Professional Documents
Culture Documents
Security Studies
Publication details, including instructions for authors and
subscription information:
http://www.tandfonline.com/loi/fsst20
To cite this article: Jüürgen Haacke & Paul D. Williams (2008): Regional Arrangements, Securitization,
and Transnational Security Challenges: The African Union and the Association of Southeast Asian
Nations Compared, Security Studies, 17:4, 775-809
This article may be used for research, teaching and private study purposes. Any
substantial or systematic reproduction, re-distribution, re-selling, loan, sub-licensing,
systematic supply or distribution in any form to anyone is expressly forbidden.
The publisher does not give any warranty express or implied or make any representation
that the contents will be complete or accurate or up to date. The accuracy of any
instructions, formulae and drug doses should be independently verified with primary
sources. The publisher shall not be liable for any loss, actions, claims, proceedings,
demand or costs or damages whatsoever or howsoever caused arising directly or indirectly
in connection with or arising out of the use of this material.
Security Studies, 17: 775–809, 2008
Copyright © Taylor & Francis Group, LLC
ISSN: 0963-6412 print / 1556-1852 online
DOI: 10.1080/09636410802508014
INTRODUCTION
The question of how states respond to threats has long been debated within
security studies. Arguably, Stephen Walt’s “balance-of-threat” theory has been
Jürgen Haacke is senior lecturer in the Department of International Relations at the Lon-
don School of Economics and Political Science.
Paul D. Williams is associate professor in the Elliott School of International Affairs, George
Washington University.
We would like to thank the editors and anonymous reviewers from Security Studies
for their constructive criticisms. We also acknowledge research support provided by the UK
Economic and Social Research Council’s New Security Challenges Programme (Project Grant
RES 223-25-0072)
775
776 J. Haacke and P. D. Williams
the main point of departure for how contemporary realists think about these
issues, especially within the context of alliance formation and development.1
Walt’s approach focused on the importance of four factors affecting the level
of perceived threat (aggregate power, perceptions of intent, the offense-
defense balance, and geographic proximity) in order to assess when states
balance or bandwagon and why they do so. His insights have triggered both
critical discussions and theoretical refinements of balance-of-power theory,2
as well as applications of balance-of-power and balance-of-threat theory to
different regions.3
In Europe, meanwhile, a strand of constructivism commonly identified
as the Copenhagen School has developed a framework for thinking about
responses to threat agendas based on the concept of “securitization.”4 Its
Downloaded by [University of Indonesia] at 21:05 21 September 2011
1 Stephen M. Walt, “Alliance Formation and the Balance of World Power” International Security 9,
no. 4 (1985): 3–43; Stephen M. Walt, The Origins of Alliances (Ithaca, NY: Cornell University Press, 1987),
21–26; Stephen M. Walt, “Alliances, Threats and US Grand Strategy,” Security Studies 1, no. 3 (1992):
448–82; and Stephen M. Walt, Revolution and War (Ithaca, NY: Cornell University Press, 1996), 19.
2 See, for example, the series of articles on “Balancing Acts” in International Security 30, no. 1 (2005):
7–139.
3 For example, Stephen M. Walt, “Testing Theories of Alliance Formation: The Case of Southwest
Asia,” International Organization 42, no. 2 (1988): 275–316; Steve Yetiv, “The Travails of Balance of
Power Theory: The United States in the Middle East,” Security Studies 15, no. 1 (2006): 70–105; and
Robert S. Ross, “Balance of Power Politics and the Rise of China: Accommodation and Balancing in East
Asia,” Security Studies 15, no. 3 (2006): 355–95.
4 See Ole Wæver, Barry Buzan, Morten Kelstrup, and Pierre Lemaitre, Identity, Migration and the New
Security Agenda in Europe (London: Routledge, 1993); Ole Wæver, “Securitization and Desecuritization,”
in Ronnie D. Lipschutz, ed. On Security (New York: Columbia University Press, 1995), 46–86; Barry
Buzan, Ole Wæver, and Jaap de Wilde, Security: A New Framework for Analysis (Boulder, CO: Lynne
Rienner, 1998); Bill McSweeney, “Identity and Security: Buzan and the Copenhagen School,” Review of
International Studies 22, no. 1 (1996): 81–94.
5 For example, Barry Buzan and Ole Waever, Regions and Powers: The Structure of International
the African Union and the Association of Southeast Asian Nations have at-
tached to contemporary transnational challenges, which in many ways are
more concerning to decision makers in these regions than state-based threats.
The AU and ASEAN also represent the primary multilateral arrangements in
their respective region and, as such, possess particular significance for cur-
rent debates about international peace and security. We are not aware of any
previous attempt to analyze the process of securitization within the AU, and
while some analysts have started to address this issue in relation to ASEAN,
we remain unconvinced by some of their conclusions. In this sense, the ar-
ticle constitutes an early exploration into an area worthy of more detailed
research.
The contributions of the Copenhagen School are the original starting
Downloaded by [University of Indonesia] at 21:05 21 September 2011
6 For example, see Kwesi Aning, Africa: Confronting Complex Threats (Coping with Crisis Working
Paper Series, International Peace Academy, New York, February 2007); and Andrew T. H. Tan and J. D.
Kenneth Boutin, ed., Non-Traditional Security Issues in Southeast Asia (Singapore: Select Books, 2001).
778 J. Haacke and P. D. Williams
of the key criticisms made by its detractors. Drawing on both, the second
section clarifies our understanding of securitization. The third section then
provides a brief definition of transnational challenges, while the fourth and
fifth sections analyze the extent to which the AU and ASEAN have successfully
securitized those transnational challenges that have been on their agendas.
The final section compares and contrasts the findings of the two cases and
assesses the implications, with regard to both securitization theory and the
collective security policies of the two regional arrangements.
The article offers a number of conclusions: (1) the question of whether
collective securitization has occurred is at the heart of assessments of how
regional arrangements construct threat agendas; (2) collective securitization
by regional arrangements can be ascertained on the basis of shared un-
Downloaded by [University of Indonesia] at 21:05 21 September 2011
7 For overviews see Michael Desch, “Culture Clash: Assessing the Importance of Ideas in Security
Studies,” International Security 23, no. 1 (1998): 141–70; Ted Hopf, “The Promise of Constructivism
Regional Arrangements, Securitization, and Transnational Security Challenges 779
impact on the way analysts think about the construction of security agendas.
It thus serves as a useful starting point for exploring the extent to which the AU
and ASEAN have securitized transnational challenges. The idea of securitization
derives from Ole Wæver’s argument that a security issue does not normally
just exist objectively out there but is constructed discursively. Drawing on
John L. Austin, he maintains that to make something a security issue requires
a speech act, an initial validity claim. In Wæver’s words,
Notably, the invocation of the term “security” as a speech act is not syn-
onymous with a successful instance of securitization. Rather, its utterance
represents merely the starting point of a two-stage process of securitization.
As the CS state, the essence of the first stage is “to present an issue as urgent
and existential, as so important that it should not be exposed to the normal
haggling of politics but should be dealt with decisively by top leaders prior
to other issues.”9 The second stage involves a subsequent assenting move
by a relevant audience to the countermeasures proposed to meet the threat
at hand. If the securitizing move is rejected, no securitization occurs. For the
CS, therefore, securitization requires an audience to accept that the breaking
of existing rules or the adoption of some kind of emergency remedial action
is legitimate in the face of an existential threat. Securitization is thus not only
intersubjective but also distinct from the mere politicization of an issue.
Securitization theory emerged in the context of almost universal accep-
tance that the concept of security should be broadened beyond the military
sector to include a focus on political, economic, societal, and environmental
security.10 Securitization theory thus builds on thinking about security that
has identified a set of referent objects beyond the physical integrity of the
state. These include sovereignty or a legitimizing ideology, a shared identity,
and the economy. The pioneering work of Barry Buzan in this regard has
been paralleled by efforts to shift the level of analysis from the state to the
individual and the international.11 Just as the question “whose security?” is
in International Relations Theory,” International Security 23, no. 1 (1998): 171–200; and Theo Farrell,
“Constructivist Security Studies: Portrait of a Research Paradigm,” International Studies Review 4, no. 1
(2002): 71–92.
8 Wæver, “Securitization and Desecuritization,” 55.
9 Buzan et al., Security, 29.
10 As set out by Barry Buzan, People, States and Fear: An Agenda for International Security Studies
in the Post-Cold War Era (Hemel Hempstead: Harvester Wheatsheaf, 2nd ed., 1991).
11 For example, see Ken Booth, “Security and Emancipation,” Review of International Studies 17,
no. 4 (1991): 313–27; Caroline Thomas, Global Governance, Development and Human Security (London:
780 J. Haacke and P. D. Williams
Pluto Press, 2000); and Astri Suhrke, “Human Security and the Interest of States,” Security Dialogue 30,
no. 3 (1999): 265–76.
12 Buzan and Waever, Regions and Powers, 44–45.
13 Buzan et al., Security, 31.
14 For the early CS argument that security is about survival, see Wæver, “Securitization and Desecu-
ritization,” 53.
15 Buzan et al., Security, 5.
16 Ibid., 21–22.
17 Ibid., 22.
18 Ibid., 23.
19 Wæver et al., Identity, Migration, and the New Security Agenda in Europe.
Regional Arrangements, Securitization, and Transnational Security Challenges 781
societal rather than state security.20 However, as is clear from CS writings, the
focus on societal security is not exclusive. Also, the CS concern with identity
as a security referent speaks to the reality confronted by many countries in
the developing world that are facing severe challenges and threats in rela-
tion to state- and nation-building as well as difficulties in maintaining social
harmony in multiethnic societies. Meanwhile, Critical Security Studies has
challenged the CS on several fronts, not least its understanding of security.21
Feminists add that the CS has ignored the important gendered dimensions of
security politics.22 There has also been criticism of the Copenhagen School’s
understanding of identity as “sociologically untenable” on the grounds that
it is so static and monolithic that it fails to appreciate the extent to which
all social identities are multiple, often competing, and in a constant state of
Downloaded by [University of Indonesia] at 21:05 21 September 2011
20 Mely Callabero-Anthony and Ralf Emmers, “Understanding the Dynamics of Securitizing Non-
Traditional Security” in Mely Caballero-Anthony, Ralf Emmers, and Amitav Acharya, eds., Non-Traditional
Security in Asia: Dilemmas in Securitization (Aldershot: Ashgate, 2006), 5–6; and Claire Wilkinson, “The
Copenhagen School on Tour in Kyrgyzstan: Is Securitization Theory Useable Outside Europe?” Security
Dialogue 38, no. 1 (2007): 5–25.
21 See Pinar Bilgin, Ken Booth, and Richard Wyn Jones, “Security Studies: The Next Stage?” Nacão e
Defesa 84, no. 2 (1998): 131–57. Also see the contributions in Keith Krause and Michael C. Williams, ed.,
Critical Security Studies: Concepts and Cases (London: UCL Press, 1997); and Ken Booth, Theory of World
Security (Cambridge: Cambridge University Press, 2007), chap 3.
22 Lene Hansen, “The Little Mermaid’s Silent Security Dilemma and the Absence of Gender in the
bridge: Cambridge University Press, 1999) as well as his earlier exchange with the CS: McSweeney, “Iden-
tity and Security”; Barry Buzan and Ole Wæver, “Slippery? Contradictory? Sociologically Untenable? The
Copenhagen School Replies” Review of International Studies 23, no. 2 (1997): 241–50; and Bill McSweeney,
“A Response to Buzan and Wæver” Review of International Studies 24, no. 1 (1998): 137–40.
24 Buzan et al., Security, 26.
25 Ibid., 25.
782 J. Haacke and P. D. Williams
acceptance of the need for special action to counter it would constitute suc-
cessful securitization.
The argument that securitization should involve more than an exchange
of speech acts has attracted several adherents. Ralf Emmers, for instance, has
questioned “the significance of a securitisation process when it does not go
hand in hand with actions and policies to address the ostensible threat”26 and
asserted “that a full security act demands both a discourse of securitisation
and the implementation of extraordinary measures.”27 Others have similarly
emphasized an understanding of securitization as consisting of discursive
and nondiscursive elements.28 What stance one takes is important because
depending on what view is taken, very different conclusions about what
issues have been successfully securitized are inevitable.
Downloaded by [University of Indonesia] at 21:05 21 September 2011
The CS has also been criticized for the way in which it conceptualizes
the relationship between politics and security. Though its exponents argue
that securitization is about generating endorsement of special or emergency
measures beyond rules that would otherwise bind,29 it has been suggested
that such measures “may continue to be located within the political domain
and addressed through standard political procedures.”30 In other words, the
question is whether securitization necessarily always involves so-called emer-
gency measures that would be inconsistent with existing legal, political, or
ethical frameworks and constraints.
Related to this is a third criticism of securitization theory, which is fun-
damentally about the strength of the CS argument whereby the progression
from politicization to securitization of an issue or development rests on a sin-
gle speech act. The criticism is that only rarely, if ever, does an issue move
directly from being addressed within the realm of “normal” politics to action
suddenly requiring “emergency measures.” As Rita Abrahamsen has put it,
26Ralf Emmers, Non-Traditional Security in the Asia-Pacific: The Dynamics of Securitisation (Singa-
pore: Eastern Universities Press, 2004), 15.
27 Ibid., 15.
28 Neal Imperial, “Securitisation and the Challenge of ASEAN Counter-terrorism Cooperation,” ed.
Melissa G. Curley and Nick Thomas (working paper, Hong Kong: University of Hong Kong, 2005). Also
see Alan Collins, “Securitization, Frankenstein’s Monster and Malaysian Education,” Pacific Review 18, no. 4
(2005): 565–86; and Nicole Jackson, “International Organizations, Security Dichotomies and the Trafficking
of Persons and Narcotics in Post-Soviet Central Asia: A Critique of the Securitization Framework,” Security
Dialogue 37, no. 3 (2006): 299–317.
29 Buzan et al., Security, 5.
30 Ralf Emmers, “Securitization” in Contemporary Security Studies, ed. Alan Collins (Oxford: Oxford
31 Rita Abrahamsen, “Blair’s Africa: The Politics of Securitization and Fear” Alternatives 30, no. 1
(2005): 59.
32 Buzan et al., Security, 25.
33 The CS had argued that securitization “can be studied directly; it does not need indicators.” See
ibid., 25.
34 Mely-Caballero-Anthony and Ralf Emmers, “The Dynamics of Securitization in Asia” in Studying
Non-Traditional Security in Asia: Trends and Issues, comp. Ralf Emmers, Mely Caballero-Anthony, and
Amitav Acharya (Singapore: Marshall Cavendish, 2006).
35 Hansen, “The Little Mermaid’s Silent Security Dilemma.”
784 J. Haacke and P. D. Williams
state and case concerned could be the wider general public, elite opinion,
political party leaderships, government officials, or even be limited to only
the intelligence and security services, etc.) accepts both the claim that there
is an existential threat to a particular shared value and measures to address
the threat would be necessary and legitimate.36 This follows the Copenhagen
School’s position that an issue is securitized “only if and when the audience
accepts it as such.”37 It also follows from the basic understanding of what
acts of securitization involve, namely an exchange of validity claims.
Second, because securitization at heart involves an exchange of validity
claims only, we do not subscribe to the view offered by some critics of the
CS that successful securitization depends on the implementation of agreed
emergency measures. We do, however, concur with their point that securi-
Downloaded by [University of Indonesia] at 21:05 21 September 2011
36 The securitizing move need not always be made by state or government representatives. The
framework also allows for instance nonstate groups or organizations to securitize developments and
issues.
37 Buzan et al., Security, 25.
38 Ibid., 28.
39 To be fair, the Copenhagen School does acknowledge that in certain sectors, especially the societal
sector, it is hard to draw rigid boundaries between existential and lesser threats. See ibid., 23.
Regional Arrangements, Securitization, and Transnational Security Challenges 785
There is little doubt that securitization theory lends itself to being applied
Downloaded by [University of Indonesia] at 21:05 21 September 2011
40 Jeff Huysmans, “Revisiting Copenhagen: Or, On the Creative Development of a Security Studies
an understanding of regional security in Buzan et al., Security, 42–45; and Buzan and Wæver, Regions
and Powers.
786 J. Haacke and P. D. Williams
of participating countries, that is, leaders, ministers, and especially their se-
nior officials. The reason for this is the widespread absence of public spheres
across many regions and, more pertinently, the habitus of intergovernmental
decision making in matters of foreign policy and security.
As we see it, collective securitization by a regional arrangement demands
that the accepted decision-making procedures are duly observed. After all,
according to the CS a successful act of securitization depends on an audience
accepting a securitizing move. Cases where individual participants in a re-
gional arrangement have sought to hijack the latter to pursue their particular
security objectives cannot be considered to amount to collective securitiza-
tion of the arrangement as a whole if other participants have more or less
vehemently protested the legitimacy of such action. Examples include South
Downloaded by [University of Indonesia] at 21:05 21 September 2011
Transnational Challenges
As this article is concerned with analyzing how the AU and ASEAN have re-
sponded to transnational challenges it is important to clarify what the transna-
tional entails. According to Thomas Risse-Kappen, transnational relations are
defined as “regular interactions across national boundaries when at least one
actor is a non-state agent or does not operate on behalf of a national gov-
ernment or an intergovernmental organization.”42 On the more specific issue
of transnational threats, the Princeton Project on National Security suggested
that these are “characterized by an event or phenomenon of cross-border
scope, the dynamics of which are significantly (but not necessarily exclu-
sively) driven by non-state actors (e.g. terrorists), activities (e.g. global eco-
nomic behaviour), or forces (e.g. microbial mutations, earthquakes).”43 In
42 Thomas Risse-Kappen, “Introduction” in Bringing Transnational Relations Back In, ed. Thomas
44 Barry Buzan and Ole Wæver, “Macrosecuritisation and Security Constellations: Reconsidering Scale
in Securitisation Theory” (paper presented at LSE Staff Research Seminar, 8 November 2006), 5.
45 See Muthiah Alagappa, ed. Asian Security Practice: Material and Ideational Influences (Stanford:
Stanford University Press, 1998); and Brian Job, “The Insecurity Dilemma: National, Regime, and State
Securities in the Third World,” in The Insecurity Dilemma: National Security of Third World States, ed.
Brian Job (Boulder, CO: Lynne Rienner, 1992).
46 “Solemn Declaration on a Common African Defence and Security Policy,” agreed at the AU’s second
and cross-border crimes. While again not explicitly resorting to the terminol-
ogy of a transnational threat, African states have also identified what they
have referred to as “aggression” by nonstate actors, which is understood as
involving the use, intentionally and knowingly, of armed force or any hostile
act against the sovereignty, political independence, territorial integrity, and
human security of the population of a signatory state.47
In terms of their potential negative effects and references to them in AU
documents, it is appropriate to focus on how the AU has responded to four
transnational issues in particular: the trafficking of SALW, terrorism, infectious
diseases, and aggression by nonstate actors. To assess whether the AU has se-
curitized any of these challenges, this section provides a brief overview of rel-
evant declarations, decisions, and communiqués, adopted by the OAU/AU, the
Downloaded by [University of Indonesia] at 21:05 21 September 2011
Union’s Assembly, or its Peace and Security Council (PSC, the organ to which
the Assembly has delegated powers relating to peace and security issues),48
before establishing whether collective securitization has indeed occurred.
The AU’s key instrument on the issue of illicit arms trafficking remains the
Bamako Declaration on an African Common position on the Illicit Prolifera-
tion, Circulation, and Trafficking of Small Arms and Light Weapons, adopted
by the OAU in December 2000. This was agreed to in preparation for the
UN’s Program of Action (2001) and built upon a variety of earlier instruments
developed at the subregional level, particularly within West Africa. It was
not until 2004, however, that the issue resurfaced in the Union’s security dis-
course, specifically through the references in the PSC Protocol and the Solemn
Declaration on the CADSP to the scourge of SALW and landmines, and how they
posed a “serious impediment to Africa’s social and economic development”
and represented one of the threats that engender conflict on the continent.49
In addition, a Common African Position on Anti-Personnel Landmines was
adopted in September 2004. Amongst other things, this recommended that
the PSC “must remain seized with the issue of anti-personnel landmines” and
requested the AU Commission to develop a plan of action to facilitate the
implementation of the Common Position.
47 A list of such acts of aggression is given in Article 1 of the “African Union Non-Aggression and
July 2002), article 6(a) (hereafter “PSC Protocol”). The protocol came into force on 26 December 2003, and
the PSC was officially launched on 25 May 2004. Although the assembly constitutes the Union’s supreme
body, it has delegated its powers to the PSC to act as the primary forum through which the AU is supposed
to “promote peace, security and stability in Africa,” “PSC Protocol,” article 6(a). The current (2007–08)
members are Algeria, Angola, Botswana, Burkina Faso, Cameroon, Congo (Brazzaville), Egypt, Ethiopia,
Gabon, Ghana, Malawi, Nigeria, Rwanda, Senegal, and Uganda.
49 “PSC Protocol,” 3; and “Solemn Declaration,” 5–6.
790 J. Haacke and P. D. Williams
Yet in spite of these instruments, neither the AU Assembly nor the PSC has
given the issue of SALW trafficking or landmines serious prominence within
its public documents. As far as the Assembly is concerned, its decisions and
declarations have only once made reference to these issues, and then only
indirectly to say that the Union’s members needed to become parties to
more such instruments in order to help meet the Millennium Development
Goals for the continent.50 As far as the PSC is concerned, it has not issued
a single communiqué devoted to issues of SALW trafficking or antipersonnel
landmines. This does not mean the PSC has ignored the issue of SALW entirely.
In practice, the Council has received irregular briefings on the issue but has
not engaged in sustained substantive debates about it. According to one AU
official, issues concerning SALW simply fell by the wayside because there was
Downloaded by [University of Indonesia] at 21:05 21 September 2011
no practical follow-up on the issue between 2000 and 2004. This was because
the relevant personnel were preoccupied with the transition from the OAU to
the AU—in particular they were engaged in drafting the rules for the PSC—and
there was simply no capacity to address the issue.51
More recently, landmines and SALW have reemerged as a source of con-
cern within the AU. This is evidenced in the updating of the Union’s Common
Position on the UN Review Process on SALW and through the AU Executive
Council’s adoption, in 2006, of a policy framework on post-conflict recon-
struction and development in Africa, which identifies SALW and landmines as
important challenges to consolidating peace on the continent.52 From this
brief overview, it is clear the AU has not securitized the issue of SALW traf-
ficking. This is in spite of the fact that disarmament issues clearly remain a
necessary component of the Union’s developing vision to build a stable and
peaceful continent.
TERRORISM
Africa’s collective stance against terrorism can be traced back to 1992 when
the OAU issued a resolution banning movements that might engage in terror-
ism against its member states.53 This was followed by the Declaration on a
Code of Conduct for Inter-African Relations (June 1994), which denounced
various forms of extremism, including terrorism. The declaration was non-
binding and offered neither a definition of terrorism nor any mechanisms
to monitor the behavior of OAU member states. A more unambiguous set of
statements followed the bombing of the U.S. embassies in Nairobi and Dar
es Salaam on 7 August 1998, which killed over 260 people and injured more
than five thousand others.54 Al Qaeda’s hand in the attacks demonstrated that
terrorism in Africa was not solely a domestic or continental affair. The sub-
sequent debates within the OAU produced the Convention on the Prevention
and Combating of Terrorism (the Algiers Convention, 14 July 1999).55 In the
preamble, members expressed concern “over the scope and seriousness of
the phenomenon of terrorism and the dangers it poses to the stability and se-
curity of States” and designated terrorism a “serious violation of human rights
and, in particular, the right to physical integrity, life, freedom and security”
which also “impedes socio-economic development through destabilization of
States.” In addition, Article 2 demanded that member states accede to twelve
(now thirteen) relevant international instruments as well as enact national
legislation that punished terrorist acts, while Articles 4 and 5 in particular
Downloaded by [University of Indonesia] at 21:05 21 September 2011
set out numerous forms and areas of political and security cooperation that
member states should urgently undertake in conformity with national legis-
lation and procedures.
A third wave of securitizing moves followed the 9/11 attacks on the
United States, the adoption of Security Council resolution 1373 on 28 Septem-
ber 2001, and the establishment of a UN Security Council Counter-Terrorism
Committee. In response to these developments, African states adopted a
Declaration Against Terrorism (17 October 2001) and organized a series of
high-level meetings to coordinate their approach. These meetings produced
the Plan of Action, which, amongst other things, called for “joint action . . . at
the inter-governmental level,” including “coordinating border surveillance
to stem illegal cross-border movement of goods and persons; developing
and strengthening border control-points; and combating the illicit import,
export and stockpiling of arms, ammunition and explosives.” 56 The post-
9/11 environment also saw the AU reflect upon the limitations of the Algiers
Convention, particularly its lack of an implementation mechanism and ad-
equate measures for suppressing terrorist financing.57 In conceptual terms,
this can be understood as an attempt to refine the Union’s counterterrorism
instruments in light of changed circumstances. Once again, this indicates the
importance of viewing securitization as a process.
Several developments flowed from this renewed concern with terror-
ism. For instance, at the Union’s second summit the Assembly reiterated its
“concern over the increasing threat posed by international terrorism” and
54 It is worth noting that in April 1998 six African members of the League of Arab States—Algeria,
Egypt, Libya, Mauritania, Morocco, and Tunisia—endorsed the Arab Convention for the Suppression of
Terrorism in Cairo, Egypt.
55 The convention entered into force in December 2002.
56 “Plan of Action of the African Union High-Level Inter-Governmental Meeting on the Prevention
and Combating of Terrorism in Africa,” AU doc. Mtg./HLIG/Conv. Terror/Plan (I), Algiers, Algeria, 11–14
September 2002.
57 Martin Ewi and Kwesi Aning, “Assessing the Role of the African Union in Preventing and Combating
Pact, which outlawed acts of terrorism and called for intensified collabora-
tion between the AU’s members to eradicate terrorism from the continent.
In spite of these documents, relatively little concrete action was under-
taken by the AU itself. Indeed, to date only about half the necessary fifteen
states have ratified the Protocol to the OAU Convention on the Prevention
and Combating of Terrorism, although twenty-seven have signed. Similarly,
although the PSC has held briefings and some open sessions on terrorism it has
not released communiqués outlining its position on specific acts or actors. As
set out in the Plan of Action (2002), the most concrete practical development
was the establishment of the African Centre for the Study and Research on
Terrorism (ACSRT) headquartered in Algiers in October 2004. This had been
called for in the 2002 Plan of Action. The ACSRT was designed to develop and
maintain a database on issues relating to the prevention and combating of
terrorism, as well as disseminate information and analysis about these issues
to help implement the AU’s counterterrorism activities.60
In sum, the AU can be said to have securitized terrorism. However, al-
though the AU has consistently used the language of threat to discuss transna-
tional terrorism and produced a series of conventions in response, its practical
role has primarily been one of information exchange and norm-setting and to
a lesser extent acting as an intermediary between the UN and other external
actors on the continent.61 With the exception of establishing the ACSTR, most
practical counterterrorism measures undertaken on the continent have been
58 See AU documents Assembly/AU/Decl.14 (II) and 15 (II), Maputo, Mozambique, 10–12 July 2003.
59 “Protocol to the OAU Convention on Preventing and Combating Terrorism,” adopted by the Third
Ordinary Session of the AU Assembly, Addis Ababa, 8 July 2004.
60 To date, the ACSRT operates with approximately 25 professional and 25 local staff. It did so for its
first two years on a budget of $2 million donated by the Algerian government. By mid-2006, however,
only one person at the AU’s headquarters in Addis Ababa dealt with terrorism matters. Ewi and Aning,
“Assessing the Role of the African Union,” 46.
61 See ibid.
Regional Arrangements, Securitization, and Transnational Security Challenges 793
INFECTIOUS DISEASES
Infectious diseases have also featured regularly in the AU’s security discourse.
To date, most consistent prominence and attention has been devoted to
HIV/AIDS, but malaria, TB, and other diseases have, at times, also been desig-
nated as threats to the continent’s people and, in some cases, its states.
Once again, the Union’s response to HIV/AIDS is indicative of an incre-
mental process of securitization wherein the disease initially appeared on
the agenda as a development and health challenge, but was eventually con-
Downloaded by [University of Indonesia] at 21:05 21 September 2011
62 See Jessica R. Piombo, “Terrorism and U.S. Counter-Terrorism Programs in Africa: An Overview,”
Strategic Insights 6, no. 1 (2007), http://www.ccc.nps.navy.mil/si/2007/Jan/piomboJan07.asp.
63 Alex de Waal, AIDS and Power (London: Zed, 2006); and Nana Poku, AIDS in Africa (Cambridge:
Polity, 2006).
64 See Anthony Butler, “South Africa’s HIV/AIDS Policy, 1994–2004,” African Affairs 104, no. 417 (2005):
591–614.
65 OAU doc. OAU/SPS/ABUJA/4.
794 J. Haacke and P. D. Williams
the 21st Century.” The plan of action established the AU’s “primary goal” as
“revers[ing] the accelerating rate of HIV infection” by addressing twelve pri-
ority areas. It also called upon the Union’s members to implement the plan
“immediately.”
By the time of the Assembly’s second summit in 2003 its members
had broadened their concern beyond just HIV/AIDS. Here they declared they
were “deeply concerned” about the “threats” posed to Africa’s people by
the “scourge” of HIV/AIDS, TB, Malaria, and Other Related Infectious Diseases
(ORID) stating: “We believe that Malaria, HIV/AIDS, TB and ORID can, must and
will be defeated!”66 In 2004, the AU’s Solemn Declaration on the CADSP reiter-
ated that HIV/AIDS constituted a security threat to the continent’s peoples and
regional order and stability. To date, however, this has not translated into
Downloaded by [University of Indonesia] at 21:05 21 September 2011
ACTS OF AGGRESSION
The AU considers any aggression or threat of aggression against any mem-
ber state to constitute a threat or aggression against all member states of
the Union. In Article 4 of the Non-Aggression and Common Defence Pact
AU states undertake to “provide mutual assistance,” “respond by all available
Libya, Mali, Niger, Senegal, and Togo. The lack of ratifications is probably
due to the reluctance of many states to be held to account and respond in all
cases rather than an indication that acts of aggression by nonstate actors are
not viewed as security threats by the AU’s members. The question remains,
however, whether collective securitization of particular armed groups has oc-
curred. Here, the picture is different inasmuch as the PSC has indeed issued a
variety of communiqués, which call for measures in response to armed con-
flicts involving nonstate actors, most notably in the wars that have recently
occurred in Burundi, Côte d’Ivoire, the DRC, Somalia, and Sudan. In three of
these cases, the AU has authorized the deployment of a peace operation in
response to armed conflicts involving nonstate actors: in Burundi (2003–04),
Sudan (2004-present), and Somalia (2006-present).
69 ASEAN includes Indonesia, Malaysia, Singapore, the Philippines, Thailand as well as Brunei, Viet-
and offenses affecting the environment. In the wake of 9/11 and the U.S.-
led war on terror, and especially again after the Bali bombings of October
2002, terrorism received much greater attention; indeed, ASEAN has made co-
operation on counterterrorism an important platform in relations with its
dialogue partners. During the first half of 2003, ASEAN was moreover preoc-
cupied with SARS (Severe Acute Respiratory Syndrome), which originated in
China’s Guangdong Province in late 2002 and then spread to Southeast Asia
via Hong Kong. Singapore was particularly affected. Though SARS was con-
tained, the region remains exposed to communicable diseases. Since 2004
cases of avian influenza have been registered above all in Indonesia and
Vietnam, but also in Cambodia and Thailand. The 2004 Boxing Day Indian
Ocean tsunami also shifted ASEAN’s focus on the need to respond to transna-
Downloaded by [University of Indonesia] at 21:05 21 September 2011
tional disasters. Given the rise in oil prices in the last few years, ASEAN has
also begun to explore ideas on how to alleviate any dependency on market
supplies of oil and gas.
Although transnational challenges have increasingly preoccupied the
Southeast Asian region, three transnational challenges in particular have re-
ceived attention in ASEAN’s communiqués and statements: transnational crime
(particularly drugs), terrorism, and communicable diseases. The question is,
therefore, which, if any, of these three transnational challenges has been
collectively securitized.
TRANSNATIONAL CRIME
70 The ministerial meeting builds on the discussions of the Senior Officials Meeting on Transnational
Crime.
71 ASEAN Plan of Action to Combat Transnational Crime, http://www.aseansec.org/16133.htm.
72 Ibid.
Regional Arrangements, Securitization, and Transnational Security Challenges 797
73 “Work Programme to Implement the ASEAN Plan of Action to Combat Transnational Crime,” Kuala
2003, http://www.aseansec.org/15259.htm.
75 It has for instance also been on the agenda of the ASEAN Chiefs of Police and ASEAN Army Chiefs.
76 Second Informal Summit, Kuala Lumpur, 14–16 December 1997.
77 “Chairman’s Press Statement on ASEAN Third Informal Summit,” Manila, 28 November 1999,
http://www.aseansec.org/5300.htm.
78 4th Informal ASEAN Summit, Singapore, 22–25 November, http://www.aseansec.org/5310.htm.
79 “Chairperson’s Statement of the 12th ASEAN Summit,” Cebu, 13 January 2007.
798 J. Haacke and P. D. Williams
der the ASEAN Security Community, foreign ministers have since not clearly
identified all transnational crime as an unambiguous threat to the survival of
a regional security referent. In contrast to the aforementioned Summit State-
ment of 2007, the ministerial communiqué issued by ASEAN foreign ministers
in July that year certainly does not.84
In contrast, home ministers have perhaps more clearly progressively se-
curitized transnational crime as a package. The ASEAN Declaration on Transna-
tional Crime laid out specific security referents as it expressed concern about
the “pernicious effects of transnational crime . . . on regional stability and
development, the maintenance of the rule of law and the welfare of the re-
gion’s peoples.”85 This was, however, not an unequivocal assessment that
transnational crime clearly and consistently threatened the survival of par-
ticular shared values. Even in 1999 home ministers still pointed only to the
“potentially serious impact of transnational crime on the peace, prosperity
and progress of ASEAN and on its social and moral fabric.”86 Transnational
crime might also be said to have apparently lacked urgency for home minis-
ters, expressed in part in their agreement to convene a ministerial meeting to
coordinate ASEAN activities only once every two years. This was underlined
by the decision not to support the establishment of a Philippines-proposed
ASEAN Centre on Combating Transnational Crime (ACTC), which was supposed
to propel “regional efforts against transnational crime through intelligence
sharing, harmonization of policies and coordination of operations.”87
80
“Joint Communique,” 31st ASEAN Ministerial Meeting, Manila, 24–25 July 1998.
81
“Joint Communique,” 32nd ASEAN Ministerial Meeting, Singapore, 23–24 July 1999.
82 “Joint Communique,” 33rd ASEAN Ministerial Meeting, Bangkok, 24–25 July 2000.
83 “Joint Communique,” 35th ASEAN Ministerial Meeting, Bandar Seri Begawan, 29–30 July 2002.
84 “Joint Communique,” 40th ASEAN Ministerial Meeting, Manila, 29–30 July 2007.
85 “ASEAN Declaration on Transnational Crime,” Manila, 20 December 1997.
86 “Joint Communique,” 2nd ASEAN Ministerial Meeting on Transnational Crime, Yangon, 23 June 1999,
emphasis added.
87 “ASEAN Plan of Action to Combat Transnational Crime,” 2.
Regional Arrangements, Securitization, and Transnational Security Challenges 799
88 “Joint Communique,” 3rd ASEAN Ministerial Meeting on Transnational Crime, Singapore, 11 October
2001.
89 “Joint Communique,” 4th ASEAN Ministerial Meeting on Transnational Crime, Bangkok, 8 January
2004.
90 “Joint Communique,” 5th ASEAN Ministerial Meeting on Transnational Crime, Hanoi, 29 November
contributions in Philips Jusario Vermonte, ed. Small Is (Not) Beautiful: The Problem of Small Arms in
Southeast Asia (Jakarta: Centre for Strategic and International Studies, 2004); Tamara Renee Shie, “Maritime
Piracy in Southeast Asia: Evolution and Progress of Intra-ASEAN Cooperation” in Piracy, Maritime Terrorism
and Securing the Malacca Straits, ed. Graham Gerard Ong-Webb (Singapore: ISEAS, 2006), 163–89. For
other assessments see Ralf Emmers, “ASEAN and the Securitization of Transnational Crime,” The Pacific
Review 16, no. 3 (2003): 419–38; and Un Sovannasam, The Association of Southeast Asian Nations’ (ASEAN)
Efforts in Dealing with Transnational Crime (working paper, Centre of Asian Studies, University of Hong
Kong, 2005).
92 Vientiane Action Programme, 7.
93 “Joint Communique,” 39th ASEAN Ministerial Meeting, Kuala Lumpur, 25 July 2006.
800 J. Haacke and P. D. Williams
TERRORISM
Against the backdrop of 9/11 and the U.S.-led war on terror, ASEAN leaders
adopted the Declaration on Joint Action to Counter Terrorism at the Seventh
ASEAN Summit in Brunei Darussalam in November 2001 and tasked their min-
isters to consider specific measures that would enable ASEAN to contribute to
the war on terror. Thereafter ASEAN made cooperation on counterterrorism in
particular an important platform in relations with its dialogue partners. The
association signed its first joint counter-terrorism declaration with the United
States in August 2002. This sought to establish a framework for cooperation
to prevent, disrupt, and combat international terrorism through the exchange
and flow of information, intelligence, and capacity building.94 In November,
ASEAN and China issued a joint declaration on cooperation in the field of non-
Downloaded by [University of Indonesia] at 21:05 21 September 2011
traditional security issues, and many similar declarations have been signed
since then.95
Examining ASEAN’s position on terrorism, there is considerable evidence
of the latter’s securitization in the wake of 9/11, even though terrorism ini-
tially remained subsumed under transnational crime, in part because this con-
ceptualization had emerged in previous years. The 2001 ASEAN Declaration
on Joint Action to Counter Terrorism expressed a commitment to counter,
prevent, and suppress all acts of terrorism. It stated moreover that ASEAN
countries viewed “acts of terrorism in all its forms and manifestations, com-
mitted wherever, whenever and by whomsoever, as a profound threat to
international peace and security which require concerted action to protect
and defend all peoples and the peace and security of the world.”96 The dec-
laration also called terrorism “a direct challenge to the attainment of peace,
progress and prosperity of ASEAN and the realisation of ASEAN Vision 2020.”97
Although the 2001 declaration still masked considerable differences in per-
spective and rhetoric about how significant terrorism was as a threat to the
region as well as the legitimacy of the U.S. response to 9/11, ASEAN soon there-
after more explicitly focused on terrorism as a regional security threat rather
than merely as a “challenge.” In a special meeting on terrorism in May 2002
ministers unequivocally condemned acts of terrorism, and foreign ministers
94 “ASEAN-United States of America Joint Declaration for Cooperation to Combat International Terror-
challenges that matches ASEAN’s almost completely except for the wording, even designating all eight as
“priorities.” These two declarations proved the forerunners of a series of several joint declarations to
combat international terrorism, signed with the European Union (January 2003), India (October 2003),
Russia (June 2004), Australia (June 2004), Japan (November 2004), Pakistan (July 2005), Korea (July 2005),
New Zealand (July 2005), and Canada (July 2006). Some joint declarations have led to work plans on
counterterrorism. ASEAN has also been working with China, Japan, and South Korea under the ASEAN Plus
Three process to address terrorism and transnational crime.
96 “2001 ASEAN Declaration on Joint Action to Counter Terrorism,” Bandar Seri Begawan, 5 November
2001, http://www.aseansec.org/5962.htm.
97 Ibid.
Regional Arrangements, Securitization, and Transnational Security Challenges 801
2005–06: Military Modernization in an Era of Uncertainty, eds., Ashely J. Tellis and Michael Wills (Wash-
ington, D.C.: National Bureau of Asian Research, 2005), 292. See also Jonathan T. Chow, “ASEAN Countert-
errorism Cooperation Since 9/11,” Asian Survey 45, no. 2 (2005): 302–21; and Ralf Emmers and Leonard C.
Sebastian, “Terrorism and Transnational Crime in Southeast Asian International Relations” in International
Relations in Southeast Asia, ed. Donald E. Weatherbee (Lanham: Rowman & Littlefield, 2005), 156–86.
102 See for instance “Joint Communique,” 38th ASEAN Ministerial Meeting, Vientiane, 26 July 2005.
103 “Joint Communique,” 40th ASEAN Ministerial Meeting, Manila, 29–30 July 2007.
802 J. Haacke and P. D. Williams
TRANSNATIONAL DISEASES
first ever Special ASEAN-China Leaders’ Meeting in late April 2003. Ministers
of Health noted that “SARS . . . threatened the well-being and livelihood of
the people and the economic development” of East Asia and agreed on
a range of practical steps to counter the epidemic.105 ASEAN leaders equally
registered a concern about the consequences of SARS for the well-being of the
people and economic development, albeit in terms of a “serious challenge,”
and similarly endorsed a set of measures to counter the virus, including
an ASEAN SARS Containment Information Network.106 Its establishment was
achieved at a speed “unprecedented in the history of ASEAN.”107 In their joint
statement with Chinese President Hu Jintao, ASEAN leaders referred to SARS
as a “mounting threat to life and health of the people of Asia” and noted
the “serious adverse impact on the economy and society of countries in
the region.”108 Leaders also agreed to link their respective SARS information-
sharing networks. Attaining SARS-free status by the summer of 2003, ASEAN
foreign ministers reiterated their leaders’ earlier call for other countries to
take measures to combat SARS similar to those being taken by ASEAN and to
refrain from issuing indiscriminate travel advisories on account of SARS.109
In 2004, foreign ministers agreed to maintain close coordination and fur-
ther strengthen cooperation to prevent the spread of communicable diseases
as ASEAN leaders explicitly identified bird flu as one of the “key challenges”
facing the region.110 ASEAN has been enhancing regional coordination mech-
anisms for early warning and surveillance capacity building and promoted
104 See UNAIDS/WHO AIDS Epidemic Update, December 2006, http://www.unaids.org/en/HIV data
/epi2006/default.asp; World Health Organization (WHO), Malaria Disease Burden in SEA Region,
http://www.searo.who.int/EN/Section10/Section21/Section340 4018.htm.
105 “Joint Statement of the ASEAN+3 Ministers of Health Special Meeting on SARS,” Kuala Lumpur, 26
April 2003.
106 “Joint Declaration of the Special ASEAN Leaders Meeting on SARS,” Bangkok, 29 April 2003.
107 Curley and Thomas, “Human Security and Public Health in Southeast Asia,” 28.
108 “Joint Statement of the Special ASEAN-China Leaders Meeting on SARS,” Bangkok, 29 April 2003.
109 “Joint Communique, 36th ASEAN Ministerial Meeting,” Phnom Penh, 16–17 June, 2003.
110 “Chairman’s Statement of the 10th ASEAN Summit,” Vientiane, 29 November 2004.
Regional Arrangements, Securitization, and Transnational Security Challenges 803
111 Up to early 2007, Vietnam had the highest number of cases (93) reported to the WHO, but In-
donesia the world’s greatest number of fatalities (63). See “Cumulative Number of Confirmed Human
Cases of Avian Influenza A/(H5N1)” Reported to WHO, http://www.who.int/csr/disease/avian influenza
/country/cases table 2007 02 16/en/index.html.
112 “Chairman’s Statement of the 11th ASEAN Summit,” Kuala Lumpur, 12 December 2005.
113 Ibid.
114 “Chairperson’s Statement of the 12th ASEAN Summit,” Cebu, 13 January 2007.
115 PanStop2007, http://www.wpro.who.int/sites/csr/PANSTOP2007.htm.
116 Such fears proved unfounded, however, as FDI figures for 2004 reached US$25.1 billion, a 22 per-
cent year-on-year increase. “Chairman’s Statement of the 11th ASEAN Summit,” Kuala Lumpur, 12 December
2005.
804 J. Haacke and P. D. Williams
117 Erik Bloom, Vincent de Wit, and Mary Jane Carangal-San Jose, Potential Economic Impact of
an Avian Flu Pandemic on Asia (Asian Development Bank: ERD Policy Brief no. 42, November 2005),
http://www.adb.org/Documents/EDRC/Policy Briefs/PB042.pdf.
Regional Arrangements, Securitization, and Transnational Security Challenges 805
by ASEAN a concern but not an existential threat to the region, while avian flu
has been seen as a potential existential threat. In the AU’s case, the different
language used in relation to various challenges would appear to indicate
a hierarchy of seriousness and urgency: while both terrorism and HIV/AIDS
were clearly seen as threats, droughts and swarms of locusts were serious
concerns that had the potential to intensify if left unchecked, while climate
change has recently been designated a concern and a potential existential
threat to the continent’s environment.118
While neither the AU nor ASEAN have unambiguously securitized transna-
tional crime, there is an interesting dissimilarity between the two regional
arrangements as regards the securitization of cross-border insurgency activ-
ities. Indeed, in certain concrete cases, the AU has discussed and securitized
Downloaded by [University of Indonesia] at 21:05 21 September 2011
the actions of nonstate actors, notwithstanding the fact that some AU deci-
sions concerning transnational challenges—primarily to do with cross-border
insurgencies—have met resistance from members, as happened in the case of
the peace operation in Darfur, Sudan. By comparison, ASEAN does not really
deal with intrastate conflict (notwithstanding the recent diplomatic interven-
tion vis-à-vis Myanmar) and has no record of formally addressing intrastate
ethnic conflict feeding in part on transnational linkages. Such transnational
networks are said to complicate the situation in southern Thailand and may
also continue along the Thai-Myanmar border. Though the governments fac-
ing ethnic or separatist conflict may themselves regard nonstate actors as a
serious threat to the state, the absence of ASEAN statements on these issues
demonstrates that no collective securitization has occurred. This is consis-
tent with the premise that collective securitization normally requires a clear
regional referent or depends on a shared assessment of threat.
118 See AU docs Assembly/AU/Dec.134–164 (VIII) and Assembly/AU/Decl.1–6 (VIII), Addis Ababa,
119 On ASEAN see Amitav Acharya, Constructing a Security Community in Southeast Asia: ASEAN and
the Problem of Regional Order (London: Routledge, 2001); and Jürgen Haacke, ASEAN’s Diplomatic and
Security Culture: Origins, Development and Prospects (London: RoutledgeCurzon, 2003). On the AU see
Paul D. Williams, “From Non-Intervention to Non-Indifference: The Origins and Development of the
African Union’s Security Culture,” African Affairs 106, no. 423 (2007): 253–79.
120 On intra-ASEAN relations, see for instance Andrew T.H. Tan, Southeast Asia: Threats in the Security
are illegitimate and the Union has the right to intervene in member states
in what it refers to as “grave circumstances,” namely, war crimes, genocide,
and crimes against humanity.122 This built upon the precedents set during the
1990s through the Economic Community of West African States’ Monitoring
Group’s (ECOMOG) efforts to deal with a variety of transnational insurgency
movements in Liberia, Sierra Leone, and Guinea-Bissau.123 Today, the Union
routinely recognizes the transnational dimensions of serious internal conflicts
pose threats (or potential threats) to regional security and stability, and rep-
resent a legitimate topic for engagement. It is on the basis of these norms that
the AU has played a far more significant role than ASEAN in resolving armed
conflicts. Nevertheless, it is clear that not every transnational insurgency in
Africa is discussed in the AU Assembly and/or PSC. For example, the Front for
the Liberation of the Cabinda Enclave has regularly operated out of the DRC
and Congo-Brazzaville to launch attacks into Cabinda, but it has not been
the subject of an Assembly declaration or a PSC communiqué. Nor has the
Movement of the Democratic Forces of Casamance, which has regularly op-
erated out of Senegal’s neighbor Guinea-Bissau. One plausible explanation
for the selectivity apparent in the Union’s official discourse would relate to
the perceived scale and intensity of the insurgency in question.
Although this article argued that collective securitization does not depend
on the implementation of “emergency measures” as conceived by the
Copenhagen School, it has highlighted the measures agreed to in response
to the transnational challenges in question. Here the records of the two
121 Our analysis thus differs from that of Peter Chalk, “Disease and the Complex Processes of Secu-
tional Review of the Red Cross 85, no. 852 (2003): 807–25.
123 See Adekeye Adebajo, Building Peace in West Africa (Boulder, CO: Lynne Rienner, 2002).
808 J. Haacke and P. D. Williams
Based on our review of securitization theory and its application to how the
AU and ASEAN approach transnational challenges, this article offers several
conclusions. First, securitization theory can usefully be applied to different
regional arrangements but there are serious issues that must be confronted.
For one thing, it is best not to base conclusions about whether collective
securitization has occurred on the same basis as when securitization is being
studied in a purely domestic context. We defined successful acts of collective
securitization as occurring when regional arrangements framed issues using
unambiguous language of existential threat and agreed upon countervailing
practical measures. Unlike some analysts, we did not consider it necessary
for the regional arrangements to enact emergency measures in order for
securitization to take place.
Our analysis of the AU and ASEAN has shown that even when these ar-
rangements seemed to identify certain transnational challenges not only as
risks but potential or actual threats, they refrained from agreeing on mea-
sures that—although perhaps innovative—would be considered out of the
ordinary given the existing forms of cooperation and their normative parame-
ters. Strictly speaking, when judged against the Copenhagen School’s criteria,
this should lead to the conclusion that there has been no securitization of
transnational challenges such as terrorism and communicable diseases. We
felt it sensible to relax the requirement of agreement on “extraordinary mea-
sures” and emphasize instead the importance of shared threat assessments, as
well as agreement on some form of practical response. Having already argued
that the actual implementation of extraordinary measures is not required for
securitization to occur, the decision to reduce further the requirement for
successful securitization might be understood as a major limitation of se-
curitization theory in its practical application. However, we feel that this is
necessary and warranted, as the key audience for multilateral arrangements
Regional Arrangements, Securitization, and Transnational Security Challenges 809
is normally formed not by converging national public opinion but simply the
representatives of other members, that is, their governments.
The empirical sections of this article have demonstrated moreover that
the Copenhagen School’s dichotomy between politicization and securitiza-
tion should be rejected in favor of seeing securitization as a more incremental
and graduated process. To date, securitization theory fails to make sufficient
allowance for the continuum along which decision makers would seem to
categorize challenges: a continuum that would stretch from apolitical prob-
lems, their politicization, and then their treatment as concerns, risks, threats,
and potentially even existential threats. Disregarding different stages toward
full securitization leads analysts to gloss over significant distinctions between
what is considered an existential threat and what is not.
Downloaded by [University of Indonesia] at 21:05 21 September 2011
In empirical terms, we conclude that ASEAN and the AU are engaged with
transnational threats to individuals as well as state and regime security. How-
ever, the Southeast Asian case demonstrates that those transnational chal-
lenges posing a potential or actual serious threat to the state enjoy priority.
In the AU’s case, the official rhetoric is more ambiguous as it is often more
vague. Clearly, transnational health threats are set to remain at or near the
top of the security agenda of both arrangements.
It is paradoxical that the AU, which does not use the label “transnational”
in its official security discourse, nevertheless responds to transnational issues
such as health and terrorism, and in certain circumstances even to intrastate
disputes with transnational dimensions, usually in the form of cross-border
insurgency activity. In contrast, we found that ASEAN carefully distinguishes
between different transnational challenges, although it operates with signifi-
cant silences on insurgents or domestic competitors operating transnationally.
This leads us to make our final theoretical point regarding the possibil-
ity and/or usefulness of relying on securitization theory in order to explore
how regional arrangements construct threats: the importance of analyzing
collective securitization against the backdrop of prevailing regional security
discourses. These discourses implicitly or explicitly reflect core security con-
cerns that shape the official output of a regional arrangement in important
ways. Such discourses may not only reduce the collective latitude to address
effectively novel challenges; sometimes they may encourage a collective si-
lence on security issues that are too important to be ignored.