{"id":109,"date":"2024-01-30T09:35:50","date_gmt":"2024-01-30T09:35:50","guid":{"rendered":"https:\/\/www.making-security.gsi.lmu.de\/?page_id=109"},"modified":"2024-05-14T08:52:40","modified_gmt":"2024-05-14T07:52:40","slug":"title","status":"publish","type":"page","link":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/title\/","title":{"rendered":"About the Project"},"content":{"rendered":"\n<figure class=\"wp-block-image alignwide size-full is-style-rounded is-style-rounded--1\"><img loading=\"lazy\" decoding=\"async\" width=\"3884\" height=\"1230\" src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1.png\" alt=\"\" class=\"wp-image-712\" srcset=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1.png 3884w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1-300x95.png 300w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1-1024x324.png 1024w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1-768x243.png 768w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1-1536x486.png 1536w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/map_grey_green_2_cleaner-1-2048x649.png 2048w\" sizes=\"auto, (max-width: 3884px) 100vw, 3884px\" \/><\/figure>\n\n\n\n<div style=\"height:18px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-9c22b1e3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-container-core-column-is-layout-a77db08e wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<div class=\"wp-block-group is-vertical is-layout-flex wp-container-core-group-is-layout-98a715ba wp-block-group-is-layout-flex\">\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-28f0cd9b\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/conv_war_alphacannel.png\" alt=\"\" class=\"wp-image-600\" srcset=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/conv_war_alphacannel.png 500w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/conv_war_alphacannel-300x300.png 300w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/conv_war_alphacannel-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-b30579f5\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/critical-infrastructure_alphacannel.png\" alt=\"\" class=\"wp-image-601\" srcset=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/critical-infrastructure_alphacannel.png 500w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/critical-infrastructure_alphacannel-300x300.png 300w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/critical-infrastructure_alphacannel-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p style=\"margin-top:0;margin-right:0px;margin-bottom:0;margin-left:0px;padding-top:0;padding-right:0;padding-bottom:var(--wp--preset--spacing--10);padding-left:0\">Today, the political authority of elected politicians to make binding decisions is often superseded by the epistemic authority of security experts. Rather than exclusively deploying their own coercive capacities, many advanced democracies have come to rely on rules to incentivize and steer indirect security governance by non-state actors. For instance, Europe\u2019s and the United States\u2019 responses to Russia\u2019s large-scale aggression in Ukraine display that most democratic states hardly \u201cmake national security\u201d by themselves. Instead, they draw on commercial arms producers, private security firms as well as tech companies and regulate them to ensure they contribute to national security. Yet, these transformations are neither uniform nor uncontested. There are countervailing dynamics towards military capacity-building, and prevailing foundations of authority as well as predominant policy instruments vary across security fields and across countries.<\/p>\n\n\n\n<p style=\"padding-top:0;padding-bottom:var(--wp--preset--spacing--10)\">In our project, funded by the Fritz Thyssen Foundation, we seek to capture this \u201ccontested complexity\u201d by deploying a novel typology of security states. To replace the uniform notion of <em>the<\/em> Westphalian state, we conceptualize four different types of security states: (i) positive, (ii) managing, (iii) technocratic, (iv) regulatory. These types vary according to the prevailing foundation of authority (i.e. political or epistemic) and the predominant policy instrument (i.e. rules or capacities).<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:20%\">\n<div class=\"wp-block-group is-vertical is-content-justification-left is-layout-flex wp-container-core-group-is-layout-2290e706 wp-block-group-is-layout-flex\">\n<div style=\"margin-top:0;margin-bottom:0;height:0px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-28f0cd9b\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/mil_log_alphacannel-1.png\" alt=\"\" class=\"wp-image-603\" srcset=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/mil_log_alphacannel-1.png 500w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/mil_log_alphacannel-1-300x300.png 300w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/mil_log_alphacannel-1-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer wp-container-content-b30579f5\"><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/cyber_alphacannel.png\" alt=\"\" class=\"wp-image-602\" srcset=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/cyber_alphacannel.png 500w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/cyber_alphacannel-300x300.png 300w, https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/04\/cyber_alphacannel-150x150.png 150w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/figure>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-table table_typeofss is-style-regular\"><table class=\"has-base-background-color has-background\"><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\" colspan=\"2\" rowspan=\"2\">Types of Security States<\/td><td class=\"has-text-align-center\" data-align=\"center\" colspan=\"2\">Policy Instrument<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Capacity<\/td><td class=\"has-text-align-center\" data-align=\"center\">Rules<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\" rowspan=\"2\">Authority Basis<\/td><td class=\"has-text-align-center\" data-align=\"center\">Political<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Positive<\/strong> <\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Managing<\/strong><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\">Epistemic<\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Technocratic<\/strong> <\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong>Regulatory<\/strong> <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns alignwide is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:60%\">\n<p style=\"padding-top:0;padding-bottom:var(--wp--preset--spacing--10)\">Drawing on this typology, we map security policy-making in the sectors of conventional warfare, military support services, critical infrastructures and cyber warfare in the four most capable democratic powers (i.e. United States, India, France, United Kingdom) in the period of 1990\u2013today. Beyond this mapping, we draw on a pluralist theoretical framework to explain variation in types of security states as well as shifts from one type to another. Our explanatory conditions and pathways of reforming security states link the structural drivers of technological innovation and security pressures with interests-, ideas- and institutions-based approaches. Our research design draws on congruence analysis and causal process-tracing and aims to analyze a variety of secondary and primary sources, including semi-structured interviews with firm representatives, military officials, experts from think tanks etc.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p> Our project aims to make several important contributions. Conceptually, we take the regulatory governance framework to national security, demonstrate its analytical leverage, and further refine this heuristically productive approach by developing a more fine-grained typology and new causal mechanisms. Empirically, we generate extensive amounts of original comparative data on variation within and across security states. Last but not least, our new understanding of the security state and its transformation will provide policy-relevant insights into contemporary attempts of democratic military powers to reform their security states in response to challenges such as the return of large-scale, territorial aggression in Europe, heating geopolitical rivalries between the US and China, or the transformation of security policies in cyberspace.<\/p>\n\n\n\n<div style=\"height:46px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<figure id=\"video\" class=\"wp-block-video\"><video height=\"1080\" style=\"aspect-ratio: 1920 \/ 1080;\" width=\"1920\" controls src=\"https:\/\/www.making-security.gsi.lmu.de\/wp-content\/uploads\/2024\/05\/Video-RG.mov\" playsinline><\/video><\/figure>\n\n\n\n<p>This video can also be found on YouTube (<a href=\"https:\/\/youtu.be\/zGgy9gUj0n4\">link<\/a>).<\/p>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today, the political authority of elected politicians to make binding decisions is often superseded by the epistemic authority of security experts. Rather than exclusively deploying their own coercive capacities, many advanced democracies have come to rely on rules to incentivize and steer indirect security governance by non-state actors. For instance, Europe\u2019s and the United States\u2019 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-109","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/pages\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":69,"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions"}],"predecessor-version":[{"id":799,"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions\/799"}],"wp:attachment":[{"href":"https:\/\/www.making-security.gsi.lmu.de\/index.php\/wp-json\/wp\/v2\/media?parent=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}