Skip to main content

Private Military and Security Companies, Territoriality and the Transformation of Western Security Governance

  • Chapter
Book cover The Diffusion of Power in Global Governance

Part of the book series: Palgrave Studies in International Relations ((PSIR))

Abstract

The field of security governance holds a special place within the context of the debate over the diffusion of power from state to non-state actors, from national to international authorities and from governments to markets in Western democracies. Not only has the provision of the ‘public good’ security been considered one of the main functions of government, but also it has played a major role in justifying the centralization of power and authority within and by the nation-state (Leander, 2006; Krahmann, 2010). The contemporary proliferation of private military and security companies, that is, companies that sell armed and non-armed security services to public and private customers, poses a particular challenge to state-centric notions of national and global governance. Of course, commercial security providers are not new. Businesses have always played a role in national and international security, whether as mercenaries, armaments producers or logistics suppliers in major conflicts. The increasingly global scale of the private military and security industry, its functional expansion into areas previously considered to be ‘inherently governmental’ as well as their growing use by private individuals and business customers, however, suggest a significant transformation in security governance since the ‘golden age’ of the Western nation-state in the mid-twentieth century (Leibfried et al., 2008; also Hogan, 2000; Edgerton, 2006). Notably, 80 per cent of their customers are individuals and corporations, suggesting significant private power over the provision of security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abrahamsen, Rita, and Michael C. Williams. (2007) The Globalization of Private Security — Country Report: Nigeria, Report, University of Aberystwyth, http://users.aber.ac.uk/rbh/privatesecurity/country%20report-nigeria.pdf, date accessed 31 May 2012.

    Google Scholar 

  • Adler, Emmanuel, and Michael Barnett. (1998) ‘A Framework for the Study of Security Communities’, in Emmanuel Adler and Michael Barnett (eds) Security Communities (Cambridge: Cambridge University Press), pp. 29–66.

    Chapter  Google Scholar 

  • Aegis. (2011) United Nations Global Compact — Communications in Progress (London: Aegis, March), http://www.aegisworld.com/uploads/UNGC%20COP%200411.pdf, date accessed 9 January 2012.

    Google Scholar 

  • Allander Security. (2012) Home, http://www.allandersecurity.com/securitysolutions.html, date accessed 9 January 2012.

    Google Scholar 

  • Andreas, Peter, and Richard Price. (2001) ‘From War Fighting to Crime Fighting: Transforming the American National Security State’, International Studies Review, 3 (3), 31–52.

    Article  Google Scholar 

  • Aning, E. K. (2001) ‘Whither Africa’s Security in the New Millennium: State- or Mercenary-Induced Stability?’ Global Society, 15 (2), 149–171.

    Article  Google Scholar 

  • Atkinson, Rowland, and John Flint. (2004) ‘Fortress UK? Gated Communities, the Spatial Revolt of the Elites and Time-Space Trajectories of Segregation’, Housing Studies, 19 (6), 875–892.

    Article  Google Scholar 

  • Atkinson, Rowland, and Sarah Blandy. (2005) ‘Introduction: International Perspectives on the New Enclavism and the Rise of Gated Communities’, Housing Studies, 20 (2), 177–186.

    Article  Google Scholar 

  • Avant, Deborah D. (2000) ‘Privatizing Military Training’, Foreign Policy in Focus, 5 (17), 1–2.

    Google Scholar 

  • Avant, Deborah D. (2005) The Market for Force: The Consequences of Privatizing Security (Cambridge: Cambridge University Press).

    Book  Google Scholar 

  • Avant, Deborah D., and Lee Sigelman. (2010) ‘Private Security and Democracy: Lessons from the US in Iraq’, Security Studies, 19 (2), 230–265.

    Article  Google Scholar 

  • Benz, Arthur, and Yannis Papadopoulos. (2006) ‘Introduction — Governance and Democracy; Concepts and Key Issues’, in Arthur Benz and Yannis Papadopoulos (eds) Governance and Democracy: Comparing National, European and International Experiences (London: Routledge), pp. 1–26.

    Google Scholar 

  • Bislev, Sven. (2004) ‘Globalization, State Transformation, and Public Security’, International Political Science Review, 25 (3), 281–296.

    Article  Google Scholar 

  • Blackwell, Christopher W. (2003) Athenian Democracy: A Brief Overview, http://www.stoa.org/projects/demos/article_democracy_overview?page=3&greek Encoding=UnicodeC, date accessed 9 January 2012.

    Google Scholar 

  • Blakely, E. J., and M. G. Snyder. (1997) Fortress America (Washington, DC: Brookings Institution).

    Google Scholar 

  • Britsafe Security. (2012) Training, http://www.britsafe.com/Security/training.asp, date accessed 9 January 2012.

    Google Scholar 

  • Brooks, Doug, and Matan Chorey. (2008) ‘Ruthless Humanitarianism: Why Marginalizing Private Peacekeeping Kills People’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 116–130.

    Google Scholar 

  • CACI. (2012) About Us, http://www.caci.com/about/profile.shtml, date accessed 9 January 2012.

    Google Scholar 

  • Caparini, Marina. (2008) ‘Regulating Private Military and Security Companies: The US Approach’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 171–188.

    Google Scholar 

  • Cockayne, James. (2006) Commercial Security in Humanitarian and Post-Conflict Settings: An Exploratory Study (New York: International Peace Academy).

    Google Scholar 

  • CoESS. (2008) Private Security in Europe — CoESS Facts and Figures 2008, http://www.coess.eu/?CategoryID=203, date accessed 9 January 2012.

    Google Scholar 

  • Community Associations Institute. (2009) Industry Data — National Statistics, http://www.caionline.org/info/research/Pages/default.aspx, date accessed 9 March 2009.

    Google Scholar 

  • Congressional Budget Office (CBO). (2008) Contractor’s Support of U.S. Operations in Iraq (Washington, DC, CBO, August), http://www.cbo.gov/publication/41728, date accessed 31 May 2012.

    Google Scholar 

  • Control Risks. (2012a) About US, http://www.control-risks.com/aboutUs/SitePages/Home.aspx, date accessed 9 January 2012.

    Google Scholar 

  • Control Risks. (2012b) What We Do — Business Intelligence & Investigation, http://control-risks.de/default.aspx?page=316, date accessed 9 January 2012.

    Google Scholar 

  • Control Risks. (2012c) NGOs, http://www.controlrisksgroup.co.uk/default.aspx?page=334, date accessed 9 January 2012.

    Google Scholar 

  • Control Risks. (2012d) What We Do — Managing a Crisis, http://control-risks.de/default.aspx?page=307, date accessed 9 January 2012.

    Google Scholar 

  • CSC. (2012) About US, http://www.csc.com/about_us/ds/29505-company_profile, date accessed 9 January 2012.

    Google Scholar 

  • Danhouse Security. (2012) Home, http://www.danhouse.co.uk/home.htm, date accessed 9 January 2012.

    Google Scholar 

  • de Waard, Jaap. (1999) ‘The Private Security Industry in International Perspective’, European Journal on Criminal Policy and Research, 7, 143–174.

    Article  Google Scholar 

  • Department of Defense (DoD). (2010) Defense Acquisitions Regulations System (DFARS), 252.225–7040 (b) (3) (ii), http://farsite.hill.af.mil/reghtml/regs/far2afmcfars/fardfars/dfars/dfars252_220.htm, date accessed 6 January 2012.

    Google Scholar 

  • Dinstein, Yoran. (2004) The Conduct of Hostilities under the Law of International Armed Conflict (Cambridge: Cambridge University Press).

    Book  Google Scholar 

  • Doswald-Beck, Louise. (2007) ‘Private Military Companies under International Humanitarian Law’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 115–138.

    Chapter  Google Scholar 

  • Drews, Imke-Ilse. (2007) ‘Private Military Companies: The New Mercenaries? — An International Law Analysis’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies. Changes, Problems, Pitfalls and Prospects (Wiesbaden: VS Verlag), pp. 331–344.

    Google Scholar 

  • Ebo, Adedeji. (2008) ‘Private Actors and the Governance of Security in West Africa’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 143–158.

    Google Scholar 

  • Edgerton, David. (2006) Warfare State: Britain, 1920–1970 (Cambridge: Cambridge University Press).

    Google Scholar 

  • Elite Protection. (2012) Home, http://www.eliteprotectionltd.co.uk/, date accessed 9 January 2012.

    Google Scholar 

  • Ferguson, James. (2005) ‘Seeing Like an Oil Company: Space, Security, and Global Capital in Neoliberal Africa’, American Anthropologist, 107 (3), 377–382.

    Article  Google Scholar 

  • Financial Times. (2005) ‘London Businesses Told to Upgrade Security’, 14 July.

    Google Scholar 

  • Fitzpatrick, Joan. (2002) ‘Sovereignty, Territoriality, and the Rule of Law’, Hastings International and Comparative Law Review, 25 (3), 303–340.

    Google Scholar 

  • Francis, David J. (1999) ‘Mercenary Intervention in Sierra Leone: Providing National Security or International Exploitation?’ Third World Quarterly, 20 (2), 319–338.

    Article  Google Scholar 

  • Fuchs, Alice E. (2007) ‘Searching for Resources, Offering Security … Private Military Companies in Sierra Leone’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies: Chances, Problems, Pitfalls and Prospects (Wiesbaden: VS Verlag für Sozialwissenschaften), pp. 105–120.

    Chapter  Google Scholar 

  • G4S. (2012) Where We Operate, http://www.g4s.com/uk-security/, date accessed 9 January 2012.

    Google Scholar 

  • Geneva Conventions. (1997) Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), http://www.icrc.org/ihl.nsf/INTRO/470, date accessed 31 May 2012.

    Google Scholar 

  • Gerry Cleaver. (2000) ‘Subcontracting Military Power: The Privatisation of Security in Contemporary Sub-Saharan Africa’, Crime Law and Social Change, 33 (1–2), 131–149.

    Article  Google Scholar 

  • Gillard, Emanuela-Chiara. (2008) ‘Private Military/Security Companies: The Status of Their Staff and Their Obligations under International Humanitarian Law and the Responsibilities of States in Relation to Their Operations’, in Andrew Alexandra, Deane-peter Baker and Marina Caparini (eds) Private Military and Security Companies: Ethics, Policies and Civil-Military Relations (London: Routledge), pp. 159–170.

    Google Scholar 

  • Glasze, Georg. (2005) ‘Some Reflections on the Economic and Political Organisation of Private Neighbourhoods’, Housing Studies, 20 (2), 221–233.

    Article  Google Scholar 

  • Gleditsch, Nils Petter, Peter Wallensteen, Mikael Eriksson, Margareta Sollenberg and Håvard Strand. (2002) ‘Armed Conflict 1946–2001: A New Dataset’, Journal of Peace Research, 39 (5), 615–637.

    Article  Google Scholar 

  • Golden Crown Security. (2012) Protecting Your Premises, http://www.goldencrownsecurity.com/, date accessed 9 January 2012.

    Google Scholar 

  • Government Accountability Office (GAO). (2006) Military Operations: High-Level DOD Action Needed to Address Long-Standing Problems with Management and Oversight of Contractors Supporting Deployed Operations, GAO-07–145 (Washington, DC, December).

    Google Scholar 

  • Government Accountability Office (GAO). (2007) Stabilizing and Rebuilding Iraq: Conditions in Iraq Are Conductive to Fraud, Waste and Abuse, GAO-07–525T (Washington, DC, 23 April).

    Google Scholar 

  • Guardsmark. (2011) ‘World-Renowned Security Publication Warns of Rising Threats from Unexpected Sources’, Press Release, 15 September, http://www.guardsmark.com/press/press_sec.asp?nav=5&subnav=1&content_id=123, date accessed 9 January 2012.

  • Hansard (House of Commons). (2008) ‘Iraq: Peacekeeping Operations’, Written Answers, Vol. 483, Session 2007–8, 26 November 2008, Column 1552W.

    Google Scholar 

  • Henry, Marsha, and Paul Higate. (2009) Insecure Spaces: Peacekeeping in Liberia, Kosovo and Haiti (London: Zed).

    Google Scholar 

  • Hettne, Björn. (2000) ‘The Fate of Citizenship in Post-Westphalia’, Citizenship Studies, 4 (1), 35–46.

    Article  Google Scholar 

  • Hogan, Michael J. (2000) A Cross of Iron: Harry S. Truman and the Origins of the National Security State (Cambridge: Cambridge University Press).

    Google Scholar 

  • Howe, Herbert M. (1998) ‘Private Security Forces and African Stability: The Case of Executive Outcomes’, Journal of Modern African Studies, 36 (2), 307–331.

    Article  Google Scholar 

  • Joh, Elizabeth. (2004) ‘The Paradox of Private Policing’, The Journal of Criminal Law and Criminology, 95 (1), 49–132.

    Article  Google Scholar 

  • Kassebaum, David. (2000) ‘A Question of Facts: The Legal Use of Private Security Firms in Bosnia’, Columbia Journal of Transnational Law, 38 (3), 581–602.

    Google Scholar 

  • Kennedy, David J. (1995) ‘Residential Associations as State Actors: Regulating the Impact of Gated Communities on Nonmembers’, The Yale Law Journal, 105 (3), 761–793.

    Article  Google Scholar 

  • Kingsnorth, Paul. (2008) ‘Cities for Sale’, Guardian, 29 March.

    Google Scholar 

  • Kirby, Andrew. (2008) ‘The Production of Private Space and Its Implications for Urban Social Relations’, Political Geography, 27 (1), 74–95.

    Article  Google Scholar 

  • Krahmann, Elke. (2008) ‘Security: Collective Good or Commodity?’ European Journal of International Relations, 14 (3), 379–404.

    Article  Google Scholar 

  • Krahmann, Elke. (2010) States, Citizens and the Privatization of Security (Cambridge: Cambridge University Press).

    Book  Google Scholar 

  • Krahmann, Elke. (2011) ‘Beck and Beyond: Selling Security in the World Risk Society’, Review of International Studies, 37 (1), 349–372.

    Article  Google Scholar 

  • Krahmann, Elke. (2012) ‘From ‘Mercenaries’ to ‘Private Security Contractors’: The (Re)construction of Armed Security Providers in International Legal Discourses’, Millennium: Journal of International Studies, 40 (2), 339–359.

    Article  Google Scholar 

  • Krasner, Stephen D. (1995/1996) ‘Compromising Westphalia’, International Security, 20 (3), 115–151.

    Article  Google Scholar 

  • L-3 Communications. (2011) L-3 Announces First Quarter 2011 Results, http://www.l-3com.com/press-releases/l-3-announces-first-quarter-2011-results.html, date accessed 9 January 2012.

    Google Scholar 

  • Leander, Anna. (2005) ‘The Power to Construct International Security: On the Significance of Private Military Companies’, Millennium: Journal of International Studies, 33 (3), 803–826.

    Article  Google Scholar 

  • Leander, Anna. (2006) Eroding State Authority? Private Military Companies and the Legitimate Use of Force (Rome: Centro Militare di Studi Strategici).

    Google Scholar 

  • Lehnardt, Chia. (2007) ‘Private Military Companies and State Responsibility’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 139–157.

    Chapter  Google Scholar 

  • Leibfried, Stefan, Kerstin Martens, Peter Mayer and Achim Hurrelmann (eds) (2008) Transforming the Golden-Age Nation State (London: Palgrave).

    Google Scholar 

  • Loader, Ian. (1999) ‘Consumer Culture and the Commodification of Policing and Security’, Sociology, 33 (2), 373–392.

    Article  Google Scholar 

  • Loader, Ian, and Neil Walker. (2001) ‘Policing as a Public Good: Reconstituting the Connections between Policing and the State’, Theoretical Criminology, 5 (1), 9–35.

    Article  Google Scholar 

  • MacAskill, Ewen, and Michael White. (2003) ‘Blair to Defy Anti-War Protests’, Guardian, 17 February.

    Google Scholar 

  • McDonald, Matt. (2002) ‘Human Security and the Construction of Security’, Global Society, 16 (3), 277–295.

    Article  Google Scholar 

  • McIntyre, Angela, and Taya Weiss. (2007) ‘Weak Governments in Search of Strength: Africa’s Experience of Mercenaries and Private Military Companies’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 67–81.

    Chapter  Google Scholar 

  • Meron, Theodor. (2006) The Humanization of International Law (Leiden: Martinus Nijhoff).

    Google Scholar 

  • Monahan, Torin. (2006) ‘Electronic Fortification in Phoenix: Surveillance Technologies and Social Regulation in Residential Communities’, Urban Affairs Review, 42 (2), 169–192.

    Article  Google Scholar 

  • Montreux Document on Private Military and Security Companies (2008) http://www.eda.admin.ch/psc, date accessed 9 January 2012.

  • Mythen, Gabe, and Sandra Walklate. (2006) ‘Communicating the Terrorist Risk: Harnessing a Culture of Fear?’ Crime, Media, Culture, 2 (2), 123–142.

    Article  Google Scholar 

  • NATO. (1949) North Atlantic Treaty, http://www.nato.int/cps/en/natolive/official_texts_17120.htm, date accessed 9 January 2012.

    Google Scholar 

  • Octaga Security Services. (2012) Training, http://www.octaga.co.uk/training/, date accessed 9 January 2012.

    Google Scholar 

  • O’Donnell, Guillermo. (2004) ‘Why the Rule of Law Matters’, Journal of Democracy, 15 (4), 32–46.

    Article  Google Scholar 

  • Olive Group. (2012) About Olive — PDF Fact Sheet, http://www.olivegroup.com/about.htm, date accessed 9 January 2012.

    Google Scholar 

  • O’Malley, Pat. (2006) ‘Criminology and Risk’, in Sandra Waltlake and Gabe Mythen (eds) Beyond the Risk Society (Buckingham: Open University Press), pp. 43–59.

    Google Scholar 

  • Organization of African Unity. (1977) OAU Convention for the Elimination of Mercenarism in Africa, www.africa-union.org/ official_documents/ Treaties_%20Conventions_%20Protocols/ Convention_on_Mercenaries.pdf, accessed 31 May 2012.

    Google Scholar 

  • Paris, Roland. (2001) ‘Human Security: Paradigm Shift or Hot Air?’ International Security, 26 (2), 87–102.

    Article  Google Scholar 

  • Percy, Sarah. (2007) Mercenaries: The History of a Norm in International Relations (Oxford: Oxford University Press).

    Book  Google Scholar 

  • Priest, Dana, and Mary P. Flaherty. (2004) ‘Slain Contractors Were in Iraq Working Security Detail’, Washington Post, 2 April.

    Google Scholar 

  • The Risk Advisory Group. (2012) About Us, http://www.riskadvisory.net/about-us, date accessed 9 January 2012.

    Google Scholar 

  • Robertson, David. (2008) ‘Blackwater: US Security Firm in Iraq Shooting Claim Looks for Peace Work’, Times, 19 March.

    Google Scholar 

  • Sassoli, Marco. (2005) ‘Legislation and Maintenance of Public Order and Civil Life by Occupying Powers’, The European Journal of International Law, 16 (4), 661–694.

    Article  Google Scholar 

  • Securitas. (2012) About Securitas, http://www.securitas.com/en/, date accessed 9 January 2012.

    Google Scholar 

  • Shearing, Clifford D., and Philipp C. Stenning. (1983) ‘Private Security: Implications for Social Control’, Social Problems, 30 (5), 493–506.

    Article  Google Scholar 

  • Singer, Peter W. (2003) Corporate Warriors: The Rise of the Privatized Military Industry (Ithaca, NY: Cornell).

    Google Scholar 

  • Spearin, Christopher. (2001) ‘Private Security Companies and Humanitarians: A Corporate Solution to Securing Humanitarian Spaces’, International Peacekeeping, 8 (1), 20–43.

    Article  Google Scholar 

  • Spearin, Christopher. (2008) ‘Private, Armed and Humanitarian? States, NGOs, International Private Security Companies and Shifting Humanitarianism’, Security Dialogue, 39 (4), 363–382.

    Article  Google Scholar 

  • Stenning, Philip C. (2000) ‘Powers and Accountability of Private Police’, European Journal on Criminal Policy and Research, 8 (3), 325–352.

    Article  Google Scholar 

  • Thomson, Janice E. (1994) Mercenaries, Pirates and Sovereigns (Princeton: Princeton University Press).

    Google Scholar 

  • United Nations. (1945) Charter of the United Nations, http://www.un.org/en/documents/charter/, date accessed 9 January 2012.

    Google Scholar 

  • United Nations. (1989) International Convention against the Recruitment, Use, Financing and Training of Mercenaries, http://daccess-ods.un.org/TMP/9784389.13822174.html, date accessed 31 May 2012.

    Google Scholar 

  • United States Bureau of Labor Statistics. (2008) Occupational Outlook Handbook 2008–09, http://www.bls.gov/oco/ocos160.htm, date accessed 10 April 2009.

    Google Scholar 

  • US Census Bureau. (2008) American Housing Survey for the United States 2007 (Washington, DC: US Government Printing Office).

    Google Scholar 

  • Washington Times. (2006) ‘Private Firms Eye Darfur’, 2 October.

    Google Scholar 

  • Weber, Max. (1994) Political Writings (Cambridge: Cambridge University Press).

    Google Scholar 

  • Webster, Chris, Georg Glasze and Klaus Frantzv (2002) ‘The Global Spread of Gated Communities’, Environment and Planning B: Planning and Design, 29 (3), 315–320.

    Article  Google Scholar 

  • Weigelt, Katja, and Frank Märker. (2007) ‘Who Is Responsible? The Use of PMCs in Armed Conflict and International Law’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies. Chances, Problems, Pitfalls and Prospects (Wiesbaden: Verlag für Sozialwissenschaften), 377–393.

    Google Scholar 

  • Wilson-Doenges, Georjeanna. (2000) ‘An Exploration of Sense of Community and Fear of Crime in Gated Communities’, Environment and Behavior, 32 (5), 597–611.

    Article  Google Scholar 

  • Wulf, Herbert. (2008) ‘Privatization of Security, International Interventions and the Democratic Control of Armed Forces’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-Military Relations (London: Routledge), pp. 199–200.

    Google Scholar 

  • Zacher, Mark W. (2001) ‘The Territorial Integrity Norm: International Boundaries and the Use of Force’, International Organization, 55 (2), 215–250.

    Article  Google Scholar 

  • Zarate, Juan Carlos (1998) ‘The Emergence of a New Dog of War: Private International Security Companies, International Law and the New World Disorder’, Stanford Journal of International Law, 34 (1), 75–162.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2012 Elke Krahmann

About this chapter

Cite this chapter

Krahmann, E. (2012). Private Military and Security Companies, Territoriality and the Transformation of Western Security Governance. In: Guzzini, S., Neumann, I.B. (eds) The Diffusion of Power in Global Governance. Palgrave Studies in International Relations. Palgrave Macmillan, London. https://doi.org/10.1057/9781137283559_2

Download citation

Publish with us

Policies and ethics