Abstract
The field of security governance holds a special place within the context of the debate over the diffusion of power from state to non-state actors, from national to international authorities and from governments to markets in Western democracies. Not only has the provision of the ‘public good’ security been considered one of the main functions of government, but also it has played a major role in justifying the centralization of power and authority within and by the nation-state (Leander, 2006; Krahmann, 2010). The contemporary proliferation of private military and security companies, that is, companies that sell armed and non-armed security services to public and private customers, poses a particular challenge to state-centric notions of national and global governance. Of course, commercial security providers are not new. Businesses have always played a role in national and international security, whether as mercenaries, armaments producers or logistics suppliers in major conflicts. The increasingly global scale of the private military and security industry, its functional expansion into areas previously considered to be ‘inherently governmental’ as well as their growing use by private individuals and business customers, however, suggest a significant transformation in security governance since the ‘golden age’ of the Western nation-state in the mid-twentieth century (Leibfried et al., 2008; also Hogan, 2000; Edgerton, 2006). Notably, 80 per cent of their customers are individuals and corporations, suggesting significant private power over the provision of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abrahamsen, Rita, and Michael C. Williams. (2007) The Globalization of Private Security — Country Report: Nigeria, Report, University of Aberystwyth, http://users.aber.ac.uk/rbh/privatesecurity/country%20report-nigeria.pdf, date accessed 31 May 2012.
Adler, Emmanuel, and Michael Barnett. (1998) ‘A Framework for the Study of Security Communities’, in Emmanuel Adler and Michael Barnett (eds) Security Communities (Cambridge: Cambridge University Press), pp. 29–66.
Aegis. (2011) United Nations Global Compact — Communications in Progress (London: Aegis, March), http://www.aegisworld.com/uploads/UNGC%20COP%200411.pdf, date accessed 9 January 2012.
Allander Security. (2012) Home, http://www.allandersecurity.com/securitysolutions.html, date accessed 9 January 2012.
Andreas, Peter, and Richard Price. (2001) ‘From War Fighting to Crime Fighting: Transforming the American National Security State’, International Studies Review, 3 (3), 31–52.
Aning, E. K. (2001) ‘Whither Africa’s Security in the New Millennium: State- or Mercenary-Induced Stability?’ Global Society, 15 (2), 149–171.
Atkinson, Rowland, and John Flint. (2004) ‘Fortress UK? Gated Communities, the Spatial Revolt of the Elites and Time-Space Trajectories of Segregation’, Housing Studies, 19 (6), 875–892.
Atkinson, Rowland, and Sarah Blandy. (2005) ‘Introduction: International Perspectives on the New Enclavism and the Rise of Gated Communities’, Housing Studies, 20 (2), 177–186.
Avant, Deborah D. (2000) ‘Privatizing Military Training’, Foreign Policy in Focus, 5 (17), 1–2.
Avant, Deborah D. (2005) The Market for Force: The Consequences of Privatizing Security (Cambridge: Cambridge University Press).
Avant, Deborah D., and Lee Sigelman. (2010) ‘Private Security and Democracy: Lessons from the US in Iraq’, Security Studies, 19 (2), 230–265.
Benz, Arthur, and Yannis Papadopoulos. (2006) ‘Introduction — Governance and Democracy; Concepts and Key Issues’, in Arthur Benz and Yannis Papadopoulos (eds) Governance and Democracy: Comparing National, European and International Experiences (London: Routledge), pp. 1–26.
Bislev, Sven. (2004) ‘Globalization, State Transformation, and Public Security’, International Political Science Review, 25 (3), 281–296.
Blackwell, Christopher W. (2003) Athenian Democracy: A Brief Overview, http://www.stoa.org/projects/demos/article_democracy_overview?page=3&greek Encoding=UnicodeC, date accessed 9 January 2012.
Blakely, E. J., and M. G. Snyder. (1997) Fortress America (Washington, DC: Brookings Institution).
Britsafe Security. (2012) Training, http://www.britsafe.com/Security/training.asp, date accessed 9 January 2012.
Brooks, Doug, and Matan Chorey. (2008) ‘Ruthless Humanitarianism: Why Marginalizing Private Peacekeeping Kills People’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 116–130.
CACI. (2012) About Us, http://www.caci.com/about/profile.shtml, date accessed 9 January 2012.
Caparini, Marina. (2008) ‘Regulating Private Military and Security Companies: The US Approach’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 171–188.
Cockayne, James. (2006) Commercial Security in Humanitarian and Post-Conflict Settings: An Exploratory Study (New York: International Peace Academy).
CoESS. (2008) Private Security in Europe — CoESS Facts and Figures 2008, http://www.coess.eu/?CategoryID=203, date accessed 9 January 2012.
Community Associations Institute. (2009) Industry Data — National Statistics, http://www.caionline.org/info/research/Pages/default.aspx, date accessed 9 March 2009.
Congressional Budget Office (CBO). (2008) Contractor’s Support of U.S. Operations in Iraq (Washington, DC, CBO, August), http://www.cbo.gov/publication/41728, date accessed 31 May 2012.
Control Risks. (2012a) About US, http://www.control-risks.com/aboutUs/SitePages/Home.aspx, date accessed 9 January 2012.
Control Risks. (2012b) What We Do — Business Intelligence & Investigation, http://control-risks.de/default.aspx?page=316, date accessed 9 January 2012.
Control Risks. (2012c) NGOs, http://www.controlrisksgroup.co.uk/default.aspx?page=334, date accessed 9 January 2012.
Control Risks. (2012d) What We Do — Managing a Crisis, http://control-risks.de/default.aspx?page=307, date accessed 9 January 2012.
CSC. (2012) About US, http://www.csc.com/about_us/ds/29505-company_profile, date accessed 9 January 2012.
Danhouse Security. (2012) Home, http://www.danhouse.co.uk/home.htm, date accessed 9 January 2012.
de Waard, Jaap. (1999) ‘The Private Security Industry in International Perspective’, European Journal on Criminal Policy and Research, 7, 143–174.
Department of Defense (DoD). (2010) Defense Acquisitions Regulations System (DFARS), 252.225–7040 (b) (3) (ii), http://farsite.hill.af.mil/reghtml/regs/far2afmcfars/fardfars/dfars/dfars252_220.htm, date accessed 6 January 2012.
Dinstein, Yoran. (2004) The Conduct of Hostilities under the Law of International Armed Conflict (Cambridge: Cambridge University Press).
Doswald-Beck, Louise. (2007) ‘Private Military Companies under International Humanitarian Law’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 115–138.
Drews, Imke-Ilse. (2007) ‘Private Military Companies: The New Mercenaries? — An International Law Analysis’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies. Changes, Problems, Pitfalls and Prospects (Wiesbaden: VS Verlag), pp. 331–344.
Ebo, Adedeji. (2008) ‘Private Actors and the Governance of Security in West Africa’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-military Relations (London: Routledge), pp. 143–158.
Edgerton, David. (2006) Warfare State: Britain, 1920–1970 (Cambridge: Cambridge University Press).
Elite Protection. (2012) Home, http://www.eliteprotectionltd.co.uk/, date accessed 9 January 2012.
Ferguson, James. (2005) ‘Seeing Like an Oil Company: Space, Security, and Global Capital in Neoliberal Africa’, American Anthropologist, 107 (3), 377–382.
Financial Times. (2005) ‘London Businesses Told to Upgrade Security’, 14 July.
Fitzpatrick, Joan. (2002) ‘Sovereignty, Territoriality, and the Rule of Law’, Hastings International and Comparative Law Review, 25 (3), 303–340.
Francis, David J. (1999) ‘Mercenary Intervention in Sierra Leone: Providing National Security or International Exploitation?’ Third World Quarterly, 20 (2), 319–338.
Fuchs, Alice E. (2007) ‘Searching for Resources, Offering Security … Private Military Companies in Sierra Leone’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies: Chances, Problems, Pitfalls and Prospects (Wiesbaden: VS Verlag für Sozialwissenschaften), pp. 105–120.
G4S. (2012) Where We Operate, http://www.g4s.com/uk-security/, date accessed 9 January 2012.
Geneva Conventions. (1997) Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (Protocol I), http://www.icrc.org/ihl.nsf/INTRO/470, date accessed 31 May 2012.
Gerry Cleaver. (2000) ‘Subcontracting Military Power: The Privatisation of Security in Contemporary Sub-Saharan Africa’, Crime Law and Social Change, 33 (1–2), 131–149.
Gillard, Emanuela-Chiara. (2008) ‘Private Military/Security Companies: The Status of Their Staff and Their Obligations under International Humanitarian Law and the Responsibilities of States in Relation to Their Operations’, in Andrew Alexandra, Deane-peter Baker and Marina Caparini (eds) Private Military and Security Companies: Ethics, Policies and Civil-Military Relations (London: Routledge), pp. 159–170.
Glasze, Georg. (2005) ‘Some Reflections on the Economic and Political Organisation of Private Neighbourhoods’, Housing Studies, 20 (2), 221–233.
Gleditsch, Nils Petter, Peter Wallensteen, Mikael Eriksson, Margareta Sollenberg and Håvard Strand. (2002) ‘Armed Conflict 1946–2001: A New Dataset’, Journal of Peace Research, 39 (5), 615–637.
Golden Crown Security. (2012) Protecting Your Premises, http://www.goldencrownsecurity.com/, date accessed 9 January 2012.
Government Accountability Office (GAO). (2006) Military Operations: High-Level DOD Action Needed to Address Long-Standing Problems with Management and Oversight of Contractors Supporting Deployed Operations, GAO-07–145 (Washington, DC, December).
Government Accountability Office (GAO). (2007) Stabilizing and Rebuilding Iraq: Conditions in Iraq Are Conductive to Fraud, Waste and Abuse, GAO-07–525T (Washington, DC, 23 April).
Guardsmark. (2011) ‘World-Renowned Security Publication Warns of Rising Threats from Unexpected Sources’, Press Release, 15 September, http://www.guardsmark.com/press/press_sec.asp?nav=5&subnav=1&content_id=123, date accessed 9 January 2012.
Hansard (House of Commons). (2008) ‘Iraq: Peacekeeping Operations’, Written Answers, Vol. 483, Session 2007–8, 26 November 2008, Column 1552W.
Henry, Marsha, and Paul Higate. (2009) Insecure Spaces: Peacekeeping in Liberia, Kosovo and Haiti (London: Zed).
Hettne, Björn. (2000) ‘The Fate of Citizenship in Post-Westphalia’, Citizenship Studies, 4 (1), 35–46.
Hogan, Michael J. (2000) A Cross of Iron: Harry S. Truman and the Origins of the National Security State (Cambridge: Cambridge University Press).
Howe, Herbert M. (1998) ‘Private Security Forces and African Stability: The Case of Executive Outcomes’, Journal of Modern African Studies, 36 (2), 307–331.
Joh, Elizabeth. (2004) ‘The Paradox of Private Policing’, The Journal of Criminal Law and Criminology, 95 (1), 49–132.
Kassebaum, David. (2000) ‘A Question of Facts: The Legal Use of Private Security Firms in Bosnia’, Columbia Journal of Transnational Law, 38 (3), 581–602.
Kennedy, David J. (1995) ‘Residential Associations as State Actors: Regulating the Impact of Gated Communities on Nonmembers’, The Yale Law Journal, 105 (3), 761–793.
Kingsnorth, Paul. (2008) ‘Cities for Sale’, Guardian, 29 March.
Kirby, Andrew. (2008) ‘The Production of Private Space and Its Implications for Urban Social Relations’, Political Geography, 27 (1), 74–95.
Krahmann, Elke. (2008) ‘Security: Collective Good or Commodity?’ European Journal of International Relations, 14 (3), 379–404.
Krahmann, Elke. (2010) States, Citizens and the Privatization of Security (Cambridge: Cambridge University Press).
Krahmann, Elke. (2011) ‘Beck and Beyond: Selling Security in the World Risk Society’, Review of International Studies, 37 (1), 349–372.
Krahmann, Elke. (2012) ‘From ‘Mercenaries’ to ‘Private Security Contractors’: The (Re)construction of Armed Security Providers in International Legal Discourses’, Millennium: Journal of International Studies, 40 (2), 339–359.
Krasner, Stephen D. (1995/1996) ‘Compromising Westphalia’, International Security, 20 (3), 115–151.
L-3 Communications. (2011) L-3 Announces First Quarter 2011 Results, http://www.l-3com.com/press-releases/l-3-announces-first-quarter-2011-results.html, date accessed 9 January 2012.
Leander, Anna. (2005) ‘The Power to Construct International Security: On the Significance of Private Military Companies’, Millennium: Journal of International Studies, 33 (3), 803–826.
Leander, Anna. (2006) Eroding State Authority? Private Military Companies and the Legitimate Use of Force (Rome: Centro Militare di Studi Strategici).
Lehnardt, Chia. (2007) ‘Private Military Companies and State Responsibility’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 139–157.
Leibfried, Stefan, Kerstin Martens, Peter Mayer and Achim Hurrelmann (eds) (2008) Transforming the Golden-Age Nation State (London: Palgrave).
Loader, Ian. (1999) ‘Consumer Culture and the Commodification of Policing and Security’, Sociology, 33 (2), 373–392.
Loader, Ian, and Neil Walker. (2001) ‘Policing as a Public Good: Reconstituting the Connections between Policing and the State’, Theoretical Criminology, 5 (1), 9–35.
MacAskill, Ewen, and Michael White. (2003) ‘Blair to Defy Anti-War Protests’, Guardian, 17 February.
McDonald, Matt. (2002) ‘Human Security and the Construction of Security’, Global Society, 16 (3), 277–295.
McIntyre, Angela, and Taya Weiss. (2007) ‘Weak Governments in Search of Strength: Africa’s Experience of Mercenaries and Private Military Companies’, in Simon Chesterman and Chia Lehnardt (eds) From Mercenaries to Market: The Rise and Regulation of Private Military Companies (Oxford: Oxford University Press), pp. 67–81.
Meron, Theodor. (2006) The Humanization of International Law (Leiden: Martinus Nijhoff).
Monahan, Torin. (2006) ‘Electronic Fortification in Phoenix: Surveillance Technologies and Social Regulation in Residential Communities’, Urban Affairs Review, 42 (2), 169–192.
Montreux Document on Private Military and Security Companies (2008) http://www.eda.admin.ch/psc, date accessed 9 January 2012.
Mythen, Gabe, and Sandra Walklate. (2006) ‘Communicating the Terrorist Risk: Harnessing a Culture of Fear?’ Crime, Media, Culture, 2 (2), 123–142.
NATO. (1949) North Atlantic Treaty, http://www.nato.int/cps/en/natolive/official_texts_17120.htm, date accessed 9 January 2012.
Octaga Security Services. (2012) Training, http://www.octaga.co.uk/training/, date accessed 9 January 2012.
O’Donnell, Guillermo. (2004) ‘Why the Rule of Law Matters’, Journal of Democracy, 15 (4), 32–46.
Olive Group. (2012) About Olive — PDF Fact Sheet, http://www.olivegroup.com/about.htm, date accessed 9 January 2012.
O’Malley, Pat. (2006) ‘Criminology and Risk’, in Sandra Waltlake and Gabe Mythen (eds) Beyond the Risk Society (Buckingham: Open University Press), pp. 43–59.
Organization of African Unity. (1977) OAU Convention for the Elimination of Mercenarism in Africa, www.africa-union.org/ official_documents/ Treaties_%20Conventions_%20Protocols/ Convention_on_Mercenaries.pdf, accessed 31 May 2012.
Paris, Roland. (2001) ‘Human Security: Paradigm Shift or Hot Air?’ International Security, 26 (2), 87–102.
Percy, Sarah. (2007) Mercenaries: The History of a Norm in International Relations (Oxford: Oxford University Press).
Priest, Dana, and Mary P. Flaherty. (2004) ‘Slain Contractors Were in Iraq Working Security Detail’, Washington Post, 2 April.
The Risk Advisory Group. (2012) About Us, http://www.riskadvisory.net/about-us, date accessed 9 January 2012.
Robertson, David. (2008) ‘Blackwater: US Security Firm in Iraq Shooting Claim Looks for Peace Work’, Times, 19 March.
Sassoli, Marco. (2005) ‘Legislation and Maintenance of Public Order and Civil Life by Occupying Powers’, The European Journal of International Law, 16 (4), 661–694.
Securitas. (2012) About Securitas, http://www.securitas.com/en/, date accessed 9 January 2012.
Shearing, Clifford D., and Philipp C. Stenning. (1983) ‘Private Security: Implications for Social Control’, Social Problems, 30 (5), 493–506.
Singer, Peter W. (2003) Corporate Warriors: The Rise of the Privatized Military Industry (Ithaca, NY: Cornell).
Spearin, Christopher. (2001) ‘Private Security Companies and Humanitarians: A Corporate Solution to Securing Humanitarian Spaces’, International Peacekeeping, 8 (1), 20–43.
Spearin, Christopher. (2008) ‘Private, Armed and Humanitarian? States, NGOs, International Private Security Companies and Shifting Humanitarianism’, Security Dialogue, 39 (4), 363–382.
Stenning, Philip C. (2000) ‘Powers and Accountability of Private Police’, European Journal on Criminal Policy and Research, 8 (3), 325–352.
Thomson, Janice E. (1994) Mercenaries, Pirates and Sovereigns (Princeton: Princeton University Press).
United Nations. (1945) Charter of the United Nations, http://www.un.org/en/documents/charter/, date accessed 9 January 2012.
United Nations. (1989) International Convention against the Recruitment, Use, Financing and Training of Mercenaries, http://daccess-ods.un.org/TMP/9784389.13822174.html, date accessed 31 May 2012.
United States Bureau of Labor Statistics. (2008) Occupational Outlook Handbook 2008–09, http://www.bls.gov/oco/ocos160.htm, date accessed 10 April 2009.
US Census Bureau. (2008) American Housing Survey for the United States 2007 (Washington, DC: US Government Printing Office).
Washington Times. (2006) ‘Private Firms Eye Darfur’, 2 October.
Weber, Max. (1994) Political Writings (Cambridge: Cambridge University Press).
Webster, Chris, Georg Glasze and Klaus Frantzv (2002) ‘The Global Spread of Gated Communities’, Environment and Planning B: Planning and Design, 29 (3), 315–320.
Weigelt, Katja, and Frank Märker. (2007) ‘Who Is Responsible? The Use of PMCs in Armed Conflict and International Law’, in Thomas Jäger and Gerhard Kümmel (eds) Private Military and Security Companies. Chances, Problems, Pitfalls and Prospects (Wiesbaden: Verlag für Sozialwissenschaften), 377–393.
Wilson-Doenges, Georjeanna. (2000) ‘An Exploration of Sense of Community and Fear of Crime in Gated Communities’, Environment and Behavior, 32 (5), 597–611.
Wulf, Herbert. (2008) ‘Privatization of Security, International Interventions and the Democratic Control of Armed Forces’, in Andrew Alexandra, Deane-Peter Baker, and Marina Caparini (eds) Private Military and Security Companies: Ethics, Politics and Civil-Military Relations (London: Routledge), pp. 199–200.
Zacher, Mark W. (2001) ‘The Territorial Integrity Norm: International Boundaries and the Use of Force’, International Organization, 55 (2), 215–250.
Zarate, Juan Carlos (1998) ‘The Emergence of a New Dog of War: Private International Security Companies, International Law and the New World Disorder’, Stanford Journal of International Law, 34 (1), 75–162.
Editor information
Editors and Affiliations
Copyright information
© 2012 Elke Krahmann
About this chapter
Cite this chapter
Krahmann, E. (2012). Private Military and Security Companies, Territoriality and the Transformation of Western Security Governance. In: Guzzini, S., Neumann, I.B. (eds) The Diffusion of Power in Global Governance. Palgrave Studies in International Relations. Palgrave Macmillan, London. https://doi.org/10.1057/9781137283559_2
Download citation
DOI: https://doi.org/10.1057/9781137283559_2
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-33780-4
Online ISBN: 978-1-137-28355-9
eBook Packages: Palgrave Political & Intern. Studies CollectionPolitical Science and International Studies (R0)