国际安全研究(2018年第1辑·英文版)
上QQ阅读APP看书,第一时间看更新

2 What Is “Non-traditional Security Community”?

To construct the non-traditional security community, it is necessary to review the concepts of community and security community. Plato's “ideal state” and Aristotle's“theory of polis” are a philosophical and political source of the concept of community. According to Plato, “ideal state” is “just state” while Aristotle believes that “polis”is the best organization that enables people to live a political life. Ferdinand Tönnies emphasizes from the perspective of sociology that community is a “perfect unity of human will” on the basis of “tacit consensus”, and “community life is mutual possession and share of common property, namely, protecting and preserving common property.”Ferdinand Tönnies,Community and Society:Fundamental Concepts of Pure Sociology,translated by Lin Rongyuan,Beijing:Peking University Press, 2010, pp. 48, 62 ([德] 斐迪南·滕尼斯:《共同体与社会:纯粹社会学的基本概念》,林荣远译,北京:北京大学出版社2010年版,第48、62页). Later scholars expand the definition and understanding of community multi-dimensionally. For instance, Robert Maclver develops Rousseau's idea of political community based on “people's free will”, believing that the essence of community is “community of interests” that can be created consciously to realize common interests.David Miller,ed.,The Blackwell Encyclopedia of Political Thought,translated by Deng Zhenglai,Beijing:China University of Political Science and Law, 2011, pp. 102-103 ([英] 戴维·米勒主编:《布莱克维尔政治思想百科全书》,邓正来等译,北京:中国政法大学出版社2011年版,第102-103页).

Community in modern society takes a rich variety of forms. In addition to political community, economic community, cultural community, social community, and military community all of which are concerned with state power, there are scientific community, learning community, educational community, professional community, environmental community, and cyber community all of which are of non-state power. Community enables man's “gregarious” lifestyle to assume various meanings of modernity and forms but there is a type of community that directly takes state core interests as referents, that is, “security community”. Security is “the politics of all politics”.Barry Buzan and Lene Hansen,The Evolution of International Security Studies, translated by Yu Xiaofeng, Hangzhou:Zhejiang University Press, 2011, p. 4 ([英] 巴里·布赞、[丹麦] 琳娜·汉森:《国际安全研究的演化》,余潇枫译,杭州:浙江大学出版社2011年版,第4页). It is not only the most extensive in scope but also the most highly political. Hence, the traditional security community is closely related to a state's military affairs and politics directly and should be constructed and pursued by a state with the use of power.

2.1 The Origin, Key Variables and Construction Paths of Security Community

Richard W. Van Wagenen first conceived the concept of “security community” in international relations studiesRichard W.Van Wagenen,Research in the International Organization Field:Some Notes and Possible Focus, Princeton:Center for Research on World Political Institution, 1952, pp. 10-11, quoted from Zheng Xianwu, “‘Theoretical Inquiry into‘Security Community', ”Contemporary International Relations,No.2(2004),p.55(转引自郑先武:《“安全共同体”理论探微》,载《现代国际关系》2004年第2期,第55页). and Karl W. Deutsch elaborated in a comprehensive way “security community” for the first time.Karl W.Deutsch,et al.,Political Community and the North Atlantic Area,Princeton:Princeton University Press,1957,p.6, quoted from Zheng Xianwu,“‘Theoretical Inquiry into‘Security Community', ”Contemporary International Relations,No.2 (2004), p. 55 (转引自郑先武:《“安全共同体”理论探微》,载《现代国际关系》2004年第2期,第55页). From the perspective of constructivism, Security Community edited by Emmanuel Adler and Michael Barnett further developed Deutsch's “pluralistic security community” and defined it as “a transnational region comprised of sovereign states whose people maintain dependable expectations of peaceful change”.Emanuel Adler and Michael Barnett,eds.,Security Communities,translated by Sun Hong,Beijing:World Affairs Press,2015,p. 25 ([以] 伊曼纽尔·阿德勒、[美]迈克尔·巴涅特主编:《安全共同体》,孙红译,北京:世界知识出版社2015年版,第25页). Deutsch and Adler think that “dependable expectations of peaceful change” is the core characteristic of security community and traditional security (military and political security) is still the content security community is concerned with most. “The basic notion that underlies the security community mechanism is the organization of interstate relations in concentric circles rather than competing centers of power.”Emanuel Adler and Patricia Greve, “When Security Community Meets Balance of Power: Overlapping Regional Mechanisms of Security Governance, ”Review of International Studies,Vol.35,No.S1(February 2009),p.70. Andrej Tusicisny believes that the existent definition of security community does not take into consideration the element of the public. For this reason, he extends the content of security community, saying that in this region, there is neither interstate war nor civil war conceivable.Andrej Tusicisny,“Security Communities and Their Values:Taking Masses Seriously, ”International Political Science Review, Vol. 28, No. 4 (September 2007), pp. 425-427. Vincent Pouliot maintains from the perspective of practice that only when security officials in practice empower diplomacy to be the obviously important (even the only) path to resolve inter-state disputes can peace exist and the concept of security community is valid in practice.Vincent Pouliot,“The Logic of Practicality:A Theory of Practice of Security Communities, ”International Organization,Vol. 62, No. 2 (April 2008), pp. 257-288.

Generally speaking, the creation of a security community entails two conditions:first, security actors themselves have the internal needs in terms of “external pressure”,“internal motive force”, and “co-existing interests” with other security actors;second, there exist relevant elements between security actors whose internal needs are externalized, such as “common cognition”, “shared mechanism”, and “common action”. In face of common security threats, the “external pressure” and “internal motive force” of security actors themselves tend to be easily formed while the “common cognition”, “shared mechanism”, and “common action” between security actors are difficult to achieve or need to undergo a long process of learning and gaming. This is because the interaction between security actors involves the pre-assessment of “absolute returns” and “relative returns”, the intertwining and compounding of non-traditional and traditional security problems, the worry of other actors' “hitching a ride” in security cooperation, and even the possible fear of the “negative overspill effects after the formation of the security community.

To construct security community, one should examine its key variables and ways of combination first. Adler and Barnett regard “factors conducive to peaceful change” as“motive force” and design it by centering on a three-tiered organizational framework. The first tier is precipitating factors, including the change of external environment, the development of the new interpretation of social reality, and external threats. The second tier consists of factors conducive to the formation of mutual trust and collective identity, involving structures (power structure and knowledge structure), and process (contact, international organization and institution, and social learning). The third tier is comprised of essential conditions for dependable expectations of peaceful change, including mutual trust and collective identity.Emanuel Adler and Michael Barnett,eds.,Security Communities,translated by Sun Hong,Beijing:World Affairs Press,2015,p. 31 ([以] 伊曼纽尔·阿德勒、[美]迈克尔·巴涅特主编:《安全共同体》,孙红译,北京:世界知识出版社2015年版,第31页). With his studies of ASEAN, Amitav Acharya points out that system is not an essential condition for the formation of security community while norms and the process of identity socialization are of vital importance to the creation of security community.Amitav Acharya,Constructing a Security Community in Southeast Asia:ASEAN and the Problem of Regional Order, translated by Wang Zhengyi, Shanghai: Shanghai People's Press, 2004, pp. 29-41 ([加]阿米塔夫·阿查亚:《建构安全共同体:东盟与地区秩序》,王正毅等译,上海:上海人民出版社2004年版,第29-41页). In his further studies, Adler adopts an analytically eclectic approach, thinking that security community and equilibrium of power are not mutually exclusive but intertwine and co-exist. Therefore, besides identity, power is a key element for the formation of the security community.Emanuel Adler and Patricia Greve, “When Security Community Meets Balance of Power: Overlapping Regional Mechanisms of Security Governance, ”Review of International Studies,Vol.35,No.S1(February 2009),pp.82-84. From the perspective of security regionalism, Chinese scholar Zheng Xianwu makes a comprehensive study of the major four key complex variables of security community, suggesting that the complex key variables for the evolution of “security complex” into“security community” include material variable (power), interest variable (national interest and predilection), conceptual variable (norms, collective identity, and trust), and institutional variable (organization, mechanism, and convention).Zheng Xianwu,Security,cooperation,and Community,Nanjing:Nanjing University Press,2009,p.91(郑先武:《安全、合作与共同体》,南京:南京大学出版社2009年版,第91页). In addition to the systematic analysis of the key variables for the construction of security community by the aforementioned scholars, some researchers believe that national insecurity“Insecurity originates to a great extent in the existence of power disparity or the use of power with regulation and the change of this situation or people's change of conception of and response to this situation is of vital importance for the formation of security community.” For further information please see Wang Xueyu, “Building Security Community through Regional Integration:a Framework for Analysis, ”European Studies,No.5(2003),p.17(参见王学玉:《通过地区一体化实现安全共同体:一个分析的框架》,载《欧洲研究》2003年第5期,第17页). and non-traditional security threats“In face of threats from non-state actors, especially when non-traditional security becomes prominent, some emerging common threats probably affect the security relationship between two countries which distrust each other. If such nontraditional threats are severe enough to be regarded as more than mutual ones by both countries, it is likely for them to forge an alliance or to establish a security community.” For further information please see Li Kaisheng, “Threats and the Formation of Security Community:Some Revisions of Stephen M.Walter's Theory, ”World Economics and Politics,No.10(2008),p.23 (参见李开盛:《威胁与安全共同体的形成:对沃尔特理论的几点修正》,载《世界经济与政治》2008年第10期,第23页). are vital variables for the conception of security community.

In view of the complexity of security community construction and the diversity of actors, it is fairly difficult to induce a unified construction path and thus more study is needed in this respect. Adler and Barnett generalize the reconstruction of security community as a three-stage pattern: nascent stage, rising stage, and mature stage and each stage corresponds to different tier variable, characteristic, and stage action.Emanuel Adler and Michael Barnett,eds.,Security Communities,translated by Sun Hong,Beijing:World Affairs Press,2015, pp. 41-48 ([以] 伊曼纽尔·阿德勒、[美]迈克尔·巴涅特主编:《安全共同体》,孙红译,北京:世界知识出版社2015年版,第41-48页). Amitav Acharya points out that security community has its “declining stage” as the fourth stage.Amitav Acharya,Constructing a Security Community in Southeast Asia:ASEAN and the Problem of Regional Order, Translated by Wang Zhengyi et al., Shanghai: Shanghai People's Press, 2004, pp. 47-51 ([加]阿米塔夫·阿查亚:《建构安全共同体:东盟与地区秩序》,王正毅等译,上海:上海人民出版社2004年版,第47-51页). Chinese scholar Zheng Xianwu makes a systematic and innovative study of the development process of regional security integration approached from different theoretical perspectives.Zheng Xianwu,Security,Cooperation,and Community,Nanjing:Nanjing University Press,2009,p.69(郑先武:《安全、合作与共同体》,南京:南京大学出版社2009年版,第69页). To summarize, the construction path of security community from the perspective of international relations theory can be seen in Table 2 in detail.

Table 2 Construction Paths of Security Community from Different Theoretical PerspectivesTable 2 is compiled based on Zheng Xianwu's research of “security regionalism” with some additions. In the table, the construction paths of neorealism, Copenhagen School, and neo-regionalism originate in Zheng's study. For further information,please see Zheng Xianwu,Security,Cooperation,and Community,Nanjing:Nanjing University Press,2009, p. 69 (郑先武:《安全、合作与共同体》,南京:南京大学出版社2009年版,第69页). The research path of neoliberalism and constructivism is summarized by the author.

Basically, the cases of regional practice deviated from the aforesaid development process of security community but the exploration of construction paths is enlightening for the study of security community. These different paths provide security actors with ideas for reference and basic norms and feasible models for the construction of security community.

2.2 The Theoretical Construction of the Non-traditional Community

Transboundary cooperation mechanisms addressing non-traditional security threats are emerging and developing in different regions across the world, the theories of“security regionalism”, and “cognitive community” broaden our cognition of “security community” and the actors, referents, subjects and features of “security community”are increasingly non-tradition-oriented. “This objectively entails a theory of 'security community' which is more suited to the reality of regional security integration.”Zheng Xianwu,Security,Cooperation,and Community,Nanjing:Nanjing University Press,2009,p.81(郑先武:《安全、合作与共同体》,南京:南京大学出版社2009年版,第81页). Therefore, the conception of “non-traditional security community” is a theoretical development under practical contexts.

2.2.1 The Definition and Characteristics of the Non-traditional Security Community

Tied by “commonly related elements”, community is an “action collective”, “organic organization” or “responsible unit” established through specific ways, such as various organizations, alliances, groups, communities, integrated cooperative teams and shared network platforms. The non-traditional security community aims to address nontraditional security threats and break through “resource-induced” security dilemmas. Thus, “non-traditional security community” can be defined as a transnational action collective to cope with non-traditional security threats established on the principles of “optimum co-existence” and “shared security”. This “action collective” performs the functions of setting subjects for discussion, allocating resources, balancing power, discussing measures and promoting their implementation. The reason for the proposal of non-traditional security community is to highlight the new perspective of non-traditional security governance rather than abstracting an entirely independent community from a host of security governance mechanisms. The previous transnational security governance mechanism can develop into the non-traditional security community or become an important mechanism of the non-traditional security community.

Non-traditional security threats that need the concerted action of many actors (states) to cope with are nonmilitary, transnational, asymmetrical, universal and complex. All these features are, to some extent, “reflected” on the non-traditional security community. Though the construction of the non-traditional security community is a historical process, the characteristics of the non-traditional security community can be defined as follows.

2.2.1.1 Security referents are “diversified”

Non-traditional security threats cover nearly all areas concerning “human security”(such as economy, culture, society, ecological environment, and public health) except political and military security. The fundamental motive force for the formation of the non-traditional security community is to address non-traditional security threats. Hence, the subjects that the non-traditional security community deals with involve all subjects concerning “human security” barring political and military security.

2.2.1.2 Security problems are “comprehensive”

Non-traditional security is comprehensive security. For this reason, what the non traditional security community deals with is not unitary security but complex or comprehensive security. Take population for example. It involves energy source, resources, environment, society and other areas. Another example is energy security. It concerns energy supply, energy technology, energy consumption, energy system and energy environment, intertwining with population, environment, resources, etc.

2.2.1.3 Security issues are “low political”

Security issues involved in the non-traditional security community shift from “high political arena” related to national sovereignty and state power to “low political arena”concerning human rights and are increasingly connected to people's daily life and their surroundings, making it increasingly difficult for traditionally “high political”institutions to respond flexibly and effectively to new security threats. Worse still, these institutions bring greater negative impact in their response.

2.2.1.4 The ways of security response are “field-oriented”

Non-traditional security is “field security”Yu Xiaofeng,ed.,An Introduction to Non-traditional Security(2nd Edition),Beijing:Peking University Press,2015,p.49(余潇枫主编:《非传统安全概论(第二版)》,北京:北京大学出版社2015年版,第49页). which is “extensive”, “complex”, and“multi-dimensional”. It emphasizes complicated relations of social activities reflected on security problems, featuring the overlapping, complexity, and interweaving of multiple “time-space relations” and many “qualities of activity” concerning security problems. Non-traditional security in different fields is “interconnected”. If nontraditional security problems in a certain field cannot be resolved within directly, the“resource-induced” security quandary can be resolved indirectly by supplying other non-traditional security public products.

2.2.1.5 The subject of security is “multi-tier”

The “field nature” of non-traditional security threats determines the complexity of the content of security preservation. Owing to its own limitations, a unitary government actor is not adequate to address non-traditional security threats in terms of response, result, and facility. The participation of non-government organizations, including social organizations, academic societies, and think tanks, can play a special role in easing the shortage of non-traditional security products and make up the deficiency of traditional systems and mechanisms of the government.

2.2.1.6 Security boundary is “invisible”

Because non-traditional security threats are “asymmetrical”, “uncertain”,“complicated”, and “difficult to control”, their impacts tend to be trans-regional and are hard to predict and determine. All forms of “boundary infiltration” require that the non-traditional security community should be “trans-boundary”, “open”, and“inclusive”. Therefore, such non-traditional security threats as global warming and the breakout of pandemics entail the response of the regional or global non-traditional security community.

2.2.1.7 The system of security preservation is a “network”

The non-traditional security community is a multi-tier and multi-track governance network. In the spirit of “a community of shared future” and with the different areas of non-traditional security as pivots, states, local governments, and non-governmental organizations cooperate with one another through mutual consultation, co-contribution, and benefit sharing, thus establishing good non-traditional security governance systems at sub-regional, regional, interregional, and global levels.

To sum up, the major differences between the traditional security community and the non-traditional security community can be seen in Table 3.

Table 3 Major Differences Between the Traditional Security Community and the Nontraditional Security Community

As a “security community under the context of non-traditional security”, the nontraditional security community “is a regress to community in the original sense of political science and sociology, reflecting the renewal and breakthrough made by man in its understanding and practice about community”.Wang Jiangli,“‘Security Community'Under the Context of Non-traditional Security, ”World Economics and Politics,No.3 (2009), p. 61 (王江丽:《非传统安全语境下的“安全共同体”》,载《世界经济与政治》2009年第3期,第61页). From the contrast, we may find that compared with traditional security communities, non-traditional security communities are not closed or exclusive but open and inclusive. They learn from, consult and share with each other instead of restricting each other and being subject to hegemonic power. Besides, they do not confine themselves to national security but pay attention to world security, social security and human security in addition to national security. Furthermore, non-traditional security communities in which state actors do not play a leading role are large platforms of state and non-state actors for “cooperation and all-win”.

2.2.2 The Type, Motive Factor and Development Stage of the Non-traditional Security Community

The emergence of the non-traditional security community does not result from a few countries' partiality and initiative but from the regionalization and globalization of non-traditional security preservation. As far as the regionalization of non-traditional security preservation is concerned, trans-boundary non-traditional security threats are regionalized, countries are interlinked in security and destiny regionally and many factors (countries) set up regional multi-dimensional and multilateral security mechanisms, which will inevitably bring about the creation of different types of the non-traditional security community.

2.2.2.1 Type

Non-traditional security communities can be divided into three types in terms of actors. They are constructed by state actors, state actors and non-state actors, and non-state actors respectively.

The major characteristic of the first type of the non-traditional security community is that its shared mechanism is powerfully ensured and strongly binding, making it easy to solve thorny problems of traditional security intertwining with non-traditional security. The major feature of the second type of the non-traditional security community is that its shared mechanism is ensured and binding to some extent but it has difficulty making choices among the problems of traditional security overlapping with non-traditional security because of the asymmetric statuses of actors. The major feature of the third type of the non-traditional security community is that its shared mechanism is lacking in powerful insurance and its binding force is weaker than that of the other two types of the non-traditional security community, thus unable to solve the problems of traditional security interweaving with non-traditional security.

In practice, the non-traditional security community, no matter what actors it consists of, should innovate its modes of international cooperation with a view to solving nontraditional security problems.

2.2.2.2 Motive Factor

The major factors for the establishment and development of the non-traditional security community are common threats and destiny, common interests and prediction as well as collective identity and action. The common destiny revealed in the process of threat—cognition—response—order, the interdependence forged in the process of interest—prediction—investment—gain, and the civilizational integration brought about by identity—discourse—culture—expectation deliver the community the prospects and inspiration of “a common future”. If what the early theories of security community emphasize is “interest and value orientation”, the non-traditional security community attaches greater importance to “threat and destiny orientation”. The inevitability of non-traditional security threats and the non-exclusiveness of non-traditional security governance empower non-traditional security cooperation to be the only way of governance and the non-traditional security community to transcend such ascriptive and heterogeneous factors as “history”, “institution”, “faith”, etc. thus achieving peace, cooperation and co-sharing in the real sense of “generic security”.

Of course, people did not have a deep understanding of non-traditional security threats at first and many countries addressed non-traditional security threats in traditional security mentality. As a result, there was tension, confrontation, conflict, strife and even resort to force in interstate relations. Actually, confrontational action cannot resolve the “resource-induced” security dilemma in the end. Instead, confrontation can only lead to the sufferings or losses of two or many parties. Therefore, in the wake of the Cold War, the response to non-traditional security threats between states has undergone the process of confrontation—competition—competitioncooperation—peace-cooperation during which cooperation has been strengthened, collective identity deepened and collective action constantly extended.

2.2.2.3 Development Stage

The transformation of the non-traditional security community from an idea into a reality is a process of interaction between different motive actors at different development stages and the creation and development of the non-traditional security community has its own special path. A single actor is unable to cope with complex nontraditional security threats. The network platform of mutual help established against common non-traditional security threats is the embryo of the non-traditional security community. Within this loose platform, all actors continue strengthening cooperation based on common destiny and interact more frequently and closely. The security benefits produced in the temporary and cooperative response encourage all actors to establish organizations and mechanisms with common expectations for regional security. The system of formal and informal rules is the basis of the institution and the institutionalization of non-traditional security cooperation signals that the non-traditional security community begins to take shape. The joint response of all actors, including states, local governments and social organizations, make it possible for the benefits of the cooperative institution to increase and overspill continuously. This series of spontaneous processes deepen actors' embeddedness in non-traditional security cooperation and this embeddedness “enhances their mutual identity, promoting their sharing of knowledge and value on some problems as well as their identity integration”.Wei Ling,“Norms,Institution and Community—the Framework and Orientation of East Asia Cooperation, ”Foreign Affairs Review,No.2(2010),pp.70-71(魏玲:《规范、制度、共同体—东亚合作的架构与方向》,载《外交评论》2010年第2期,第70-71页). The we-feeling based on collective identity is the core of a mature non-traditional security community in which the identity of actors will be deepened constantly and “resource-induced”security dilemma will be resolved effectively. Table 4 demonstrates the general development stages of the non-traditional security community.

Table 4 The Development Stages of the Non-traditional Security Community

It is a rather long process to construct the non-traditional security community and it is not smooth sailing but is fraught with twists and turns. Different stages may overlap, skip, “turn back”, even discontinue or disintegrate. The discontinuation of cooperation in the non-traditional security community usually results from the security problems within the community. When there are severe traditional security conflicts between states, non-traditional security dilemmas will give way and stop for traditional security problems, and even intentionally aggravate “resource-induced” security dilemmas to safeguard national political and military security.

Whether in theory or in practice, scholars are making further explorations of the non-traditional security community because it is an ideal cooperation state worth pursuing. This article will discuss the modes of cooperation—the network platform of mutual help, organizational mechanism and mature community that emerge at the construction stages of the non-traditional security community under the context of the non-traditional security community.