Geopolitics

The Drift from Security State to Human Security: Contextualizing the Rise of ISIS
Star Rating Loader Please wait...
Issue Net Edition | Date : 21 Jan , 2016

CONCLUSION

The rise of ISIS has led to massive human rights abuse, religious and ethnic fragmentation which in spite of being threats cannot be understood by the prevailing understanding of state and human security. It is quite essential to understand the rise of ISIS by taking certain other concepts in mind, like the human intervention, functional militarism, sectarian fragmentation and entrenched state security. Meanwhile, ISIS has started questioning out political foundations by few concrete steps.

The challenges to state security by ISIS start with the very fact that it is not merely a military threat and in case it is, then it’s time to question that who it poses the maximum threat against.

Firstly, it straight away rejects the notion of state by giving precedence to a ‘Caliphate,’ that is governed by the Sharia law. It is still open to question if the construction of a ‘Caliphate’ which had always been a long time goal of organizations like Al-Qaeda, can function and its political, social and economic impact on its citizens. In addition, the religious fanaticism and military expertise of ISIS is different than that of Al-Qaeda and other organizations, making it difficult to rationalize their origin and its impact on the West Asian political system, especially focusing on Iraq and Syria. The retrenchment and establishment of the state-system has witnessed a counter-revolution during the Arab Uprisings and thus, demands a more competent evaluation. The traditional boundaries between states and human security as well as the functional areas of culture, economy and polity need to be redrawn.

The challenges to state security by ISIS start with the very fact that it is not merely a military threat and in case it is, then it’s time to question that who it poses the maximum threat against. The multiple layers and meanings of threat, security and state need to be interrogated. We cannot continue to use political concepts, ambiguous in their detailing and rendering different meanings for different niches. The ameliorative and benign discourses of state in the ‘responsibility to protect’ with concepts such as security state and human security need to understood again.

Sectarianism, ethnic fragmentation, violence and human rights abuse have been a part of the Arab World and they became even more prominent during the emergence of Arab Uprisings. But we need to question the meaning of words like ‘war’, ‘strategy’ and ‘weapon’ and ‘counter-revolution’ in the context of ISIS and its impact on human security. It needs to be remembered that human security, stands to be a people-centric approach and a very large part of its functioning also deals with the domestic politics. The definitional boundaries need to be clearly understood and marked, so that no scope of ambiguity is retained. This basic analysis then leads us to question the causation of existing circumstances, like the rise of ISIS and its future impact on human security. The challenges to concept of human security, especially with the emergence of ISIS deal with all its aspects personal, economic, environmental, and political, food, health and security. In all these parameters, the role and impact of ISIS demands to redraw the understanding of these very concepts and especially re-define who is going to witness the impact in the longer run.

REFERNCES


[1] Helga Haftendorn, 1991, The Security Puzzle: Theory-Building and Discipline-Building in International Security, International Studies Quarterly, Vol. 35, No. 1, 3-17

[2] Alastair Buchan, 1966, War in Modern Society, London: Collins, 66

[3] M.V.Naidu, 2002, Security, Sovereignty and Intervention: Concepts and Case Studies, Peace Research, Vol. 34, No. 1, 33-58

[4] United Nations, 2004, A More Secure World: Our Shared Responsibility, Report of the Secretary General’s High Level Panel on Threats, Challenges and Changes, presented at the UN General Assembly

[5] Baldwin, D., 1997, The Concept of Security, in Review of International Studies, No. 23, 5-26.

[6] Robin Luckham, 2007, The Discordant Voices of ‘Security’, Development in Practice, Vol. 17, No. 4/5, 682-690

[7] Pinar Bilgin, 2003, Individual and Societal Dimensions of Security, International Studies Review, Vol. 5, No. 2, 203-222

[8] Davide Fiammenghi, 2011, The Security Curve and the Structure of International Politics: A Neorealist Synthesis, International Security, Vol. 35, No. 4, 126-154

[9] Raimo Vayrynen, 1995, Concepts of Security Revisited, Mershon International Studies Review, Vol. 39, No.2, 259-262

[10] Robin Luckham & Tom Kirk, 2013, The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research. Stability: International Journal of Security & Development, 2(2): 44, pp. 1-30

[11] Barry Buzan, 1991, New Patterns of Global Security in the Twenty-First Century, International Affairs (Royal Institute of International Affairs 1944-), Vol. 67, No. 3 (Jul. , 1991), pp. 431-451

[12] Buzan, B. (1991) People, states and fear: An Agenda for security Analysis in the PostCold War Era. Brighton: Weatsheaf 

[13] 13Barry Buzan, Jaap de Wilde and Ole Waever, 1998, Security: A New Framework for Analysis, London: Lynne Rienner Publishers, 1-239, http://www.uni-erfurt.de/fileadmin/public-docs/Internationale_Beziehungen/BA_Einfuehrung_in_die_IB/BUZAN%20+%20WAEVER+%20WILDE_%201998_Security_CH%201+2.pdf

[14] Marianne Stone, 2009, Security According to Buzan: A Comprehensive Security Analysis, Security Discussion Paper Series 1, http://geest.msh-paris.fr/IMG/pdf/Security_for_Buzan.mp3.pdf

[15] Mantas Pupinus, 2011, Critique of Ken Booth’s “Security and Emancipation”, International Security Studies, 1-5

[16] Ken Booth, 1991, Security and Emancipation, Review of International Studies, Vol. 17, No. 4, pp. 313-326

[17] Hedley Bull, 1977, The Anarchical Society: A Study of Order in World Politics, London, p. 22.

[18] Ken Booth, 1991, Security and Emancipation, Review of International Studies, Vol. 17, No. 4, pp. 313-326

[19] Robert Higgs, 2004, Against Leviathan: Government Power and a Free Society. Oakland, CA: The Independent Institute, 2004. Pp. xv, 408

[20] Oberleitner, Gerd. 2005, Human Security: A Challenge to International Law? Global Governance, Vol. 11, No. 2, pp. 185-203

[21] Human Development Report, 1994, United Nations Development Programme, Oxford University Press, http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdf

[22] Amitav Acharya, 2001, Human Security: East versus West, International Journal, Vol. 56, No. 3, pp. 442-460

[23] Sverre Lodgaard , Human Security, Manual on Human Rights Education with Young People – Council of Europe, 367-371, http://eycb.coe.int/compass/en/pdf/5_10.pdf

[24] Robin Luckham & Tom Kirk, 2013, The Two Faces of Security in Hybrid Political Orders: A Framework for Analysis and Research. Stability: International Journal of Security & Development, 2(2): 44, pp. 1-30

[25] Viviene Taylor, 2004, From State Security to Human Security and Gender Justice, Agenda: Empowering Women for Gender Equity, No. 59, Women in War, 65- 70

[26] Daniel Deudney, 1991, Environment and Security: Muddled Thinking, Bulletin of the Atomic Scientists, Vol. 47, No. 3, p. 23

[27] United Nations Development Programme, Human Development Report, 1994 (New York: Oxford University Press, 1994), p. 22.

[28] Christopher J.L. Murray and Gary King, 2001, Rethinking Human Security, Political Science Quarterly, 116:4, http://gking.harvard.edu/files/hs.pdf

[29] Kanti Bajpai, 2000, Human Security: Concept and Measurement, Kroc Institute Occasional Paper #19:OP:1, http://www.hegoa.ehu.es/dossierra/seguridad/Human_security_concept_and_measurement.pdf

[30] Emily Landau, 2003, International Affairs (Royal Institute of International Affairs 1944-), Vol. 79, No. 5, 1134-1135

[31] Halford L. Hoskins, 1954, The Quest for Security in the Middle East, Annals of the American Academy of Political and Social Science, Vol. 294, America and a New Asia pp. 138-146

[32] Tami Amanda Jacoby and Brent E. Sasley, 2003, Redefining Security in the Middle EastManchester: Manchester University Press, 176

[33] Karen Yourish, 2015, The Fates of 23 ISIS Hostages in Syria, The New York Times, http://www.nytimes.com/interactive/2014/10/24/world/middleeast/the-fate-of-23-hostages-in-syria.html?_r=0

[34] Hassan Chakrani, 2014, ISIS poses a threat to Iraq’s economy, Al-Akhbar English, http://english.al-akhbar.com/node/20362

[35] Ed Crooks and Borzou Daragahi, 2014, ISIS threatens future oil supplies, warns IEA, The Financial Times, http://www.ft.com/cms/s/0/2b6df86e-7559-11e4-a1a9-00144feabdc0.html

[36] Matthew and Mcdoland, 2004, Networks of Threats and Vulnerability: Lessons From Environmental Security Research,36.

[37] Kareen Shahee, 2015, Isis fighters destroy ancient artefacts at Mosul museum, The Guardian, http://www.theguardian.com/world/2015/feb/26/isis-fighters-destroy-ancient-artefacts-mosul-museum-iraq

[38] BBC News, March 2015, Islamic State ‘demolishes’ ancient Hatra site in Iraq, http://www.bbc.com/news/world-middle-east-31779484

[39] Keith Johnson, September 2014, US Strikes ISIS Oil installations, http://foreignpolicy.com/2014/09/24/u-s-strikes-isis-oil-installations/

[40] Grace Gedge, 2004, Consequences of the War on Iraq, A Green Party press office briefing

[41] Eric Pianin, 2003, Environmental Damages a Concern Experts Fear Effects of War on Persian Gulf Region Could Be ‘Irreversible’, http://www.cpeo.org/lists/military/2003/msg00297.html

[42]Charles Lister, 2014, Profiling the Islamic State, Foreign Policy at Brookings, http://www.brookings.edu/~/media/Research/Files/Reports/2014/11/profiling%20islamic%20state%20lister/en_web_lister.pdf

[43] Helen Lock, September 2014, How Isis became the wealthiest terror group in history, The Independent, http://www.independent.co.uk/news/world/middle-east/how-isis-became-the-wealthiest-terror-group-in-history-9732750.html

[44] David Gardner, 2014, Political Threat Posed by ISIS, The Financial Times, https://www.youtube.com/watch?v=W-xLVtNkWBo

[45] Sreejith Kamalanayanan, 2015, News Capsules: ISIS threat for Iraq’s Wheat farmers; Buy Royal Mint Gold bars online, Commodity Online, http://www.commodityonline.com/news/news-capsules-isis-threat-for-iraqs-wheat-farmers;-buy-royal-mint-gold-bars-online-61405-3-61406.html

[46] Mark Mazzetti and Helene Cooper, 2014, U.S. Officials and Experts at Odds on Threat Posed by ISIS, The New York Times, http://www.nytimes.com/2014/08/23/us/politics/us-isnt-sure-just-how-much-to-fear-isis.html

[47] John Schnittker,2014, Water and Wheat: ISIS Weapons?, Iraq Business News, http://www.iraq-businessnews.com/2014/06/15/water-and-wheat-isis-weapons/

[48] Steve Connor, 2014, Middle East wars could put world’s food security at risk, The Independent, http://www.independent.co.uk/environment/nature/middle-east-wars-could-put-worlds-food-security-at-risk-9717399.html

[49]WHO, Ebola Data and Statistics, http://apps.who.int/gho/data/view.ebola-sitrep.ebola-summary-20150306?lang=en

[50]Amanda M. Teckman, 2013, The Bioterrorist Threat of Ebola in East Africa and Implications for Global Health and Security, Global Policy Journal, http://www.globalpolicyjournal.com/articles/health-and-social-policy/bioterrorist-threat-ebola-east-africa-and-implications-global-heal

[51] Bruce Dorminey, 2014, Ebola As ISIS Bio-Weapon? Forbes, http://www.forbes.com/sites/brucedorminey/2014/10/05/ebola-as-isis-bio-weapon/

[52] Ian Black and Fazel Hawramy, 2014, Isis denies ordering that all girls in Mosul undergo FGM, The Guardian, http://www.theguardian.com/world/2014/jul/24/isis-deny-ordering-fgm-girls-mosul

[53] 53Pinar Bilgin, 2004, Whose ‘Middle East’? Geopolitical Inventions and Practices of Security, International Relations, Vol 18(1): 25–41

1 2 3 4
Rate this Article
Star Rating Loader Please wait...
The views expressed are of the author and do not necessarily represent the opinions or policies of the Indian Defence Review.

About the Author

Shubhda Chaudhary

PhD scholar from JNU.

More by the same author

Post your Comment

2000characters left