Adrift: American
Foreign Policy At the End of the Century (New York: Longman, 1997),pp. 100-134. The views
expressed here are those o f the authors and do not necessarily reflect the views o f the Naval War
College, the Department o f the Navy, or any other U.S. government department or agency.
Notes
Polzcy, No. 81 (Winter 1990-9 I ) , pp. 3-19, prefers "disengagement." Patrick J . Ruchanan,
too. in " A m e r ~ c a First - ' ~ n dSecond, 'ind Third," Nirtiomzl lrztcwst, No. 1 9 (Spring 1990),
pp. 77-82, uses "disengagement." D o u g Bandow, "Keeping the Troops a n d the M o n e y a t
Home," Current History, Vol. 93, N o . 5 7 9 (January 1994), pp. 8-13, prefers "benign detach-
ment." Eric A. Nordlinger, however, in the m o \ t sophisticared, a n d perhaps least conventional
version of the new isolarionisrn, Isolat~oursinKeconfigzrrrrl: Amrrican Foreign P d r s ) ~for a
Ncui <;etttury (lJrinceton, N.J.: 1'1-inceton Univers~tyPress, 1 W i ) , embraces "isolationism."
6 . Kandow, "Kccping r h c Troops ,und the M o n e ) a t Homc," p. 10.
7. T h e verslon of realism tlint underlies the new i s o l a t ~ o n ~ sISm minimal. Its strategic imper-
atives are even more limited than those of the m i n m a l realism outlined by C h r ~ s t o p h e rI.;lyne,
"Less 1s More: h ~ l i n i ~ n aKealrsm l In East Asla," Niltronnl Ilzterest, No. 4.3 (Spring 19961,
pp. 64-77. 1.ay11e drstmguishes hetween maximal m d niini~iialrealism. H e vlews a I)al,ince of
power approach (which we call "selecr~veengagement") a\ m ~ n i m a lrealism. Lavne link< pri-
m ~ l c ywith m,~xirn.~l real~sni.For a n earlier version of m ~ r i ~ n i realism ,~l a n d neo-isolat10111s111,
see
Robert W. Tucker, A N e w Isolizti~~tus~~z: TI~re'rto r Promise! ( N e w York: Universe Books, 1972).
Nordl~nger,Isol~~tronisnz K e ~ ~ o n f ~ ~ u is
r c the
i l , most signific,lnt exception t o the g e n e r a l ~ r ~ t i o n
that neo- sola at ion ism is driven by a rc,tlist interpretation of ~nternationalpolitics. H I eclectic
approach t o developing ,I n . ~ t ~ o n astrategy l of isol,ltionis~n'ind its concurrcnr foreign policy is,
in the end, informed more by I~heralismthan realism.
8. Alan Tonelson, "Superpower Without a Sword," korc~igtrAtfilrrs, Vol. 72, No. 3 (Summer
199.3), p. 179, observes that "few intern~lrionnlconflicts will directly threaren the nat~on'sterri-
torial integr~ry,pol~rrcal~ndependenceo r nlaterinl welfare."
9. Christopher Layne, "The Unipolar illusion: W h y Nebv (;rear Powers Will Kiw," l ~ t t ~ r -
ri~lttowalSecurity, Vol. 17, No. 4 (Spring 1993), p. 48, 11ukes th15 poinr. H e uses it t o support an
argument for a gr'lnd strategy rhat he calls " s r r x e g ~ c~ndependence."It hears some similarity to
the select~vceng,lgernent str'ttegy o u t l ~ n e dbelow, a l b e ~ ,It rather inactive version of I[.
10. Nordlinger, lsolirtiorrrsm Kecotrsrtfrred, pp. 6 and 63-9 I.
I I. Kaven.11, "The (.,lse for Adjustment," pp. 15-19, develops a force \tructure a n d
defense budget within these pnrnmetcrs w h ~ is h e x p l ~ c ~ r gtxred
ly t o support '1 grand strategy
quite s111111art o w h ~ we t label isol,~tionism. H e suggests a n 'lcrive force of 1.1 million people.
wirh six Army ,lnd t w o Marine c l ~ v ~ s ~ o eleven ns, tactical , ~ i rwtngs, S I X carrlers w ~ r hfive alr
wings, m d a strategic dyad of submarines a n d hornlxm, which could he funded tor d h o ~ ~ t
$1.50 bill~on in constant 1991 dollars, perhaps $17.5 h ~ l l ~ oInn 1 9 9 7 dollars, o r r o ~ ~ g l i l ~
2.5 percent of < r L ) t . See POI-ceA In X ~ h l e1, which I \ roughly the same size, but w h ~ c hthen-
<:ongrcssni,in .A\pin estimated would cost consider,ihly more. $21 1 hillion in 1 9 9 7 dollar\,
roly,hly 3 percent o t <;Dl? See nlio 'Timelson, "Superpowel- Without a S\vord." pp. 179-180,
u h o argues for ,I sitn~larforcc structure, but w h o seems t o \ ~ ~ b s c r ~t oh ae conservative vcrslon
of selective engagement. 'The Crnrer for 1)etense Intorm,~rionh , ~ sproposed that an even s m ~ l l e r
forcc structure ivould he s u f f ~ c ~ e nt or \upport 1' srr,lteg) of diwrigagement. For $104 brll~onin
c o n \ t m r I 9 9 3 dollars, CI)l proposed ro f ~ e l d;I forcc of only i 0 0 , 0 0 0 people, o n e Marine and
three Army divis~ons,four .Air Force t a c t u l wing\, t ~ v ocarrier\ 'ind 2 2 1 other combat vc\5els,
a n d ,I nuclear force of I h \ u h m , ~ r ~ n e sSee . " D e t e n d ~ n gAmtwca: (:Dl O p t ~ o n sfor M ~ l i r a r y
Spending," Llc~fiwseMonrti~t; Vol. 2 I, N o . 4 ( 1 9 9 2 ) . Nordl~nger,Isolirtronrsm Krcorrfiprr~rf,
11. 46, \ugge\ted rhat forces a t halt the levels ru\t.i~ncd d u r ~ n gthe Cold \Y"lr .ind e x l y
14. Posen classifies himself as a "selective engagement" advocate. He does believe, how-
ever, that the United States should not only act to reduce the probability of great power war,
it should also pursue the traditional policy of opposing the rise of a Eurasian hegemon who
would conauer or even dominate the world's centers of industrial and economic Dower. The
latter risk seems very low in the short term, but preserving the political division of industrial
Eurasia remains a U.S. interest.
15. O n this point see Van Evera, "Why Europe Matters," pp. 8-10; and Art, "Defensible
Defense," pp. 45-50.
16. Art, "Defensible Defense," p. 45. See also Jonathan Clarke, "Leaders and Followers,"
Foreign Policy, No. 101 (Winter 1995-96), pp. 37-51, arguing both that the U.S. share of
global power is too small to support cooperative security or primacy, and that U.S. public sup-
port for such strategies is too weak.
17. See Art, "Defensible Defense," pp. 23-30.
18. Art, "Defensible Defense," p. 47. Stephen Van Evera, "The United States and the Third
World: When to Intervene?" in Kenneth A. Oye, Robert J. Lieber, and Donald Rothchild, eds.,
Eagle in a New World (New York: Harper Collins, 1992), pp. 127-131, makes a comprehen-
sive case for the U.S. intervention in the Persian Gulf in 1990, Operation Desert Shield, but
expresses skepticism about the necessity for Operation Desert Storm.
19. Robert S. Chase, Emily B. Hill, and Paul Kennedy, "Pivotal States and U.S. Strategy,"
Foreign Affairs, Vol. 75, No. 1 (JanuarylFebruary 1996), p. 33, have singled out Mexico,
Brazil, South Africa, Algeria, Egypt, Turkey, India, Pakistan, and Indonesia as pivotal states
"whose future will profoundly affect their surrounding regions." The list is long, the adjective
"pivotal" seems premature, and systematic attention to these states in addition to the great
powers is hardly selective. Nevertheless, the list does highlight states that may pose special
problems today, o r which may become serious contenders for regional power in the future.
20. Barry R. Posen, "A Balkan Vietnam Awaits 'Peacekeepers'," Los Angeles Times,
February 4, 1993, p. B7. The article assesses the force requirements t o police the "Vance-Owen
Plan," which intended to preserve a unitary Bosnia-Herzegovina. The three principal ethnic
and religious groups in Bosnia would have remained intermingled, as they were at the outset
of the war. Thus the police problem would have been quite complex and demanding, similar
to the British problem in Northern Ireland.
21. Chase, Hill, and Kennedy, "Pivotal States and U.S. Strategy," provide an illustration
of how the project grows. See also James A. Baker 111, "Selective Engagement: Principles for
American Foreign Policy in a New Era," Vital Speeches of the Day, Vol. 60, No. 1 0 (March
1, 1994), pp. 299-302. The former secretary of state argues for an expansive strategic agenda
that looks more like primacy than selective engagement.
22. Inis L. Claude, Swords into Plowshares: The Problems a n d Progress of International
Organization, 4th ed. (New York: Random House, 1971), p. 247; Arnold Wolfers, Discord
and Collaboration: Essays on International Politics (Baltimore: Johns Hopkins University
Press, 1962), pp. 183-184: "'any aggressor anywhere' is in fact the national enemy of every
country because in violating the peace and law of the community of nations it endangers, if
indirectly, the peace and security of every nation."
23. O n the differences between realism and liberalism, see David A. Baldwin, ed., Neorealism
and Neobberalism: The Contemporary Debate (New York: Columbia University Press, 1993);
Michael E. Brown, Sean M. Lynn-Jones, and Steven E. Miller, eds., Debating the Democratic
Peace (Cambridge, Mass.: MIT Press, 1996); Michael E. Brown, Sean M . Lynn-Jones, and Steven
E. Miller, eds., The Perils of Anarchy: Contemporary Realism and International Security
(Cambridge, Mass.: MIT Press,1995); Robert Gilpin, The Political Economy of International
Relations (Princeton, N.J.: Princeton University Press, 1987); Charles W. Kegley, Jr., ed.,
Controversies in International Relations Theory: Realism and the Neoliberal Challenge
(New York: St. Martin's Press, 1995); Robert 0.Keohane, ed. ,Neorealism and Its Critics (New York:
Columbia University Press, 1986); and Richard Ned Lebow and Thomas Risse-Kappen, eds.,
International Relations Theory and the End of the Cold War (New York: Columbia University
Press, 1995).
I
I 1 1 Competing Visions for U S . Grand Strategy 335
37. William J. Perry, "Military Action: When to Use It and How to Ensure Its Effectiveness,"
in Nolan, Global Engagement, p. 235.
38. See William W. Kaufmann and John Steinbruner, Decisions for Defense (Washington,
D.C.: Brookings Institution, 1991), pp. 67-76, which offers a cooperative security force struc-
ture that would cost roughly $150 billion (1992 dollars, excluding Department of Energy
expenses on nuclear weaponry) annually by the end of the century. Their recommended force
structure is quite similar to Aspin's "Force A," Table 2. The authors seem to argue that the
adequacy of such a force structure would depend on a series of prior diplomatic developments
in the world that would, for all intents and purposes, put a functioning cooperative security
regime in place. Jerome B. Wiesner, Philip Morrison, and Kosta Tsipis, "Ending Overkill,"
Bulletin of the Atomic Scientists, Vol. 49, No. 2 (March 1993), pp. 12-23, offer a force struc-
ture, costing $115 billion per year, which they seem to believe is consistent with a collective
security strategy. Though small, the air and naval forces they recommend are quite capable;
the Army they recommend, however, with a total active personnel strength of 180,000, would
barely be adequate for a repetition of Operation Desert ShieldIDesert Storm. It is difficult to
see how it could support a collective security strategy. More recently, Michael 0' Hanlon,
Defense Plannmg For the Late 1990s: Beyond the Desert Storm Framework (Washington,
D.C.: Brookings Institution, 1995), pp. 3 2 4 0 , has proposed a force structure estimated to cost
about $20 billion a year less than the Bottom-Up Review force.
39. Laying out the realist theoretical argument for why coalitions need leaders, and why
leaders are defined by great power, is Josef Joffe, "Collective Security and the Future of
Europe: Failed Dreams and Dead Ends," Survival, Vol. 34, No. 1 (Spring 1992), pp. 4 0 4 3 .
40. See Richard K. Betts, "Systems for Peace or Causes of War? Collective Security, Arms
Control, and the New Europe," International Security, Vol. 17, No. 1 (Summer 1992), pp. 5-43;
Joffe, "Collective Security and the Future of Europe"; and John J. Mearsheimer, "The False
Promise of International Institutions," International Security, Vol. 19, No. 3 (Winter 1994/95),
pp. 5-49.
41. This is the maximal realism of hegemonic stability theory. See Robert Gilpin, War and
Change in World Politics (Cambridge, U.K.: Cambridge University Press, 1981).
42. See Dick Cheney, "Active Leadership? You Better Believe It," New York Times, March
15, 1992, Section 4, p. 17. The draft DPG is placed in the larger contexts of the Bush admin-
istration's national security policy and strategy, and a discussion of primacy in U.S. policy and
strategy by David Callahan, Between Two Worlds: Realism, Idealism, and American Foreign
Policy After the Cold War (New York: HarperCollins, 1994).
43. "Excerpts from Pentagon's Plan: 'Prevent the Emergence of a New Rival'," New York
Times, March 8, 1992, p. 14.
44. The notion that U.S. hegemony is benevolent and perceived as such by others is evident
also in William Kristol and Robert Kagan, "Toward a Neo-Reaganite Foreign Policy," Foreign
Affairs, Vol. 75, No. 4 (JulyIAugust 1996), pp. 18-32; and Joshua Muravchik, The Imperative
of American Leadership: A Challenge to Neo-isolationism (Washington, D.C.: AEI Press, 1996).
45. "Excerpts from Pentagon's Plan: 'Prevent the Emergence of a New Rival'."
46. The Assistant Under Secretary of Defense for Policy Planning when the draft DPG was
prepared, Zalmay Khalilzad, has suggested that "the United States would not want Germany
and Japan to be able to conduct expeditionary wars." Khalilzad, "Losing the Moment? The
United States and the World After the Cold War," Washington Quarterly, Vol. 18, No. 2
(Spring 1995), p. 105.
47. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 22.
48. Ibid., p. 20.
49. Muravchik, The Imperative of American Leadership, pp. 32-33.
50. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 21. The term "soft
power" is associated with Joseph Nye, Dean of the Kennedy School of Government and for-
mer Assistant Secretary of Defense for International Security Affairs. He and former Vice
Chairman of the Joint Chiefs of Staff William A. Owens develop the notion of U.S. dominance
in these new tools of power in Nye and Owens, "America's Information Edge," Foreign
Affairs, Vol. 75, No. 2 (March/Aprill996), pp. 20-36.
i ,i 1 .< Competing Visions for U.S. Grand Strategy 337
67. Khalilzad, an ardent proponent o f primacy, has written that China "is the most likely
candidate for global rival." Zalmay Khalilzad, From Containment to Global Leadership?
America and the World After the Cold War (Santa Monica, Calif.: RAND, 1995),p. 30.
68. Karen Elliott House, "The Second Cold War," Wall Street Journal, February 17, 1994.
She alludes to "the looming threat o f a militarizing, autocratic China" and observes that
"a resurgent China flexes its muscles at increasingly fearful neighbors."
69. Thomas L. Friedman, "Dust O f fthe SEAT0 Charter," New York Times, June 28, 1995,
p. A19.
70. "Containing China," Economist, July 29, 1995, pp. 11 and 12.
71. See, for instance, Muravchik, The Imperative of American Leadership, pp. 71-82.
72. Charles Krauthammer, "The Unipolar Moment," Foreign Affairs, Vol. 70, No. 1 (1991),
pp. 31-32. In previous versions o f this essay we classified Krauthammer as a "cooperative secur-
ity" advocate, but his em~hasison the dominant role o f the U.S. warrants his inclusion here.
73. At least one advocate o f primacy, however, sees the United States as having been, from
the start, insufficientlyactive in Bosnia. See Muravchik, The lmperative of American Leadership,
pp. 85-131.
74. Callahan, Between Two Worlds, p. 135.
75. Kristol and Kagan, "Toward a Neo-Reaganite Foreign Policy," p. 26. Similarly,
Muravchik, The lmperative of American Leadership, p. 138, calls for defense spending that
would be "somewhere around 4 percent o f GDP." Khalilzad, "Losing the Moment," p. 102,
offersa less ambiguous, and less demanding, multipower standard than do Kristol and Kagan.
He proposes that U.S. forces be able to defeat simultaneously "the two next most powerful mili-
tary forces in the world that are not allied with the United States."
76. O n these issues see Khalilzad, "Losing the Moment?" pp. 104-105; and Muravchik,
The Imperative of American Leadership, pp. 152-170.
77. Huntington, "Why International Primacy Matters," p. 70. Huntington more specifi-
cally argues that "power enables an actor to shape his environment so as to reflect his interests.
In particular it enables a state to protect its security and prevent, deflect, or defeat threats to
that security. It also enables a state to promote its values among other peoples and to shape the
international environment so as to reflect its values"; pp. 69-70.
78. Muravchik, The Imperative of American Leadership, p. 32: "America is even more
powerful today than it was in the immediate aftermath o f World War 11, although that moment
is cited by many heralds o f American decline as the apogee o f American power."
79. See Christopher Layne and Benjamin Schwarz, "American Hegemony - Without an
Enemy," Foreign Policy, No. 92 (Fall 1993), pp. 5-23; and Benjamin Schwarz, "Why America
Thinks It Has to Run the World," Atlantic Monthly, June 1996, pp. 92-102. Layne and
Schwarz draw heavily on Melvyn P. Leffler,A Preponderance of Power: National Security, the
Truman Administration, and the Cold War (Stanford,Calif.:Stanford University Press, 1992).
More extended critiques o f primacy are provided by Callahan, Between Two Worlds; Robert
Jervis, "International Primacy: Is the Game Worth the Candle?" International Security, Vol. 17,
No. 4 (Spring 1993),pp. 52-67; Layne, "The Unipolar Illusion"; and Nordlinger, Isolationism
Reconfigured, pp. 134-141.
80. Prominent members o f the administration who were associated with the theoretical
development o f cooperative security ideas include Ashton Carter, Morton Halperin, Catherine
Kelleher, and William Perry; see works cited in footnote 25. John Deutsch participated in the
development o f a similar approach to U.S. foreign policy; Commission on America and the
New World, Changing Our Ways.
81. A National Security Strategy of Engagement and Enlargement. Since the administra-
tion's presentation o f its strategy has been more consistent than its actions, we focus here solely
on the third version o f this Clinton White House document (February 1996).
82. U.S. leadership appears to be necessary in every class o f international problem; the
word "leadership" appears four times on p. 2 alone. See A National Security Strategy of
Engagement and Enlargement, p. 2. Military requirements are discussed on p. 14, where the
language o f primacy also emerges: " A strategy for deterring and defeating aggression in more
than one theater ensures we maintain the flexibility to meet unknown future threats, while our
1 1 I - Competing Visions for U.S. Grand Strategy 339
continued engagement represented hy that strategy helps prc~lzrdc~ such threats troni clevelop-
ing in the first place" ( e ~ n p h , ~ s,idded).
is
83. Ibid., pp. 3, 9-12, 21.
84. Ihid.. p. L7.
85. Ibid., p. I X.
86. Dick Kitschten, "Mixed Signals," Nntionul /ourmil, M J 27, ~ 199.5, pp. 1274-1177;
see also Roherr Greenherger, "T1.1teline C;ipitol Hill: The New Majority'\ Foreign I'olicy,"
Fwcign Poliqi No. 101 (Winter 199F-961, pp. lS9-lh9.
87. Jeffrey Gartcn, "Is A m e r i u Abandoning M ~ l r i l ~ l t e r 'l'r,lde?"
al Forergn Affi~irs.Vol. 74,
No. 6 (NovemhrrIDecemher 1995), pp. 50-62. For the mosr pirr, economic tenriont did not
directly affect the security relation\hip. b ~ former ~ t Amhassador t o J'lpan Michael H. Artnai-o\r
suggests that "trade frictions generated mistrust and resentment that threatened to c o n t ~ n i i -
narc our security relritk)ns." r\rniaco\r, Frrends or K ~ c d s ?T / J ~Irrsrrier's
> Arronnt of U . S . - / L ~ ~ L I ~
Relutions (New York: Columbia Un~versityPress, 1 996), p. 194.
88. Casimir Yo51 and Mary lmcke, "The Raid o n Aid," L'Iiirsh~n,ytorzPost, luly 78, 1996,
p. (:I.
89. See Congression,il Budget Office, Redltcrng thca L)czfriit: Spending and Ke~wzrre
O p r ~ o l ~(Washington,
s D.C.: C B 0 , August 1996), Figure 3-1, p. 98; U.S. Arms Control , ~ n d
Disarmament Agency, World M i l i t i q Expencfrtttrc~sm d Artns Trmzsfers, 199.7 ( W a \ h i n p r i ,
D.C.: U.S. GPO, 1996), F~gui-e4, p. 4.
90. See Bob Dole, "Shaping America's (;lobal Future," t o r e i p Polrcy, No. 98 (Sprmg
1995), pp. 29-4.3. One q ~ ~ o t ~reveals t ~ o ~much:
i "From Bosnia t o China, from North Kore'i to
Poland, our ,illies and our ,ldversaries doubt our roolbe ,und question our co~ntn~rment";
p. 3 1. See also "Remarks by Senate M ~ j o r i t y1.eader Dole, March 1 , 1995," F o r r i ~ nPolrcy
Rrrlletrn. Vol. 5, No. 6 ( M ~ y i J u n e199.5), pp. 33-35; and B ~ k c r ,"Selective Engagement."
Imagined (Security) Communities: Cognitive Regions in
International Relations
Emanuel Adler
A
renewed interest in the study of security communities calls for a care-
ful examination of the relationship between changes in what John
Ruggie labels 'social epistemes' -what people collectively know about
themselves and others, or intersubjective images of reality - and the places
and regions that people feel comfortable calling ' h ~ m e ' During
.~ the last few
centuries, 'home' - as far as political organisation, authority, and allegiance
are concerned - has come to mean the nation-state. Benedict Anderson por-
trays national 'homes' as 'imagined communities', because 'the members of
even the smallest nation will never know most of their fellow members, meet
them, or even hear of them, yet in the minds of each lives the image of the
c~mmunion'.~
As has been confirmed since the end of the Cold War, national 'imagined
communities' are not about to disappear as the basic reality of international
life any time soon. Nevertheless, secular changes in technology, economic
relations, social epistemes, and institutions are causing globalising and local-
ising pressures that are squeezing the nation-state from both above and
below.4 As a consequence, people have begun to imagine new communities,
or 'homes'. When it comes to their security and well-being, in some parts of
Source: Millennium: Journal of International Studies, 26(2) (1997):249-77. This article first
appeared in Millennium.
\iiii%iImagined (Security)Communities 341
the world, growing numbers of people have begun imagining that they share
their destiny with people of other nations who share their values and expect-
ations of proper behaviour in domestic and international political affairs.
Forty years ago, Karl Deutsch developed the concept of 'pluralistic security
communities'. In this article, I extend this concept by arguing that such com-
munities are socially constructed 'cognitive regions' or 'community-regions'
w h o s e people imagine that, with respect t o their o w n security a n d econornic
well-being, borders run, more or less, where shared understandings and
common identities end. People who are territorially and politically organ-
ised into states, owe their allegiance t o states, and act on their behalf, will
also take their identity cues from the community region as these commu-
nities become more tightly integrated. Further, liberal community-regions,
in particular, are more prone to turn into security communities b e c a ~ ~ s e
of shared practical knowledge of peaceful couflict resolution and a propen-
sity to develop strong civil societies and a transnational civic culture. Never-
theless, non-liberal community-regions may also become security communities
since, as this article will argue, ( 1) the conditions for a community to develop
are socially constructed - by the individuals and, more generally, the states that
eventually form the community, as well as hy international organisations -
and, ( 2 ) since, international institutions can diffuse 'selected' liberal practices
t o non-liberal regions. Finally, I argue that what binds pluralistic security
communities into a unit is not principally 'feeling' (subjective emotion), but
intersubjective knowledge and shared identity. Accordingly, since interna-
tional and transnational institutions can help diffuse and internalise norms
and knowledge about how to peacefully resolve conflicts - the norms and
knowledge which form the basis of security communities - they can play a
critical role in the social construction of these communities.
Section 1 introduces the notio~lsof 'cognitive region' and 'community-
region'. Section 2 discusses and redefines Deutsch's concept of a security
community as a special instance of a 'cognitive region'. Section 3 suggests
a constructivist explanation for the relationship hetween pluralistic security
communities and liberal ideas. The 4th Section discusses the relationship
between knowledge, power, and community, t o elucidate how material and
socio-cognitive factors combine t o set in motion the construction of secur-
ity communities. Section S examines the role shared identities play in the
evolution of pluralistic security communities, and it purports that sovereign
states, in the process of becoming representatives of a security community,
may ultimately redefine their interests and the meaning of sovereignty. Sub-
sequently, I argue that the social construction of plz4ralistic security commu-
nities may depend on pre-existing security community-building institutions. By
way of illustration, I show that the Organization for Security and Cooperation
in Europe (OSCE),' although a creature of the Cold War, exhibits the attri-
butes of an institution conducive to building. a .pluralistic security community.
I end this article with some thoughts about the relevance of security commu-
nities for international relations theory.
342 Widening Security
Cognitive Regions
'Dirt, as Mary Douglas ... has noted, is matter out of p l a ~ e ' For
. ~ traditional
realist and neorealist accounts of international relations, everything that is
outside the realm of territorially-based states and their 'co-actions' or rela-
tions is, in the sociological sense, 'dirt'. Hence, the conventional view in the
International Relations (IR) discipline is that 'a state is a fixed territorial
entity ... operating much the same over time and irrespective of its place
within the global geopolitical order'.' This view lies at the root of the clas-
sic understanding of international relations.
To begin with, the modern territorial sovereign state has rested on the
principle of spatial exclusion, which entailed that '[ildentification of citi-
zenship with residence in a particular territorial space became the central
facet of political identity' - or, in Alexander Wendt's terms, of the corporate
identity of the state.8 This principle meant that states became the primary
vehicles for individual citizens to form societies and achieve human
progress - that is, security, economic welfare, and justice. Politics, 'in the
sense of the pursuit of justice and virtue, could exist only within territorial
bo~ndaries'.~
By taking the state as an abstract individual unitary actor, endowed only
with a corporate identity, and by artificially separating the domestic and
international realms, realism lost sight of the social identities of states.1
I argue instead, from a constructivist perspective, that state social identities
and interests are not fixed but evolve from the diffusion and convergence of
causal and normative understandings across national boundaries, high levels
of communication, economic interdependence, and cooperative practices.
Furthermore, not only do identities and interests evolve, they also have the
potential to converge."
Moreover, as several authors point out, and as John Ruggie articulates,
territoriality 'has become unbundled'.12 For example, international regimes
and common markets occupy a 'nonterritorial functional space'.13 Epistemic
communities, social movements, and issue-networks not only inhabit this
space, but are actively involved in determining its boundaries. More import-
antly, state authority in the realms of security, economic welfare, and human
justice (human rights) is increasingly being distributed across these inter-
national functional cognitive spaces.14
Ruggie is right to say that international society is anchored in this non-
territorial space,15 and societal relations regarding global issues, such as the
environment, do take place in what Ronnie Lipschutz perceives as a primitive
'global civil society'.16 However, what some people are tenuously starting to
perceive as 'home' and 'insideness'," is not the whole 'Planet Earth', but a
transnational region where they imagine sharing a common destiny and iden-
tity.18 People who share ethnic or national identities and organise
- themselves
into states imagine boundaries that separate 'us' from 'them'; as citizens oc-
cupying the space within state boundaries, they give expression to community
life. When, however, for reasons referred to above, their self-identification
*I I t I Imagined (Security) Communities 343
and loyalties begin to change, their identities will be directed to (and bound-
aries will be imagined to run between) ( a ) territorial regions or locales
within states, ( b ) newly formed territorially-based (super) states, or (c) trans-
national nonterritorial regions constituted by peoples' shared values, norms,
and practices.
It is this last kind of imagined human con~munitythat has trail-blazing
potential for international and transnational relations. It suggests an evolu-
tion towards socially constructed and spatially differentiated transnational
community-regions which national, transnational, and international elites
and institutions, sometimes under the leadership of outstanding individuals,
help to constitute. Community-regions are regional systems of meanings (an
interdependent group of meanings among individuals or collectivities), and are
not limited to 3 specific geographic place." They are made up of people whose
common identities and interests are constituted by shared understandings and
normative principles other than territorial sovereignty and (a) who actively
con~n~unicate and interact across state borders, ( b ) who are actively involved
in the political life of an (international and transnational) region and engaged
in the pursuit of regional purposes, and (c) who, as citizens of states, impel the
constituent states of the community-region to act as agents of regional good,
on the basis of regional systems of governance."'
Within comn~unity-regions,people give their cultural allegiance to nations
(here broadly referring to cultural community) and their political allegiance
to states as political entities. At the same time, people institutionalise com-
monalities running through the whole region, including shared perceptions of
external threats, and promote reciprocally non-threatening practices. Post-
war Western Europe is the most advanced con~munity-regionso far. People
of the 1.5 Western European states have started to organise themselves into,
and to join in the practice of, a supranational system of rule, which Ruggie
calls a 'multiperspectival polity'." However, only in a formal political union
would people give political allegiance to a centralised regional government.
For example, this would be the case if people in the countries of the European
Union would give political allegiance primarily to Brussels.
While community-regions possess a territorial dimension, they are not
merely a physical place. Instead, we may view them as cognitive regio~zsor
cognitive structures that help constitute the interests and practices of their
members, whose meanings, understandings, and identities help keep the
region 'in place'.'2 The social construction of a cognitive region out of inter-
subjective understandings, values, and norms enables people to achieve a
community life that transcends the nation-state and indeed any territorial
base. According to this interpretation, the United States and the European
Union inhabit the same cognitive space." Australia and Canada are also
part of this space. Tel Aviv is 'closer' to London and New York than it is to
Riyadh or Amman, and closer to Warsaw than it is to Jericho (now under
the Palestinian Authority).
In special circumstances, and within the cognitive boundaries of the
community-region, the people of these communities may acquire mutual
344 Widening Security
responsiveness, that is, they may gain the ability to more or less predict one
another's behaviour and come to know each other as t r ~ s t w o r t h yWithin
.~~
some community-regions, then, people, while organised into states may
nevertheless be able to exploit this mutual trust to develop pluralistic sys-
tems of intra-regional governance that minimise or even eliminate the threat
of war in that community-region. We may refer to such fortunate community-
regions as 'security communities'.
Security Communities
In a pioneering 1957 study, Deutsch and his associates introduced the concept
of security community, that is, a group of people who have become integrated
to the point where there is a 'real assurance that the members of that com-
munity will not fight each other physically, but will settle their disputes in
some other ~ a ~ ' . ~ ~ A c c o r to
d i Deutsch,
ng security communities may be either
'amalgamated' or 'pluralistic'. In an amalgamated community, two or more
(sovereign) states formally merge into an expanded state. On the other hand,
a pluralistic security community retains the legal independence of separate
states but integrates them to the point that the units entertain 'dependable
expectations of peaceful change'.26 A pluralistic security community develops
when its members possess a compatibility of core values derived from com-
mon institutions and mutual responsiveness - a matter of mutual identity and
loyalty, a sense of 'we-ness', or a 'we-feeling' among states.27
More recently, Michael Barnett and I have redefined the concept of plur-
alistic security communities as those 'transnational regions comprised of
sovereign states whose people maintain dependable expectations of peace-
ful change'.28Furthermore, we used the following criteria for distinguishing
between loosely and tightly coupled pluralistic security communities: the
depth of trust between states, the nature and degree of institutionalisation
of the governance system of the region, as well as whether states reside in
formal anarchy or are on the verge of transforming it. A 'loosely coupled'
pluralistic security community maintains the minimal definitional proper-
ties just mentioned. 'Tightly coupled' pluralistic security communities, on
the other hand, possess a system of rule that lies somewhere between a sov-
ereign state and a centralised regional government. This system is some-
thing of a post-sovereign system, comprised of common supranational,
transnational, and national institutions, and some form of a collective security
system.29
Deutsch, Barnett, and I agree that the existence of security communities
does not mean that interest-based behaviour by states will end, that mater-
ial factors will cease to shape interstate practices, and that security dilem-
mas will end. Nor do we argue that security communities transcend the
mutual dependence between regional orderly security arrangements and
stable economic transactions.
\iiliii Imagined (Security)Communities 345
To date, according t o these criteria, there are only a few pluralistic security
communities. These include the European Union, which is tightly coupled, and
the Atlantic community, which is partly tightly coupled. Scandinavia as well
as the United States and Canada also form security communities. In the future,
perhaps, the states that comprise the North American Free Trade Agreement
(NAFTA), and the incipient regional communities in South America and in
Southeast Asia (revolving around the Association of South East Asian Nations
(ASEAN))may hecome such communities. Given that we are discussing col-
lective cognitive phenomena, there may be controversy about boundaries and
membership. These controversies arise because states may be members of
more than one community-region as a result either of their 'liminal' status
(e.g., Turkey) or of concentric circles of identity."' For example, citizens in the
states of the European Free Trade Association (EFTA) 'inhabit' a shared cog-
nitive space with citizens of the European Union, who, in turn, share some
core constitutive norms with citizens of Canada and the United States. All of
these states together constitute the North Atlantic security community.
Since the end of the Cold War, the states of Eastern Europe, including
Kussia, have been knocking a t the doors of the institutions that symbolic-
ally and materially represent this North Atlantic community - the European
Union, the North Atlantic Treaty Organization (NATO), the Council of
Europe, and even the Western European Union (WEU). These countries are
seeking an avenue through which they can exert an influence o n politics in
the 'West', as well as reap the benefits of Western markets by becoming full
members of a political community 'where the very fact of such membership
empowers those included in it t o contribute to the shaping of a shared col-
lective destin),'." From the perspective of the states already organised in
this North Atlantic security community, however, new members can be
admitted only after the 'applicants' have learned and internalised their
norms. For the original members, 'it's not enough t o behave like us, you
have t o be one of US'. The status of '~artnership',invented by the European
Union, the Council of Europe, and NATO, intends t o provide a probation-
ary status t o states that wish t o join the North Atlantic security community.
Besides testing the intentions and institutions of applicant states, this pro-
bationary s t a t ~ is
~ sintended t o enable members of the security community
to distinguish whether applicants are making instrumental choices or are
adopting the shared identity." In addition, their partnership in common
economic and security enterprises is meant t o play a major role in changing
the identities of the applicants to make them 'more like us'.
The OSCE has taken a different approach. Rather than waiting for 'the
other' t o change its identity and interests before it can be admitted t o the
security community-building institution, the OSCE has incorporated, from
the outset, all states that express a political will t o live up to the standards
and norms of the security community, hoping to transform their identities
and interests. Thus, the OSCE is building security by means of inclusion
rather than exclusion or conditional future inclusion. According t o Paul
346 Widening Security
Schroeder, since the end of World War 11, international order increasingly
depends on 'associations' based on a normative consensus that 'certain
kinds of international conduct ... had to be ruled out as incompatible with
[states] general security and welfare', and on the power of these associ-
ations to offer and deny ' m e m b e r ~ h i p ' . ~ ~
Furthermore, liheral denlocracies and their civic cultures encourage the crc-
ation of strong civil societies - and of transnational networks and processes -
that promote community bonds and a coninion identity through the relatively
free interpenetration of societies, particularly with regard to the movement
and exchange o f people, goods, and ideas.-'- For example, strong civil soci-
eties greatly facilitate the spread and strengthening of practices that promote
human rights and environmental protection." These, in turn, help produce
and reinforce community bonds and common identity.-'%oreover, social
networks constituted around liberal norms facilitate the transfer of demo-
cratic norms and practices t o societies that lack them."' I believe that a
socially constructed civic culture may help to explain, more than anything
else, the findings of studies that deal with the last two centuries of warfare,
348 Widening Security
which have more or less conclusively shown that democracies do not fight
each other and create among themselves a 'separate peace'.jl
Flows of private transactions in conjunction with transnational institu-
tions (such as epistemic communities and non-governmental organisations
(NGOs))and community law (such as European Union law) can play import-
ant roles in transmitting and diffusing shared normative and causal beliefs
of a civic culture (beliefs or knowledge about, e.g., that CFCs cause deple-
tion of the ozone layer and, therefore, that the use of them should be regu-
lated). International institutions - which provide a forum in which state and
non-state representatives debate and bargain about their understandings
and interests, and in which ideas flow back and forth between the domes-
tic and international arenas - can play similar, if not, indeed, more import-
ant roles than civic cultures.j2
and because states and sometimes individuals and other social actors can
draw on their material and synlbolic resource^.^"
It is important to keep in mind, however, that if (as I argue) social reality
is a result of imposing meanings and functions on physical reality, then mater-
ial and technological (economic and strategic) resources are also needed to
get some actors to accept or internalise the sets of meanings and rules of other
actors. N o t o n l y d o matcrial resources facilitate the reproduction of institu-
tional activities,"' they may also provide incentives for outside members to
choose an identity. As I h v i d Laitin holds, the choice o f an identity 'is often
guided by instrumental reasoning, based on the potential resources available
for identifying yourself'.i"
Furthermore, recent technological developments actually contribute to the
construction of security communities, making possible interactions between
agents 'who are not physically co-present' and turning national communities
into transnational 'imagined security communities'." Technology (e.g., the
Internet) and economic interdependence (e.g., trade, finance, and aid) may
also contribute to the thickening of social relations between domestic civil
societies. For instance, they facilitate the work of environmental and human-
rights movements and NGOs that diffuse understandings from country to
country, and help in the creation of a regional civil society.
Material structures, such as economic well-being and technological ad-
vances, also empower communities since they elicit the formulation of
images of political, economic, and social domestic organisation that come
to be associated with the material progress of the comn~unity.These images,
of, for example, democracy and a market economy, are coupled with nor-
mative understandings that define legitimate regional behaviour and create
the basis for the development of the shared civic culture o n which a plural-
istic security community is based. Economically and technologically weak
states, thus, associate positive images of material progress with 'successful'
or states or regions, such as the European U n i ~ n . " ~
Thus, provided that domestic political resistance against the idea of com-
munity is overcome, successful or strong states may empower this idea with
the material and normative resources that are necessary to realise shared
purposes and interests. In this way, power provides practical meaning to
regional governance systems, that is, to the shared values, expectations, and
practices of member states.""
350 Widening Security
To sum up this discussion about common identity, when people define their
state as belonging to a group of states - 'the den~ocracies',for example - they
internalise certain norms that go with that self-definition. Certain behaviours -
such as concern for human rights - become appropriate, while others - such
as torture - become inappropriate or illegitimate. Henceforth, the state follows
democratic norms not just because its people believe in democracy, but
because the category 'democratic state' now defines, in part, their identity. The
key point to remember, when we seek to explain peaceful change, is that the
identity factor allows peoples from different states to know each other better.
This reduces the uncertainty spawned by the anarchic nature of the inter-
national system and increases mutual responsiveness. The corollary to this
argument is that when it comes to democratic norms, states not only can
know each other better, but they can know each other as states that tend to
soll~ctheir inter~laliznd external problems hy pcizrefid n~eans.
Is there something in the national identities of peoples that hinders the
evolution fro111states to security communities? Social psychology and studies
of nationalism do not deny this possibility. Indeed, the notion of concentric
circles of allegiance stands on firm empirical '[Hlowever dominant
the nation and its national identification, human beings retain a multiplicity
of allegiances in the contemporary world.. .. Under normal circumstances,
most human beings can live happily with multiple identifications and enjoy
moving between them as the situation requires'.--
The notion of concentric circles of identity fits well with the argument
that while 'nations are not "transient phenomena" ',-%other and broader
regional communities o f common identity may develop. For example,
events in Western Europe show that, n o t w i t h s t a n d i ~ lthe
~ fact that new and
more encompassing identities are developing (such as a European identity),
national identities remain strong.
Barry Buzan underscores this point when, borrowing from Ferdinand
Tiinnies, he describes two processes for the development of international soci-
eties - Gcmeinschaft, in which international society develops from a common
352 Widening Security
these norms become a matter of practice and public policy in each member-
state and thus, de facto, a system of regional g o v e r n a n ~ e . ~ '
This conceptual framework makes it easier to understand why people
acting on behalf of their states can nevertheless decide to identify their
security with that of other states. According to the classical intersubject-
ive understanding of sovereignty, states defend their 'local' points of view,
interpretations, and ~ l o r m s . ~ Vpluralistic
~n security cornrnunitics, how-
ever, states come to defend a regional point of view - where 'regional' is
defined in cognitive terms." People may still be able to imagine them-
selves as belonging to cultural-national communities, organised as states
endowed with agency. However, people, as memhers of security commu-
nities, also imagine that, with regard t o their security and economic well-
being, borders run more or less where shared understandings and common
identities end.
Within tightly coupled security communities, then, states perceive inse-
curity not only when their authority is challenged or their existence is
endangered, but also when the basic understandings that constitute the
community are threatened."' (In turn, this may threaten the shared know-
ledge of the peaceful resolution of conflict.) Again, the European Union
clearly exemplifies this notion. The 'constitutive processes whereby each of
the twelve [now fifteen] defines its own identity ... increasingly endogenize
the existence of the other eleven. Within this framework, European leaders
may be thought of as entrepreneurs of alternative political identities'.')'
Ruggie's claim, however, raises an ontological problem in addition to a
theoretical one. If, in tightly coupled security communities, the community
is the structure and its fifteen members are agent statcs, why d o we say that
leaders or institutions, too, may be agents in the community region? The
answer is that, although leaders and institutions rely on a territorial base
and are empowered by states, their identity, roles, and interests are increas-
ingly being shaped by the cognitive community rather than by the particu-
lar states.": Thus, in principle, state agency (which people and their political
elites reproduce) represents the interests, not just of states, but also, and at
the same time, of the c o n ~ n ~ u n i of
t y agent states.
A crucial question arises now. Can the concept of citizen be carried over
from the agent state to the pluralistic security community? Can people fall
within the jurisdiction of several authorities, have multiple identities, and
possess rights of participation in supranational structures, and thus, be citi-
zens both of their own state and the security community?" In principle, if
people are engaged in the political life of their state and their security com-
munity, the answer is 'yes'. 'Citizenship', as Dennis F. Thompson writes,
in the region. These institutions include the Secretariat and the Council of
Foreign Ministers, the Conflict Prevention Center, and the Office of Free Elec-
tions, which later became the Office for Democratic Institutions and Human
Rights (ODIHR),along with other institutions that were added in the follow-
ing years, such as The Forum on Security Cooperation and the High Commis-
sioner on National Minorities (HCNM). They improved the decision-making
and enhanced monitoring capabilities of the future OSCE. The CSCE institu-
tions also extended the reach of democratic pluralism, the rule of law, human
rights, and market systems eastward, and they promoted the peaceful settle-
ment of disputes. In addition, the CSCE became a regional arrangement, in the
sense of chapter VIII of the UN Charter. It established early warning, conflict
prevention, and crisis management practices and expanded peacekeeping
activities, especially in Nagorno-Karabakh and Bosnia.
At the Budapest follow-up meeting, the newly renamed OSCE settled for
its present institutional structure, consisting mainly of the Summit of Heads
of Government (meeting every two years), the Ministerial Council, the Senior
Council, the Permanent Council, the Forum for Security and Cooperation,
the Court of Conciliation and Arbitration, and the OSCE Parliamentary
Assembly. In addition, the OSCE is administered by a Chairman-in-Office
(CIO), a Troika (made-up of the immediate past, present, and future CIOs)
and a Secretary General (and Secretariat). Particularly noteworthy is the role
the OSCE has been playing in the management of the post-conflict situation
in Bosnia-Herzegovina; the approval of a Code of Conduct on Politico-
Military Aspects of Security (1994); and the Lisbon Declaration on a 'Com-
mon and Comprehensive Security Model for Europe for the Twenty-First
Century' (1996)- a politically binding document that outlines the future of
the OSCE.'?
The OSCE fulfills seven community-building functions: (1) it promotes
political consultation and bilateral and multilateral agreements among its
members; (2) it sets liberal standards - applicable both within each state and
throughout the community - that are used to judge democratic and human
rights performance, and monitors compliance with them; ( 3 ) it attempts to
prevent violent conflict before it occurs; (4) it helps to develop the practices
of peaceful settlement of disputes within the OSCE space; ( 5 )it builds mutual
trust by promoting military transparency and cooperation; (6) it supports the
building of democratic institutions and the transformation to market-based
economies; and (7)it assists in reestablishing state institutions and the rule of
law after conflicts. More generally, the OSCE aims to shape new transnational
identities based on liberal values and serves as a conduit for the transmission
of liberal values, norms, and practices to Eastern Europe, thereby helping cre-
ate new vested interests in a pan-European cognitive space.'x
Three notions are crucial for understanding how the community-building
practices of the OSCE work. First, the same practices that offer a means of
dealing with specific problems, such as early warning, conflict prevention,
and the protection of human rights and minorities, also fulfill the role of
356 Widening Security
'building a secure and stable CSCE [now OSCE] community, whole and
free'.99 For example, when the OSCE performs tasks - such as sending a
mission to Tajikistan or to Estonia, organising a seminar on military doc-
trines or confidence-building measures (CBMs), or, as part of its CBMs
regime, requiring states to open up their military activities for inspection -
what matters most is not the short-range success of the project, but the con-
struction of a foundation for community practices and behaviour.
These practices, together with the normative structure embodied in OSCE
documents, institutionalise a new way of cognitively framing regional prob-
lems and solutions around liberal ideas. These documents include the 1975
Helsinki Final Act; the 1990 Copenhagen Declaration on democracy, the
rule of law, and human rights; and the 1990 Charter of Paris, with its blue-
print for a democratic Europe, whole and free. They also help to constitute
new vested interests in, and generate the material and institutional resources
for, reducing human rights violations, helping minorities, preventing con-
flicts that can endanger newly created and feeble democratic institutions in
Eastern Europe, and facilitating the resolution of secessionist conflicts by
peaceful means.
Second, to create shared values and mutual responsiveness, the OSCE
has cleverly exploited expectations of international legitimacy and funda-
mentally transformed the constitutive norms of the OSCE region.loO In
other words, changing the identities and interests of former communist
countries entails setting, promoting, and diffusing two ideas. The first is the
expectation that international legitimacy depends on the democratic nature
of domestic regimes. This implies that peaceful change is predicated on the
knowledge that member states and societies have of one another as liberal
democracies, that is, as 'doves'. The second is the accountability norm,
according to which OSCE states are accountable to one another and to the
OSCE community for what they do to their own citizens. This means that
trust and peaceful change are predicated on replacing the non-intervention
norm with the mutual accountability norm.lO'
Third, developing a 'we feeling' (based on cognition rather than affec-
tion) within a region requires institutional resources, incentives, and encour-
agement. This is why the OSCE has adopted the view that it must first let
the largest possible number of states believe that they are part of a cognitive
region. Only then, when member states have formally and instrumentally
accepted the shared institutional normative structures and practices, does the
OSCE socialise state elites by means of continuous diplomatic interaction
and a wide range of community-building practices. Thus, the rationale for
the crucial 1992 decision to bring all the successor states of the Soviet Union
into the OSCE could be phrased as follows: 'we know you are not "us". Let
us pretend, however, that you are, so we may teach you to be "us". The far
worse alternative - to leave you "outside" and not let you become one of us -
is most likely to turn you into "them", and against us'. lo2
Me cannot understand the role the OSCE plays in security community-
building without taking a closer look at 'cooperative security'. This is the
,\dii%i Imagined (Security) Communities 357
Mechanism); (2) the querying of other states about their military activities
(Unusual Military Activities); (3) the facilitation of peaceful resolution of
disputes by a group of third-party experts (the Valetta Dispute Settlement
Mechanism, followed by the 1993 Convention on Conciliation and Arbi-
tration); (4) the holding of emergency meetings at a high political level (the
Emergency Meeting Mechanism); and ( 5 )fact-finding, rapporteur, long-term,
and sanctions-assistance missions. The Forum for Security Cooperation coor-
dinates CBMs and other arms control activities with security enhancement
and conflict prevention activities. The Code of Conduct on security matters
sets standards of behaviour for the democratic control of armed forces and
the activities of internal security forces of member-states.l1
The institutional processes and attributes of the OSCE,ll' frequently criti-
cised for their lack of coherence and teeth, are, in fact, compatible with the
task of community building. First, the fact that most OSCE injunctions are
politically rather than legally binding makes 'adherence to stated intentions a
test of political credibility rather than an invitation to search for legal loop-
holes', which promotes mutual trust.l12 Furthermore, politically binding
instruments lead to changes in practices, political interests, and public policies,
rather than in legal instruments. In other words, politically binding instru-
ments can sometimes be as effective at producing change as legal instruments.
OSCE processes work less by constraining political behaviour through law
than by promoting public policies that are congruent with regional norms.
Second, the accountability norm is particularly important for a system
of governance that works through legitimation and de-legitimation. Third,
the informality of the Helsinki process, especially in its first stages, has pre-
vented the development of huge bureaucracies. Instead, it has empowered
individuals, NGOs, social movements, and other civil-society actors to act
on behalf of their rights.l13 In other words, informality helped to generate
the dense web of transnational relations throughout the region that is essen-
tial for the development of a transnational community.'14 Fourth, the con-
sensus rule, only recently modified to consensus-minus-one in the event of
gross violations of OSCE norms, means that once consensus is achieved, 'it
has higher moral credibility and greater political weight'."j It also gener-
ates the need to persuade other members by peaceful means, thus struc-
turally promoting socialisation and learning processes.
Fifth, institutionalised learning also results from OSCE follow-up con-
ferences, which review the effectiveness of previous documents, decisions,
and measures. 'This review of practices', Alexis Heraclides maintains, 'was
novel not only in the Helsinki process, but also in the history of diplo-
macy'.l16 Moreover, the follow-up practice breeds the need to define the
notion of success and failure, promoting both self-correcting and goal-
oriented behaviour.l17
Sixth, the Helsinki process promotes and makes prevalent a new type of
diplomacy that integrates academic and diplomatic discourse and practice. For
lack of a better word, I call it 'seminar diplomacy'. The practice, now wide-
spread in other security organisations, such as the North Atlantic Cooperation
: Imagined (Security) Communities 359
Conclusions
Acknowledgements
I thank Hayward Alker, Michael Barnett, Richard Bilder, Beverly Crawford, Raymond Duvall,
Ernst Haas, Arie Kacowicz, Peter Katzenstein, Ann-Marie Burley Slaughter, Alex Wendt, and
Crawford Young for useful comments and Jeff Lewis for research assistance. I also thank the
c,' ii, I Imagined (Security) Communities 361
Davis I n s t ~ t ~ of
~ t Ien t e r n a t i o n ~ lRcl,it~onsa t the Hebrew U n i v e r s q of Jerusalem for financul
assistance. A draft of this paper was presented a t the Annual Meeting of the American I'olitical
Science Assoc~ation,N e w York, 1-4 September, 1994. Another draft was published as Working
Paper 2.28 of the Series: l'olitic~l Relations a n d Institut~ons Research Group, Center for
German a n d European Studies, University of Calitorni,~a t Berkeley, J a n u a r y 1995.
Notes
I. Italo Calvi~io, In~,rsrOlc(:ities, trans. W. Weaver (S.in Ihego, CA: Harcourt Ur,lce
J o v a n o v ~ c h ,19741, p. 82.
2. F.m,in~~el Adler a n d h l i c l i ~ e lRarnett, 'Chverning Anarchy: A Research Agend'l tor the
Study o t Security (:ornrn~~nities',Ethics and Itrtcrtz~~troir~d il/jnrs (Voi. 10, 1996), pp. 63-98,
,ind J o h n G. Kuggie, 'Territoriality and Beyond: P r o h l e ~ i i ~ i r i r ~Modernity ng in International
Relations', I~rlerriiitronizl 0);yLrrrr;17tr~~ir (VoI. 47, N o . I , 199.3), p. 1.57.
3 Renedict i\nclerson, Iim~rrrcd(:onztizcrnrtirs: Rrflrctrorrs on the Orrgzn m d S p r e d of
NLiti(~ncrlrstir(I.otidon: Verso, 19831, p. 15.
4. Z d r a v k o M l ~ n a r ,' I n d i v i d i ~ ~ ~ t.ind
~ o nG l o b a l i r a r ~ o ~ Ti :h e Transformation of Terr~torial
S o c ~ a l Org:inu,~t~on', in Z d r a v k o hllin'lr (ed.). <;lol~nl~;~rtrr~;r and Terrrtorrd Iiiei~trtr's
(Aldershot: Avebury, 19921, p. 24-25,
5 . Until December 1994, the OSCX was the Conference o n Security a n d <:ooperar~on 111
Europe (CSCE).
6. D a w J Sible), 'Outsiders in Soc~etya n d Space', In Kay Anderson '~ntl 1'~y G i l e (eds.),
In~~cvrtrng Plirccs: Strtdres in (:~~ltzrr~11 G e ~ g r a p h y(Melbourne: I.ongman Chesire, 1992), p. 107.
7. J o h n Agnew, 'The 'Ierritorial Trap: T h e Geogr,~ph~calAssumptions of Intcrn,ttion,il
Rel,~tionsTheor! ', Ker~irtuof lrrtcrrr~ztionalPoliticd Erot~unry(Vol. 1, No. 1, 1994), p. 54. For
the conventional view, see Kenneth F. Waltz, Mniz, the State 'uid W ' u ( N e w York. NY: C o l u m l i i
University I'ress, 1'359).
8. Agnetv, op. (.it., in note 7 , pp. 60-61. Alexmder Wendt, 'Collective Identity F o r m a t ~ o n;~ncl
the International State', Arizcwc-aw i'olrtrc~rl.krcwce R e l ~ i c ~(Vol. ~ j 88, No. 2, 19941, pp. 384-96.
9. Agnew, op. (.it., in note 7. p. 62. For counter arguments of the conventional vlew, \ee
D a v ~ dM ~ t r a n y .A LVorkrn~P ~ CSCy s t ~ t n(Chic'igo, 11.: Quadrangle Books, 1966).
10. For a n euaniple of this, see H ~ n J.s Morgenthau, Polltrcs Among N~ltions:T h Strrrggle
for l ' i ~ t ~nw~ i dI'cwre ( N e w York, NY: Knopf. l948), and E.k1. Carr. The T w ~ i z t yY ~ L I YC:rrsis. S'
19 10-I0 39: All Irrtrodt~~~tio~z to ~ I J CStudy i l f Internc~tionc~l R~l~ztrl~tzs ( N e w York, NY: Harper and
lio\v, 1964). (:orporare identity reters t o 'the intrinsic self-org,~n~zingqual~tiesthat constitute
t ~ . hutnan beings. this means the body , ~ n deuperlence of consciousness; for
actor i ~ i d ~ v i d u a l iFor
organizations it means their cotistituent ind~viduals,physical resources, and the sh.~redbeliefs ~ t i d
msritutions in virtue of which ind~vidualsfunction ,is ,I "we"'. So&l identity is the 'sets ot mean-
ings that a n actor attributes t o ~tseltwhile taking the perspective of others, tlint is, as a social
object. ... [ S l o c d ~rientitieslare] .it once cognitive s c h e n i x th'it enable a n actor t o determine
"who I amlwe are" In a situ.1tion and pos~tionsin a social rolc \tructure of \hared understandings
and expectat~ons',Wendt, O / J . clt., In note 8 , p. ,385. In other words, for a state, corporate d e n -
tity refers t o its con\tituent ~ndividuals,physical resources, a n d ~n<rirutionswhich gener'ite inter-
ests of physical security, recognit1011 by other actors, mci economic development. 011the other
hand, In its relations with other \rates, a spate may have ni'lny wcial identit~es,such as 'liberal',
' d e m o c r a t d , and 'bslancer', w h ~ c hgenerate Interests of presel-vlng liberal valws, democracy, and
the balance of power.
I I . Wendt, op. cit., in note 8 .
12. l i u g g ~ e ,op. c-it.. in note 2, p. 16.5. See also Agnew, op. crt., in note 7; Wendt, op. crt..
In note 8; ad K.K.J. Walker, IrrsidelOtctsrde~: Internirtiot~ii/Rrlirtions 0s /'o/rtiru/ T l ~ e o r y
((:ambridge: C:,~rnbridge Univers~ty I're\s, 1993). See aluo t h e contributions in M l ~ n a r(eci.),
o p cit., in note 4 .
1.3. Rnggie, O / J . cit., in note 2, p. 16.5.
362 Widening Security
'An'lrch) and Idcnr~ty',lnterniztronizl Orgartr~atzotz(Vol. 49, No. 2, 1995), pp. 229-52. kor
the view that genuine conflict of interest generates intergroup competition, see Muzafer Sher~f,
G~OLI[J Conflirt izntf Co-opcrizt~on:Their So~.raIPsyrhology (Imidon: Routledge and Kegan
Paul, 1966). For the importance, as well as limitations, of soci,ll-psycholog~ilalexpl,ln,ltions,
see Herbert C. Kelman, Intert~atrorralHehavror: A Social-Psyc.hologica1 Analysis (New York,
NY: Holt, Kinehart m d Winston, 1965).
75. Turner, op. cit.. In notc 70, p. 31.
7 h . James S. Colem.l~~, N i g r r ; , ~ .D,zc-kgrotrnd to h'izt;<,r~nl;srn(Rcrkclcy, CA: linivers;ty o f
Cal~forniaPress, lL).58),~ l n dRichard A. H ~ g g o t ra n d Kim R. No\\el, 'Australia and the Search
for Security Community in the 1990s' in Adler and Barnett ( e d ~ . )o, p rit., in note 28.
77. Antlion) D. Srn~th,'N,lrional Identity and the Idea of Fi~ropeanUnity', Interniitri~nr~l
Affiws (Vol. 68, No. 1, 1992), p. 59.
78. Anthony Black, 'Nation and Comrn~lnity in the International Order', R ~ Y ~ I of CII~
Interrtattot~~ll St~cilres(Vol. 19, No. I , 1991), p. 87.
79. Buzan, op. C-it.,in note 30. Thc reference I S t o F e r d ~ n , ~ nTiinnies, J Cotnnzltrzity amf
Assoctatron [Gentcwschofr ~ u t dG~sells~htzftl, trans. C.P. I.oo~nis,(London: Routledge ,lnJ
Kegan Paul, 19.55).
80. 13uzan, op. cit., in notc 10, p. 336.
8 I. I/~tii.,p. ,339,
82. John C;. Ruggie, '<:ontinuiry dnd Tr:instor~ii,ltiotl In the World Polity: Toward ,I
Neorealisr Synthes~s',World IJo/itics (Vol. 3.5, No. 2, 1983), p. 280.
83. For wveretgnry, see Thomas J. B~erstekerand C y n t l i ~ Weher ,~ (cds.), St~ltc. S ~ ~ w e r g ? ~ t y
as Socral Constrrrrt (Canibnclge: (:amhr~dgeUniversity I'rc\s, 1996).
84. Linklater, o p rit.. in note 20, p. 145, and Hedley Bull, 'lbr Arznrchiu7l Soi-icty (New York,
NY: (:olumh~,l University Press, 1977).
85. Anthony G ~ d d e n s Thi.
, C:onstrtt~t~i~n of Sor~et?.(Berkrlel, CIA: University o f ( h l ~ f o r n ~ , l
Press, 19X4), espectally Chaptet- 1.
86. Anne-M,1r1e Burley and Walter M,lrtli, 'Europe Before the Court: A I)olitic.ll 'l'hcory
of Legal Integration', lntertrntror~~zl Orgnnrmtlon (Vol. 47, No. I, 19931, pp. 41-42.
87. Thomas Buergenrhnl, I'rofessor in International I.nw (George Washington U11ive1-sity) .~nd
US delegate to the CSCE negotiat~ons,iliterv~ewwith authol; October 1993. See also Thorncis
Buergcnthal, 'The CSCE K~ghtsSystem', George WLishlrzgton/ o ~ ~ r t zof a l lrzternLztronilll.aro '2nd
Ecotzott~ics(Vol. 2.5, No. 2, 199 1 ), p. 3.52.
88. See F.1-l. Hlnsley, So~ierrrgrzty,Second Edition (C..1mbrldge: Canihridge Un~versity
Press, 1986).
89. David J,lcohson, Krghts Ac-ros Bordrrs: Irrtrrzrgrtltri~rri l r ~ r fthe D~clirzeofCrt~zer2~~11/1
(Baltimore, MD: The Johns Hopkins Un~versiryI'ress, 1996).
YO. Tho11las M. Franck. 'The 1:merging R ~ g h rt o I)eniocr,lr~c(hvernance', 'Thc AtrrerrC-iztz
/oarr~zalof lntrrrzirtir~nalLi~zr~ (Vol. 86, No. 46, l992), pp. 46-9 1 .
9 1 . Kuggie, op rit., in note 2, p. 172.
92. Adler and Karnett, op. cit.. in note 52.
93. I.inklater, '(.itizensh~p.lnd Sovereignty in the I'o~t-WestphalunStarc', up. itt., In note
20, pp. 97-98.
94. Dennis t. l'hompson, T l ~ cL)cwzorrotrc Citizen (C:,lmbr~dge: Camhridge l l n ~ \ e r ~ i t )
Pre\s, 1970), p. 2. In\tead, J e a n Bodin argues that w h ~ 'make\ t J m,ln a citizen 11sI the r n ~ ~ t u a l
obligation between suhlecr and sovereign'. Je~11iRoiltn, .%I>-lI(r~oksO H t 1 (:otnnzi~rz~~~ei~lt/~ ~
(London: Blackwell, 1967), p. 21.
95. Examples of t h ~ sare the OSCE, the European Union, the (huncil of Europe, AS well
as, lately, NATO and ASEAN.
96. For some recent studies on the CSCE/OSC'E, see Sret,ln l.ehne, The CSCE in the I9YOs:
(;orntizorz Eurol~eanHo~tscr~ J YPotemkin Vi//izge? (Vienna: Ikaumuller, 199 1); Michael h c a s
(ed.), TIM C S C t rtz the 19')Os: (:onstnii.trng E u r o p e m S ~ i ~ i r arntd~ Cooperatlr~n(Baden-
Baden: Nomos, 1993); Vojtech Mastny, TIIP tfclsirtki Process m d tlw Relntegratron of Ezrrop~
19x6-1991: Analys~satzd 1)oirorzcntatioiz ( N e w York, NY: New York Un~versityPress, 1992);
Alexis Heraclides, Seczrr~tya r ~ dCooperiltror~rn Ertropc: T/JC11~1tmrtzDimension, 1972-1 992
366 Widening Security
(London: Frank Cass, 1993); Arie Bloed, The Conference on Security and Cooperation in
Europe: Analysis and Basic Documents, 1972-1993 (Dordrecht: Kluwer Academic Publisher,
1993); Victor-lves Ghebali, L'OSCE duns /'Europe Post-communiste, 1990-1 996: Vers une
Identite Paneuropeenne de Securite (Brussels: Bruylant, 1996); and Diana Chigas, with
Elizabeth McClintock and Christophe Kamp, 'Preventive Diplomacy and the Organization for
Security and Cooperation in Europe: Creating Incentives for Dialogue and Cooperation', in
Abram Chayes and Antonia H . Chayes (eds.), Preventing Conflict in the Post-Communist
World (Washington, DC: The Brookings Institution, 1996), pp. 25-97.
97. For additional information on the CSCEIOSCE, see Conference on Security and
Cooperation in Europe, Charter o f Paris for a New Europe (Paris: CSCE, 1990);Conference
on Security and Cooperation in Europe, The Challenges of Change: CSCE Helsinki Document
1992 (Prague: CSCE Secretariat, 1992);Conference on Security and Cooperation in Europe,
Toward A Genuine Partnership in a New Era: Budapest Document 1994 (Prague: CSCE
Secretariat, 1994); Organization for Security and Cooperation in Europe, Lisbon Document
1996 (Lisbon: OSCE, 1996);and Chigas et al., op. cit., in note 96.
98. See James E. Goodby, The Diplomacy o f Europe Whole and Free', in Samuel F. Wells,
Jr. (ed.),The Helsinki Process and the Future o f Europe (Washington,DC: The Wilson Center
Press, 1990),p. 59. Note that I do not claim that there is already a security community, or that
the OSCE would ultimately succeed in establishing a security community, in the entire OSCE
region.
99. Conference on Security and Cooperation in Europe (CSCE),'Toward a Genuine Partnership
in a New Era', Budapest Document, 1994 (Budapest:CSCE, 1994). See also a statement made by
the head o f the US delegation to the CSCE, Ambassador John Kornblum, at the CSCE Seminar on
Early Warning and Conflict Prevention, Warsaw, January 20, 1994, to the effect that CSCE prac-
tices 'are designed to be part o f a process o f community building'.
100. Marianne Hanson, 'Democratization and Norm Creation in Europe', Adelphi Papers
284 (London: Brassey's for the International Institute for Strategic Studies ( I I S S ) , 1994),p. 34.
101. Ibid.
102. Heraclides makes a similar point. See Heraclides, op. cit., in note 96, p. 15.
103. Janie Leatherman, 'Conflict Transformation in the CSCE: Learning and Insti-
tutionalization', Cooperation and Conflict (Vol. 28, No. 4 , 1993), pp. 413-14. Transparency, the
absence o f nuclear deterrence, intensive and regular communications, diffusereciprocity, and a set
o f interlocking security, human rights, economic, and environmental organisations characterise a
fully developed model o f cooperative security. For cooperative security, see Janne E. Nolan (ed.),
Global Engagement: Cooperation and Security in the 21st Century (Washington, DC: The
Brookings Institution, 1994).
104. See, for example, Arnold Wolfers, Discord and Collaboration (Baltimore, MD: The
Johns Hopkins University Press, 1962), Chapter 10.
105. Buergenthal, op. cit., in note 87, p. 382, emphasis added.
106. Ibid., pp. 380-81.
107. Lehne, op. cit., in note 96, p. 5. For the Human Dimension the reader may refer to
Heraclides, op. cit., in note 96, and Arie Bloed and Pieter van Dijk (eds.),'The Human Dimension
of the Helsinki Process: The Vienna Follow-up Meeting and its Aftermath (Dordrecht: Martinus
Nijhoff, 1991). O n the HCNM, see Alexis Heraclides, Helsinki-11 and its Aftermath: The Making
of the CSCE into an International Organization (London: Pinter Publishers, 1993).
108. Lehne, op. cit., in note 96, p. 62.
109. Ibid., p. 15.
110. For OSCE institution building the reader may refer to Heraclides, op. cit., in note 107.
111. For a critical account o f OSCE institutional processes, see Richard Weitz, 'Pursuing
Military Security in Eastern Europe', in Robert 0. Keohane, Joseph S . Nye, and Stanley
Hoffmann (eds.),After the Cold War: International Institutions and State Strategies in Europe,
1989-1991 (Cambridge, M A : Harvard University Press, 1993), pp. 342-80.
112. Mastny, op. cit., in note 96, p. 2.
113. US Commission on Security and Cooperation in Europe, Beyond Process: The CSCE 's
Institutional Development, 1990-92 (Washington, DC: 1993). For social movements, see
Thomas, op. cit., in note 50.
lti1i?* Imagined (Security)Communities 367
1 14. h i d .
115. For the quote, see L,ehne, op. cit., in note 96, p. 73. The 'conse~~sus-minus-one' provi-
sion fro111 1992 reters only to thc human d~mensionand not to ,111 the co~nmitmentsand princ~ples
o f the OS(:E. However, in prxtice, the provision has heen used more widely. O n paper, at least,
there also exists a ' C O I ~ S ~ ~ S U S - I ~ ~ I ~ prov~sion
L I S - ~ ~ V ~In' the case of directed concihation procedure,
d~rectingtwo disputants to \eek concil~arionirrespective of t h e ~ rwill. Heraclides, o p . clt.. In note
107, pp. 179-80.
1 16. Hrt-acl~des,op. c-rt., tn n o t e 96, p. 5 1.
117. Mastny, o p . cit., in note 96, p. 3.
1 1 8. Mantred Woerner, 'NATO Transformed: The S i g n ~ t ~ w n oc fe the Rome Summit', NATO
R e l m ~ o(Vol. 39, N o . 6, 199 I), p. 5. The North Atlantic Cooperation Council was replacrd and
upgraded by the Euro-Atlantic Partnership Council in May 1997.
i 19. Martha Finnemore, 'International Organ~zarionsas Te.lchers of Norms: The United
Nations Education,~l,Scientific, and Cultural Organization , ~ n dScience Policy', Intrrr~atrond
Orgnizlzntron (Vol. 47, N o . 3, 19931, pp. 56.5-97.
120. Conceptually, semn,ir diplomacy 3tands o n s ~ r n ~ l hut a r broader grounds than Herlicrt
Kelman's social-pychological 'Problenl-Solwng Workshop' dpproach for settling international
confl~cts.See Herhert C. Kelman and Stcphan I? Cohen, 'The Problem-Solv~ngWorkshop:
A S o c ~ a l - l ' s y c h o ~ ~ gContribution
ic~~~ to the Resolutioil o f Internat~ond( h f l i c t ' , /otcrrzal of Peme
Resmrch (Vol. 13. N o . 2, 19761, pp. 79-90.
12 1. See Kuggie (ed.), op. cit., in note 37.
122. Adler and Rarnett, o p . rlt., in note 2, p. 77.