Professional Documents
Culture Documents
In the January 1996 issue of the Review , Bill McSweeney argues that our 1993 book ,
Identity; Migration and the New Security Agenda in Europe ( IMNSAE ). subverts
'
ihe analysis of Buzans People, States and Fear ( P$F) "without enhancing our under
standing of the problem of security ( p. 93}, 1 Of the many charges that McSweeney
brings to bear we will address three. First is that societal security is merely a trendy
response to current concerns about nationalism rather than a more theoretically
considered move. Second and this seems to be the core of his complaint is that
the view we take of identities' is far too objectives! and not (de )construct!vist
enough , and that our approach makes it impossible to consider the process oT iden
tity formation as part of the politics of security. Third , he says that Buzan's
association with IMNS E contradicts strong positions he developed in PSF and
1
i
i
'
241
242
"National : Toward an Identity Agenda in Neorealism?', in Yosef Lapid and Friedrich Kratochwil
(eds.), The Return of Culture and Identity in lR Theory ( Boulder, CO, 19%), pp. \Q>- 2 b ; Martin
Shaw, Global Society and International Relations: Sociological Concepts and Foil deal Perspectives
(Cambridge. 1994) , We appreciate the opportunity to take stock of critiques, reflect self-crilically or
our vnurk , and put forward some further arguments at this later stage of the debate.
Lapid and Kratochwil , " Revisiting the National *1 *.
243
identity never becomes a "thing at all: there is never a product as such . And
conversely, if one studies the politics around the established identities {as we do ), why
does that have to mean positing identities as God given, immutable, and intractable
by sociological , deconstructionist ' analysis? Why can one not think of identities as
definitely being constructed by people and groups through numerous processes and
1
practices, and that when an identity is thus constructed, and becomes socially
sedimented , it becomes a possible referent object for security? As we see it , one can
choose to place the analytical emphasis on either end of the spectrum . Doing so
produces different kinds of inquiry, probably for different purposes. But there is no
reason to picture either approach as unable to accept the existence of the other .
The main weight of McSweeney 's accusation is that we impose a rigid ,
' objectivist \ ' near positivist ' view of identity on society ( p. 83 ); but he ignores the
explicitly constructivist approach to society ( and even more to security ) set out in
chapter 2 of fMNSAE . To take something as being more than the sum of its parts
does not make it immune to process inquiry" or make its values and vulnerabilities
' objective in the positivist sense ( p. 84 ) Because we talk of individuals actually
identifying themselves as members of society, and because we talk about how
societies reflect on threats to, and defence of, what they take to be their identity,
McSweeney concludes that we project society and identity , . , as objective
realities, out there to be discovered and analyzed ( p. 83 )
There are no statements to this effect in the book , and a number directly to the
contrary, McSwccncy must therefore assume that , since we treat identity in some
specific situations as an object of security concern ( that which is to be defended ) , we
think that identity is always a thing, and an immutable one at that . This is not a
logical conclusion , nor is it a correct description of our position . To take identity as
a possible object of securitization , one has only to assume that it holds a social
power that makes it efficient to invoke it , and that it has a form which makes
security discourse possible ( i.e., it has a claim to survival as well as a clear image or
what non-survival would mean ). Usually this demands that the referent has become
relatively stabilized in social practice.
This is our view. The state is not a constant either, yet there is a lot of security
policy to defend it . France has changed over the centuries, but there is a French
security policy . There are actors who mobilize security policy in the defence of
something which is thingjsh enough to be invoked in this wray. Identities too can be
defended . This does not imply that identities do not change, only that we should not
expect everything to change all the time : certain things stay the same throughout the
period relevant for an analysis. A very big part of social science is about what to
take as relatively more fixed than what .6
s On objectivism subjectivist and intersubjectivist approaches to security, see. most thoroughly. Jel
Huysmans, "Making/ Unmaking European Disorder: Meta theoretical , Theoretical and Empirical
Questions of Military Stability after the Cold War' ( Ph D. thesis. Catholic University of Louvain.
19%), pp. 45-57, 54-6.
6
For McSweeney there are constructed things identity and real things the stale -security !
Identity he argues is peculiarly fluid and therefore not to be treated as an object . This he argues by
various contrasts to how other things are tangible, measurable and to be "challenged by evidence
Wc prefer to take a social constructivist position ' all the way down ' . However, identities as other
social constructions can petrify and become relatively- constant elements to be reckoned with.
Especially we believe security studies could gain by a constructivism that focuses on how the very
security quality is always socially constructed : issues arc not security issues by themselves, but
,
244
fVtever
McSweeney tells us: " Identity is not a fact of society ; it is a process of negotiation
among people and interest groups. Being English , Irish , Danish is a consequence of
a political process , We agree. He continues : and it is that process, not the label
symbolizing it , which constitutes the reality that needs explication ( p. 85 ) . Maybe,
but we doubt that this would be a very effective approach for security studies. One
could study process, just as one can study the historical origins of a state to explain
why it is there as object of security policy, rather than studying its current security
policy But to understand an identity as a possible referent object for security policy,
one actually has to understand the label symbolizing it . McSweeney asks lor a
deconstruction!si approach to identity. That means precisely that one has to under
stand powerful symbols, labels and the discursive structure of political moves that
surround them. Security discourse always uses a symbol or a concept as all other
discourse, it is unable to grasp the thing or people as such . A label surely can be
securitized .
McSweeney sees social identity as permanently mutable and unstable: ' never more
than a provisional and fluid image of ourselves as we want to be ( p. 90). We agree
that identity is socially constructed , but see it as often solidly sedimented .
Furthermore, the knowledge that an identity is never fully stabilized , that it is always
problematic, should not lead us to just denounce the possibility of doing security in
its name. Quite the contrary, this lack is often the key to understanding its vulner
abilities, restlessness and security efforts. If we want to understand the peculiarities
of the branch of security policy that is conducted on behalf of identity, it is indeed
helpful to investigate the inherent paradoxes of acting in defence of an identity
which is never simply constant in itself, but always contains a longing for a desired
self . Collective identities of this sort can never be more than a series of partially or
temporarily successful , but ultimately impossible, closures, 7
Our rejection both of McSweeney s characterization of our position , and of his
eilher/or choice about analytical method has two roots, one normative and the other
ontological. Both issues are important to how security studies is pursued , and are
worth investigating a little more closely.
1
Ontological
issues
Here the problem seems to be our preference for methodological collectivism versus
McSweencys for methodological individualism. The issue is much bigger than
methodology, the underlying question being whether to reduce security to the level
of individuals. This is an ontological issue: is society the sum of the individuals or
does it have group qualities that go beyond the sum of its parts? Even Durkheim.
who held that society had sui generis features that were to be located as attributes of
society as a whole, actually studied societal processes and vigorously defended
individualism . Just because we are methodological collectivists, does not bar our
;
Ernest o LncEau and Chantal MoulTc , Hegemony and Socialist Strategy; Toward a Radical
Democratic Politics ( London , 1985); Ernesto Laolan . \eu Reflections on the Revolution of Our Time
( London , 1990 ); Slavnj Zizek , For They Know Not What They Do: Enjoyment os a Political Factor
( London . 1991 ); Ole Wsver. Insecurity and Identity Unlimited, in Le G loan nee and McNamara
( eds . L Le Dsordre europen.
245
engagement with questions about how collective identities are shaped . The argument
of McSweeney, as of many critical theorists and peace researchers, seems to be that
if one wants to open up to a world beyond the state* one has to take a bottom up,
individualist (and/or small group) perspective. In this individualist perspective,
identity is indeed one "among the countless values which people are concerned about
and which can be attributed to the collectivity of society" ( p. 84 ) , in which case it
seems problematic to single U out above the numerous other values. McSweeney
prefers an analysis of all the individual values that can be threatened * and is here
taking over formulations verbatim from peace researchers such as Johan Galtung
and Jan 0berg . He seems to want to define a priori that all security is reducible to
individual security.
As we argued in IMNSAE ( pp. 20^7 ), to move down to the individual level has
severe consequences It is possible to take the individualist , aggregate view of
security, but as far as we can see, unless one is extremely careful , this becomes
another mono- unit ontology, where all security is ultimately individual security and
the security of the state has to be measured and discussed on the basis of how it
influences the aggregate security of " its" individuals. Wc resist this turn because the
state cannot be reassembled from individual -level attributes; it has sui generis state level attributes and one has to see the state itself as a unit reality. Individual security
can be studied from our perspective, because wc are interested in all action that
fulfils the criteria of being a security speech act . Doing this in the name of indivi
duals is, however, much more difficult than action in ihe name of limited
collectivities or on behalf Q general principles. In our securitization perspective,
identity is not a " value ( he. the individuals ) , it is an intersubjectively constituted
social factor.
To us it seems that the two approaches are complementary ; each can do things
that the other cannot . The individualist approach is not able to grasp a lot of the
securitization that takes place, which mostly has various limited collectivities states,
nations or, as we show in our next book , specific principles at the international
level as referent objects. Neither is it able to manage larger interactive form
ations for instance, regional security complexes as our more Realist and
reactionary approach can . Conversely, we cannot answer critical and emancipatory
questions about the Teal " security of marginalized groups who do not articulate
security demands in any powerful way. This critical thrust in McSweeneys enterprise
underpins the normative problems that separate our positions, and allows us to put
the charge of objectivism back at his feet .
Normative issues
McSweeney more than hints that the purpose of studying process is to discredit as
political manipulations at least some claimed identities. As an antidote to nationalist
attempts to present identities as necessary or innocent , it is politically important to
expose the tainted roots of all identities But this neither sorts problematic or
artificial identities from 'authentic " ones, nor identities from more " real political
referents. Is there any state whose current existence does not depend on centuries of
violence, selective memory and politically motivated identity politics? As Derrida
1
246
argues: lYou cannot object to a unity simply because it is the result of a process of
unification . . , [T]here are no natural unities, only more or less stable processes of
unification, some of them solidly established over a long period of time , 4
Against our allegedly static, objectivist concept of identity, McSweeney rather
disturbingly proposes that identity be corrected , and calmly goes on from there to
call for someone to take on "the task of speaking objectively for the society'
( p. 88). According to McSweeney (p. 87 ), perception and fear of threats to security
can , in principle, be checked by observing and evaluating the facts external to the
subject . McSweeney feels able to assess security perceptions for their objectivity We
do not, so we designed a security theory that is much more radically constructivist.
As against McSweeneys traditional , critical approach , with its objective require
ment for understanding of security, our approach has the advantage of insisting that
any securitization always rests on a political choice. Security can never be based on
the objective reference that something is in and of itself a security problem. That
quality is always given to it in human communication . And when securitization is
seen as a political choice, there is less chance that security gets idealized as the
sought for condition , and more chance that the path to dcsccuritization taking
things back into normal politics stands out more clearly, ^ This is the starting-point
that McSweeney missed in IMNSAE. He therefore imposed a false reading on all
the rest, leading to the paradoxical accusations that we are too objectivist .
Uut why would McSweeney counter our approach with one correcting identities,
why expect security analysts to be able to arbitrate between competing identity
claims ( p, 88)? McSweeney s scepticism towards societal security seems to stem from
a concern that identity is often not the root cause of conflicts but rather an
instrument used by ( nationalist ) elites ( p. 86 ). Others have also spotted this problem
with an identity approach to security. As argued above, we are sceptical about
attempts to judge which identities are authentic and which not, because all are
constructed and all are shaped by politics, Once mobilized , identities have to be
reckoned with as something people perceive that they belong to, and act upon as
objective, given . The Jsraeli-Palestinian conflict is not solved by exposing the
contingent nature of both identity groups. It might be a part of conflict resolution to
stimulate collective redefinition in each group to change the constellation away from
complete incompatibility, but no solution is viable that denies either group a right to
survive.
There is a consistent , though in our view often unhelpful , alternative to our
approach in the stand taken by most post-structuralists (and some radical con
structivists): to question all identities, celebrate contingency, and generally aim for
weaken more self consciously fragmented identities: a politics of disturbance ' . | i}
MeSweeneys suggestion seems to be less radical than this but also less theoretically
consistent . He wants "criteria for legitimizing decisions about identity ( p, 90 ); he
wants to he able to correct identity claims.
To correct can either mean just to change as a result of debate, or it can mean to
rightcn, to approach to the true. We address these separately as corrections 1 and 2.
3 Jdtquti Derrida . ' The DeconstruLiion of Actuality * (interview) Radical Philosophy, 6H I 994 ),
p. 41.
9
10
Ole WKYCT, Securitization and Desecnritijation', in Ronnie D. Lipschutz (cd. ), On Security ( New
York , 1995), pp. 4 fr- $6
William E. Connolly, Identity! Difference: Democratic Negotiations of Political Paradox ( Ilhaca, NY,
1991 ), and The Ethos of Pluraiiiation {Minneapolis, 1995 ) .
247
Correction ] means to engage in debates over how we define ns, and there should be
'
no doubt that this will often be a major issue in any specific security conflict involving
identity. We cannot claim to be able to tell what is the "correct identity, but we hope
to be able to predict some consequences of one or the other self -definition due to the
way different identities will interact in security mode. This seems an appropriate task
for the security expert. With Durkheim we could say: ' Yet because what we propose
to study is above all reality, it does not follow that we should give up the idea of
improving it. 11 More specifically, we suggest in IMNSAE a focus on how con
stellations form with identities at different levels and how to assist developments
where these become mutually compatible ( pp, 193ff. and the case-study of Europe,
eh . 4) We think that one can and should engage in critical debates over how
communities construct their identities. But we think it is too optimistic to think this
will solve all the problems. There will still be the issues wc were concerned with arising
from security that actually gets articulated in the name of threatened identities.
Correction 2 is some form of reasoned intervention telling what is the right
identity. We are sceptical or correction 2 because wc arc unable to follow
McSwreeney into objective security. To be able to tell people that they are not what
they think they are demands an objectivist conception of identity. MeSweeney
rightly criticizes us for being relativist: lwe are stuck with every other community s
account of its identity ( p, 87) . In the good classical Realist tradition , a major task
for security analysis is to help actors understand how others construct their con
ception or security. This should not be replaced by a demand that others think
' correctly * in accordance with some scientific theory of security ( which usually
means how we would like them to conceptualize themselves in ideological terms that
suit us ). He is worried that our position leads to something like : We may not like
who they are, but if They think that way, so be it ( p. 87 ) . Classical Realists as well as
post-structuralists will prefer this to the universalism and harmony- of -interest
assumptions necessary to avoid such situations. There will be others who are
different ; if wc cant live with that , we will certainly have security problems,
MeSweeneys argument at this place is perplexing. He tells us at length that
identity cannot be just read from polls, culture or some other form of history of the
community, it ultimately involves a choice. This is exactly the view we presented .
After our review of the literature on nationalism in IMNSAE (eh, 2), we conclude
( like most others in the field ) that there can be various objective markers at play
language, history, culture, race, political borders -but that ultimately national iden
tity cannot be defined in terms of any of these, only as the choice of identification
made by individuals. All these conditions might strongly influence their choice, but
none determines it. Because of Me Sweeneys cither/ or move quoted above, he has
constructed a Wsever el ah that say with the nationalists that identity is objective,
given and necessary, it is what we are and have to be because of history. He then
succeeds in refuting this fictitious position .
MeSweeneys task in this section , however, was to get to a way to ' correct
identities against our "relativism ' so just pointing to the element of choice does
not help him much , MeSweeney ends up with a strong call ( p. 89 ) for a referee to
settle identity questions authoritatively, but at this crucial point of his analysis
Emile Durkheim, The Division of Labor in Society ( New York ,
p xxvi.
248
( pp.
88 90) he becomes frustratingly unclear. His worsi case seems to be that identity
remains unsettled and vulnerable to political manipulation ; his best that it is
somehow negotiated amongst the citizenry. He is not dear about what role security
analysts are supposed to play in this process, and if they are to participate how they
should separate the role of analysts from that of participant in the securitization/
desecuritization piocess. Although he wavers on the question, the state lurks in the
background as the authoritative imposer of 'arbitration should negotiation fail and
anarchy threaten . In this discussion McSweeney first slips into reifying society as
that which is contained by the state, and then into the assumption that this 'society"
must somehow find, or have imposed on it , a collective image of itself. Our startingpoint was that wc found this essentially Hobbesian position deeply unsatisfactory.
We wanted to leave room for a concept of society detached from the state, and for
circumstances in which identity politics was about maintaining difference rather
than finding a collective image. In those circumstances the question is not
McSweency s one of who arbitrates, but whether there should be an arbitrator, and
how definitions of difference can be constructed in ways that exacerbate or mute
1
insecurity.
Our unease with the state is supported by a very long list of profoundly
problematic state interventions on identity issues. To take just one: the Kurds in
Turkey. Should the Turkish state really be the final judge on Kurdish identity and
security"? As we explained in IMNSAE ( pp. 24 5 ), this was a major reason for our
revision of P5F concepts: when societal security was conceived of as one more form
of state security The way states could be undermined or destabilized by " their" 1
societies becoming threatened or weakened in terms of social cohesion and
identity"- it had the perverse effect that a state would feel most secure if some
minority could just be put down. If one wants to take this minority seriously and
say societal security is about their security, one has to open up to a more complex
249
most of the points he tries to hang on il Tail by default . We argue that whai is or is
not prime in international security, including the state, depends on historical
conditions. The particular case of 1990s European security is difficult to grasp if
seen simply as a constellation of nation states. Much more of the dynamics can be
brought out by a constellation made up of at least three kinds of ( non like) units:
states, nations and the EU. We do not , as McSweeney would have it , argue that
societal identity has now become the. core value in security ( p. 82 ), only that it can
become a referent object for security action . While McSweeney is right to point out
that IMNSAE does raise questions about Buzan's formulation of weak and strong
states, and security complexes, he is wrong to think that Buzan has therefore ; to
reformulate his entire theoretical framework " (p. 92)
In one sense, the arguments in IMNSAE are simply an elaboration on the whole
problematique of weak states, Giving societal security the status of a referent object
does not prevent the existence of strong states, Nothing in the idea says that
collective identity has to be in opposition to the state, or even that societal issues
have to become securitized . But it does enable one to look more deeply into the
problems of weak states, where societal insecurity is often a central issue,
McSweeney worries unnecessarily about the impact of all this on the link between
strong states and mature anarchy. Although an important logical and idealist
component in PSF, that link was always highly qualified: strong states were a
necessary but not a sutficicnt condition for mature anarchy. PSF had little useful to
say on how to solve the problem of weak states, IMNSAE does not solve the
problem either, but it does offer better analytical tools for examining it . In this
context , the idea that the international system is not in any way allowed to
determine shifts in the security position of the state ' ( p. 92 ) has never been part of
Buzatfs position and is a contradiction of the central tenets of all forms of
structural realism ,
McSweeney is right to hint ( ppt 91-2 ) that IMNSAE creates difficulties for
security complex theory. Why was the concept of security complex not used more in
IMNSAE? Why not either construct a societal security complex , or integrate the
new concept of societal security directly into classical security complex theory as
presented in PSF, which was constructed from the political and military sectors and
was purely state based? It is not obvious that security complex theory with its basic
claim about a regional focus for security dynamics also holds for the new sectors of
security; the environment , economic and societal security , To insert the security of
societies into regional formations defined by the states, as we did in IMNSAE , was
not an ideal solution , and it demands serious reflection whether security complex
theory can be rearticulated for a post sovereign system where actors other than
states are also players. This problem of how to reconcile the new' sectors of security
studies with security complex theory is a core theme of our next book .
4. Conclusion
If space allowed , there are other points we could take issue with in McSweeney s
piece. But it is more pertinent to raise some general questions that stem from the
nature of his review . Most worrying is McSweeneys implicit argument that there is
only one correct way to study security. We believe that there are many ways to
250
understand security, and that each will have its merits and its drawbacks. Focusing
on any one element will always make some things dearer at the cost of obscuring or
distorting others, That is the nature of social theory, and there is no escape from it .
We also found it odd that he ( kindly ) designates us as the Copenhagen school\
and then ignores what this might mean . There are enough institutional barriers
against collective writing, without the academic critique and debate also being
unable to acknowledge collective works as collective. By focusing on Buzan ,
McSweeney virtually ignores Wsever, who made the main theoretical contribution to
1 MNSAE. 12 This blindness seems to explain how McSweeney missed the strong
Ole Wsver. Security, the Speech Act ' Working Paper, 1989 / 19. (Centre for Peace and Conflict
Research , Copenhagen ) , " Securitization and Desecuritizatlon \ " European Security Identities" .
Journal of Common Marker Studies , 34 ( 1996 ), pp. 103-32 ; " What is Security? The Sccurilyness of
Security*, in Birthe Hansen ( ed - ) , European Security -2 M )0 [ Copenhagen , 1995 ), pp. 222 - 49;
"
Sikkerhedspolitik nationalsstaiens mottopoJ?' (The Concept of Security Monopoly of the
Nation Slate?), Crus , 46 ( 1995 ), pp. 43- 70; " Insecurity and Identity ; Societal Security A Concept
and its Consequences , in Cooperation and Conflict ( forthcoming ).
'