Political Science > International Relations > Download, free read

Governing Borderless Threats by Shahar Hameiri download in ePub, pdf, iPad

Traditionally, security involved building military strength to deter or repel attacks by other states. This often involves attempts to empower technical experts and other technocratic regulators to impose international disciplines on other parts of their states and societies. The goal is to change their domestic institutions and integrate them into multi-level, transboundary governance networks that can manage and contain security threats and risks. Poultry being culled in Indonesia Moreover, the costs of security intervention were obviously shunted onto the poorest and weakest groups in society. But rather than transferring power wholesale to new or existing international organisations, this is pursued primarily by transforming states in at-risk territories.

Indeed bird flu remains endemic

Drug trafficking represents a major cross-border challenge for many states. This is an interlinked series of interventions spanning parts of Latin America and West Africa, tracking the route through which cocaine is smuggled to Europe. Although these projects are generally depicted as neutral, technical, and problem-solving, in reality they are highly political interventions. The goal is to cultivate institutions that will enact international disciplines on other parts of their states and societies, particularly those facilitating trafficking. Similarly, the Australian government has not only outsourced refugee processing to countries like Nauru and Papua New Guinea, and resettled Australia-bound refugees in impoverished Cambodia.

However, we also found that state transformation is always highly contested, with outcomes of security governance projects being powerfully shaped by local political and economic dynamics. Indeed, bird flu remains endemic among poultry in Indonesia.

Crucially, we found that state transformation is always highly contested, with outcomes of security governance projects being powerfully shaped by local political and economic dynamics. This article was originally published on The Disorder of Things. Money-laundering regulations were used to prosecute government enemies, while allies were spared. Governing Borderless Threats reframes these issues in cutting-edge ways both empirically and theoretically. Indeed, this occurred across our cases.

However we also found that state