Abstract
The absence of political security as a key concept in social science encyclopaedias makes a (re)conceptualization of the term not easy. 2 Although the concept is widely used in the rhetoric of decision-makers or in compilations of a variety of subjects on security problems, political security is not an unequivocal label.3
For a wide range of issues and country reviews, from international border disputes and arms control to drug trafficking; see: Carpenter and Wiencek (1996).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
The author uses the classical assertion that“security, in an objective sense, measures the absence of threats to acquired values, in a subjective sense, the absence of fear that such values will be attacked,” by Wolfers (1962a): 150. Buzan and Kelstrup (1991: 4) pose that political security “concerns the organizational stability of states systems of government and the ideologies that give them legitimacy.” Although this definition is an important and rich component of the conceptualization of human security, due to the ambiguity of terms it lacks rigor for academic reproduction of the concept thereafter. For an excellent review of the concept of security (and all the adjectives needed to establish context), see Möller, Björn (2000): The Concept of Security: The Pros and Cons of Expansion and Contraction (Copenhagen: Copenhagen Peace Research Institute), at: <http://www.ciaonet.org/wps/mob01/#note0>. In his professional experience, the author consults literature in Portuguese and Spanish. In both languages, reflecting the Ibero-American political culture and discourse, the verbatim translation does not correspond to the concept.
The seven categories of human security are: economic, food, health, environment, personal, community, and political, see:UNDP (1994: 22–40).
On the position of the U.S. Government, see: U.S. Department of State, Bureau of Political-Military Affairs: Fact Sheet, Washington, DC, 30 July 2003; at: <http://www.state.gov/t/pm/rls/fs/23428.htm>.
On the controversies and legal fragility, see: Spencer Ackerman: “Suspect Policy”, in: New Republican (14 March 2005), 232,9: 14; David Ignatius: “Rendition Realities”, in: The Washington Post (9 March 2005): A21.
Daniel Byman: “Reject the Abuses, Retain the Tactics”, in: The Washington Post (17 April 2005): Boi. at: <http:// www.washingt0np0st.com/wp-dyn/articles/A58301-2005 Apr16_2.html>.
For a survey of failure issues, normative propositions, and efforts to rescue countries, see: Bilgin/ Morton (2002: 55–80); Fukuyama (2004: 17–32); Mallaby (2004); Thomas (2003a: 205–32); Zeleza/McConnaughay (2004); Rotberg (2002:127).
“Ungoverned space” is a term initially used by the United States Government, see the statement by Secretary of Defense Donald Rumsfeld at the Defense Ministerial in Santiago, 19 November 2002 (at: <http:// ciponline.org/ colombia/02111904.htm>). It is defined as “geographic areas where governments do not exercise effective control.” Its important is to reveal that “Terrorist groups and narco-traffickers use these areas as sanctuaries to train, plan, and organize, relatively free from interference. There are numerous ‘ungoverned spaces’ around the world, such as the western provinces of Pakistan, portions of the southern Philippines, Indonesia, Chechnya, rural areas of Burma, several areas in Africa, and areas in South America. Ungoverned spaces include densely populated cities where terrorists can congregate and prepare for operations with relative impunity. I believe these areas will play an increasingly important role in the War on Terrorism as A1-Qaeda, its associated groups and other terrorist organizations use these areas as bases for operations.” Citations from: Current and Projected National Security Threats to the United States, Vice Admiral Lowell E. Jacoby, U.S. Navy, Director, Defense Intelligence Agency, Statement for the Record, U.S. Senate Select Committee on Intelligence, 24 February 2004 (at: <http://www.iwar. org.uk/homesec/resources/threats-2004/jacoby.htm>).
See:Brian Fonseca and Dennis Fisher: “Data Theft Reveals Storage Flaws”, in: eWeek, 22,10 (7 March 2005): 12; Frank Hayes: “Speaking, Frankly”, in: Computerworld, 29,12 (21 March 2005): 58; Mark Maremont, “New Privacy Leak: Some Mutual Funds Reveal Client’s Data”, in: Wall Street Journal — Eastern Edition, 245,57 (23 March 2005): A1.
“Your DNA in Their Hands”, in: New Scientist, 186, 2494 (9 April 2005): 3.
Anne Sandra: “Watch Out for Spies with Friendly Faces”, in: PC World, 23,4 (Apr 2005): 39. In terms of biometrics, automatic identification can even reach the point of having transponders implanted in individuals, see: Katina Michael and M.G. Michael: “Microchipping People”, in: Quadrant, 49,3 (Mar 2005): 22.
Laurie Sullivan: “Europe Tries on RFID”, in: Information Week, 1029 (7 March 2005): 36; Eric Chabrow: “Homeland Security to Test RFID at Borders”, in: Information Week, 1024 (31 January 2005): 26. For the signs of consumer concern with this technology, see “Things to Ponder”, in: Computerworld, 39,6 (7 February 2005): 36.
Johann Cas: “Privacy in the Pervasive Computing Environment — A Contradiction in Terms?”, in: IEEE Technology & Society Magazine, 24,1 (Spring2005): 24.
See:Jennifer Burek Pierce: “The Scoop on Patron Privacy ”, in: American Libraries, 36,2 (February 2005): 30.
On privacy issues, see: Peter H. Lewis: “Kiss Privacy Goodbye”, in: Fortune, 151,1 (10 January 2005): 55.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Guedes da Costa, T. (2008). Political Security, an Uncertain Concept with Expanding Concerns. In: Brauch, H.G., et al. Globalization and Environmental Challenges. Hexagon Series on Human and Environmental Security and Peace, vol 3. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75977-5_42
Download citation
DOI: https://doi.org/10.1007/978-3-540-75977-5_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75976-8
Online ISBN: 978-3-540-75977-5
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)