Is Security (Securitization) Indeed the Face of Everything? | INSS
Select any text and click on the icon to listen!
ByGSpeech
דלג לתוכן הראשי ic_fluent_arrow_enter_24_filled Created with Sketch.
דלג לתפריט ic_fluent_arrow_enter_24_filled Created with Sketch.
דלג לכותרת התחתונה ic_fluent_arrow_enter_24_filled Created with Sketch.
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
      • Iran and the Shi'ite Axis
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Cognitive Warfare
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Newsletter
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
New
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Iran and the Shi'ite Axis
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Cognitive Warfare
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
    • Contemporary Antisemitism in the United States
    • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Real-Time Tracker
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Contact
  • עברית
  • Support Us
bool(false)

Strategic Assessment

Home Strategic Assessment Is Security (Securitization) Indeed the Face of Everything?

svg%3E

Is Security (Securitization) Indeed the Face of Everything?

Book Reviews | June 2024
Kobi Michael
Listen to this content
Plays:-Audio plays count
0:00
-:--
1x
Playback Speed
  • 0.5
  • 0.6
  • 0.7
  • 0.8
  • 0.9
  • 1
  • 1.1
  • 1.2
  • 1.3
  • 1.5
  • 2
Audio Language
  • English
  • French
  • German
  • Italian
  • Russian
  • Spanish
Open text
is security (securitization) indeed the face of everything? book: israel national security and securitization – the role of the united states in defining what counts. by: ori wertman and christian kaunert. publisher: springer. year: 2023. pp: 181. this book by ori wertman and christian kaunert, the scholar and his mentor, adds a further layer to the theoretical foundation of security or securitization. in this context, the book’s contribution is dual in nature. together with a theoretical expansion of the components of the concept, referring to both the definition of extreme means and the types of audience, which can certainly be seen as an innovation, the authors have selected case studies—such as the six-day war—and have applied to them the principles of securitization in their latest and broadest conceptualization. in their selection of essentially military-security case studies, which in any case were perceived as severe security threats, the authors stretch the definitions and the conceptual foundation of securitization to extremes that make the concept, its uniqueness, and its significance superfluous. the conceptual and theoretical development of securitization by the copenhagen school and its successors was intended to provide an analytical tool to explain the way in which leaders seek to legitimize the use of extraordinary and extreme measures in order to deal with problems that are civilian by nature. the theoretical foundation provides the explanation through the idea of security argumentation and the conceptualization of an essentially civilian problem, by means of the same argumentation, as a severe and even existential security threat (for example, problems of migration, crime, and so forth). given the existence of a serious or existential threat, it is essential to adopt extraordinary and extreme measures, including those that affect individual rights. if, as the authors propose, security threats, which in any case are conceived through security argumentation, can also undergo securitization, the unique contribution of the concept with reference to essentially civilian problems becomes superfluous. in my opinion, there is a logical failure in the very idea of securitizing a security problem, unless this controversial claim of theirs is the foundation for theoretical disputes that can sharpen and improve the existing theoretical foundation, and in this sense “a sword’s blade can only be sharpened against another one.”. the book is divided into seven central chapters, and the main points are covered in a long and detailed preface that gives a very clear presentation of the claims and innovations in the book. the first chapter presents the literature on the subject of securitization, referring to prominent milestones in the development of the theory and the most prominent scholars in this field, and with a partly critical discussion of the issues regarding the audience, the player, and the means of conveying the message from the player to the audience. in the second chapter, the authors present the broader contribution to the conceptual foundation of the audience in the theory of securitization, which they seek to establish by means of four case studies later in the book. in this chapter, by critically engaging with the existing literature, they present two new concepts: the legal audience, which according to the laws of the state is the element that is authorized to approve the actions of securitization, and the political audience, whose support or lack of opposition is deemed essential for the implementation of these actions. in the following four chapters (3–6), the authors present four case studies dealing with various security threats that the state of israel has been forced to address (chapter 3—the six-day war; chapter 4—the oslo accords 1993–1995; chapter 5—operation defensive shield; chapter 6—operation outside the box—the bombing of the syrian nuclear reactor in deir ez-zor, 2007). for each of these cases, the authors refer to relations between the political and military echelons, and between the government of israel and the us administration. they have chosen case studies in which the american administration had an important role in one way or another, because in each case they refer to the american administration as a type of audience, to which they apply their innovative conceptual development. in the final chapter of the book, the authors sharpen their theoretical innovation, which they have established through the four case studies. they define the book’s contribution to the existing literature, in the field of both international relations and israeli studies, with an emphasis on american involvement and its impact on israel, as well as indicating possible directions for further research. as stated, the book’s main contribution is the first and unique reference, as far as i know, to the political-treaty process (the oslo process) as an expression of an extreme measure, essentially involving the recognition of the plo, which until then was legally banned in israel, and the political agreement with it, basically amounting to separation from the palestinians. prime minister yitzhak rabin (the player), as an epistemic authority, sought to enlist public and political legitimacy for implementing the agreement, perceived by the israeli public as an extreme and surprising move, through securitization of the danger of a binational state, which he conceptualized and presented as an existential threat to the state of israel, requiring and justifying the use of what was an extreme measure for the time and circumstances. to this significant innovation, the authors have added their expanded and updated conceptualization of the audience in the securitization equation, in which three components are recognized: the player, the audience, and the message. apart from the typology of two types of audience (legal and political), the authors stress the role of the audience and its necessity for the sake of the legitimacy and success of the securitization process (p. xiii). in their reference to the issue of extended audiences, the authors refer to the existing literature while broadening their conceptual reach by clarifying or stressing the subjective dimension of how the threat is perceived. their emphasis on the subjective dimension is also presented as a critique of what they define as the consensus over the objective dimension of threats. the authors are certainly persuasive with regard to the subjective dimension, but i am not convinced that treating the objective dimension as an existing consensus in the study of securitization is indeed valid. in their comprehensive preface, the authors emphasize the book’s unique contribution, as the first broad treatment of the securitization of israel’s terror threats and security threats, and because of their integrated approach that combines the worlds of international relations, the middle east, political psychology, and sociology (p. xiv). without detracting from the book’s contribution, the authors appear to have somewhat overstepped the mark with their stress on integrating a range of fields of knowledge. there is a difference between the use of concepts from the various disciplines and their theoretical integration. for example, their statement that “the book bridges the gap between accepted approaches to the security of the middle east and synthesizes them with a perception and erroneous perception in international relations” (p. xiv) sounds rather pretentious. the methodology chosen by the authors is a comparative analysis of case studies, with each case study chosen according to three main criteria: each case study presents a different type of security threat; each case study describes a successful process of securitization; and for each case study, sufficient sources are available, taking into account the restrictions of israeli security censorship. the three criteria were intended to ensure a sufficiently broad canvas for an analysis of the cases based on the updated and extended conceptualizations introduced by the authors and to validate them. the authors have relied on primary and secondary sources and based their work on personal interviews with a long and impressive list of israeli decision-makers from the political and security-military echelons. in this context, it is worth stressing the methodological limitation of personal interviews, especially when the subject of the interview refers to events that happened many years ago and the interviewees may have a tendency to change their versions or adapt them to the zeitgeist. for example, this applies to the interviews with ehud olmert on the annapolis process that took place in 2010–2012, compared to interviews in later years in which he presented some of the events in a different manner. as stated, the case of the oslo accords—unlike the six-day war, operation defensive shield, and the bombing of the syrian nuclear reactor, which in my opinion were essentially security-military events to which the logic of securitization does not really apply—is an important innovation. here a political move is referenced as securitization. the political move is the extreme measure that was taken and for the purpose of legitimizing its implementation, securitization was activated, hence the security argumentation. the authors’ innovative reference to the audience and its typology—political and legal audiences—is persuasive and has added an important analytical tool to the analysis and understanding of securitization processes. here the authors unintentionally point to an additional dimension that is worthy of further theoretical development and linked to the audiences. this additional dimension is the aspect of duality, as expressed in cases where the legal audience can at some stage become a political audience, and vice versa, or where a specific audience may be simultaneously both legal and political. for example, this could apply to the israeli government in the case of the oslo process when yitzhak rabin, as prime minister, had to persuade the government as the political audience of the necessity of the move and obtain their consent, to legitimize it. another duality may be expressed when a political or legal audience becomes a player. for example, the israeli government starts as the legal and political audience, which after legitimizing a securitization move, becomes a player facing another audience, such as the american administration (p. 19). this duality adds complexity that requires further theoretical development. in summary, the book is focused, readable, and correctly structured, although it would be a good idea to tighten the links between the chapters, which seem to have been written as independent articles, in order to avoid repetition. it is important to be scrupulous with historical comparisons and define the significance of the context in each comparison. for example, there is the problematic comparison between two prime ministers, ehud barak and arik sharon (p. 155). it may be assumed that if prime minister barak were operating in the context in which prime minister sharon operated, he would not have acted differently from sharon, and not in the way attributed to him in that comparison. the book contains a dimension of theoretical innovation, partly controversial in my opinion, and worthy of further discussion, and it certainly makes an important contribution to the existing literature on securitization, with reference to cultural and political differences between countries, and its emphasis on the subjective dimension in the perception of threats (p. 154). this adds another interesting angle to the discussion, analysis, and understanding of the way in which israel has tackled security threats and the place of the united states in these contexts.
Download audioDownloaded:0
Open context player
Close context player
is security (securitization) indeed the face of everything? book: israel national security and securitization – the role of the united states in defining what counts. by: ori wertman and christian kaunert. publisher: springer. year: 2023. pp: 181. this book by ori wertman and christian kaunert, the scholar and his mentor, adds a further layer to the theoretical foundation of security or securitization. in this context, the book’s contribution is dual in nature. together with a theoretical expansion of the components of the concept, referring to both the definition of extreme means and the types of audience, which can certainly be seen as an innovation, the authors have selected case studies—such as the six-day war—and have applied to them the principles of securitization in their latest and broadest conceptualization. in their selection of essentially military-security case studies, which in any case were perceived as severe security threats, the authors stretch the definitions and the conceptual foundation of securitization to extremes that make the concept, its uniqueness, and its significance superfluous. the conceptual and theoretical development of securitization by the copenhagen school and its successors was intended to provide an analytical tool to explain the way in which leaders seek to legitimize the use of extraordinary and extreme measures in order to deal with problems that are civilian by nature. the theoretical foundation provides the explanation through the idea of security argumentation and the conceptualization of an essentially civilian problem, by means of the same argumentation, as a severe and even existential security threat (for example, problems of migration, crime, and so forth). given the existence of a serious or existential threat, it is essential to adopt extraordinary and extreme measures, including those that affect individual rights. if, as the authors propose, security threats, which in any case are conceived through security argumentation, can also undergo securitization, the unique contribution of the concept with reference to essentially civilian problems becomes superfluous. in my opinion, there is a logical failure in the very idea of securitizing a security problem, unless this controversial claim of theirs is the foundation for theoretical disputes that can sharpen and improve the existing theoretical foundation, and in this sense “a sword’s blade can only be sharpened against another one.”. the book is divided into seven central chapters, and the main points are covered in a long and detailed preface that gives a very clear presentation of the claims and innovations in the book. the first chapter presents the literature on the subject of securitization, referring to prominent milestones in the development of the theory and the most prominent scholars in this field, and with a partly critical discussion of the issues regarding the audience, the player, and the means of conveying the message from the player to the audience. in the second chapter, the authors present the broader contribution to the conceptual foundation of the audience in the theory of securitization, which they seek to establish by means of four case studies later in the book. in this chapter, by critically engaging with the existing literature, they present two new concepts: the legal audience, which according to the laws of the state is the element that is authorized to approve the actions of securitization, and the political audience, whose support or lack of opposition is deemed essential for the implementation of these actions. in the following four chapters (3–6), the authors present four case studies dealing with various security threats that the state of israel has been forced to address (chapter 3—the six-day war; chapter 4—the oslo accords 1993–1995; chapter 5—operation defensive shield; chapter 6—operation outside the box—the bombing of the syrian nuclear reactor in deir ez-zor, 2007). for each of these cases, the authors refer to relations between the political and military echelons, and between the government of israel and the us administration. they have chosen case studies in which the american administration had an important role in one way or another, because in each case they refer to the american administration as a type of audience, to which they apply their innovative conceptual development. in the final chapter of the book, the authors sharpen their theoretical innovation, which they have established through the four case studies. they define the book’s contribution to the existing literature, in the field of both international relations and israeli studies, with an emphasis on american involvement and its impact on israel, as well as indicating possible directions for further research. as stated, the book’s main contribution is the first and unique reference, as far as i know, to the political-treaty process (the oslo process) as an expression of an extreme measure, essentially involving the recognition of the plo, which until then was legally banned in israel, and the political agreement with it, basically amounting to separation from the palestinians. prime minister yitzhak rabin (the player), as an epistemic authority, sought to enlist public and political legitimacy for implementing the agreement, perceived by the israeli public as an extreme and surprising move, through securitization of the danger of a binational state, which he conceptualized and presented as an existential threat to the state of israel, requiring and justifying the use of what was an extreme measure for the time and circumstances. to this significant innovation, the authors have added their expanded and updated conceptualization of the audience in the securitization equation, in which three components are recognized: the player, the audience, and the message. apart from the typology of two types of audience (legal and political), the authors stress the role of the audience and its necessity for the sake of the legitimacy and success of the securitization process (p. xiii). in their reference to the issue of extended audiences, the authors refer to the existing literature while broadening their conceptual reach by clarifying or stressing the subjective dimension of how the threat is perceived. their emphasis on the subjective dimension is also presented as a critique of what they define as the consensus over the objective dimension of threats. the authors are certainly persuasive with regard to the subjective dimension, but i am not convinced that treating the objective dimension as an existing consensus in the study of securitization is indeed valid. in their comprehensive preface, the authors emphasize the book’s unique contribution, as the first broad treatment of the securitization of israel’s terror threats and security threats, and because of their integrated approach that combines the worlds of international relations, the middle east, political psychology, and sociology (p. xiv). without detracting from the book’s contribution, the authors appear to have somewhat overstepped the mark with their stress on integrating a range of fields of knowledge. there is a difference between the use of concepts from the various disciplines and their theoretical integration. for example, their statement that “the book bridges the gap between accepted approaches to the security of the middle east and synthesizes them with a perception and erroneous perception in international relations” (p. xiv) sounds rather pretentious. the methodology chosen by the authors is a comparative analysis of case studies, with each case study chosen according to three main criteria: each case study presents a different type of security threat; each case study describes a successful process of securitization; and for each case study, sufficient sources are available, taking into account the restrictions of israeli security censorship. the three criteria were intended to ensure a sufficiently broad canvas for an analysis of the cases based on the updated and extended conceptualizations introduced by the authors and to validate them. the authors have relied on primary and secondary sources and based their work on personal interviews with a long and impressive list of israeli decision-makers from the political and security-military echelons. in this context, it is worth stressing the methodological limitation of personal interviews, especially when the subject of the interview refers to events that happened many years ago and the interviewees may have a tendency to change their versions or adapt them to the zeitgeist. for example, this applies to the interviews with ehud olmert on the annapolis process that took place in 2010–2012, compared to interviews in later years in which he presented some of the events in a different manner. as stated, the case of the oslo accords—unlike the six-day war, operation defensive shield, and the bombing of the syrian nuclear reactor, which in my opinion were essentially security-military events to which the logic of securitization does not really apply—is an important innovation. here a political move is referenced as securitization. the political move is the extreme measure that was taken and for the purpose of legitimizing its implementation, securitization was activated, hence the security argumentation. the authors’ innovative reference to the audience and its typology—political and legal audiences—is persuasive and has added an important analytical tool to the analysis and understanding of securitization processes. here the authors unintentionally point to an additional dimension that is worthy of further theoretical development and linked to the audiences. this additional dimension is the aspect of duality, as expressed in cases where the legal audience can at some stage become a political audience, and vice versa, or where a specific audience may be simultaneously both legal and political. for example, this could apply to the israeli government in the case of the oslo process when yitzhak rabin, as prime minister, had to persuade the government as the political audience of the necessity of the move and obtain their consent, to legitimize it. another duality may be expressed when a political or legal audience becomes a player. for example, the israeli government starts as the legal and political audience, which after legitimizing a securitization move, becomes a player facing another audience, such as the american administration (p. 19). this duality adds complexity that requires further theoretical development. in summary, the book is focused, readable, and correctly structured, although it would be a good idea to tighten the links between the chapters, which seem to have been written as independent articles, in order to avoid repetition. it is important to be scrupulous with historical comparisons and define the significance of the context in each comparison. for example, there is the problematic comparison between two prime ministers, ehud barak and arik sharon (p. 155). it may be assumed that if prime minister barak were operating in the context in which prime minister sharon operated, he would not have acted differently from sharon, and not in the way attributed to him in that comparison. the book contains a dimension of theoretical innovation, partly controversial in my opinion, and worthy of further discussion, and it certainly makes an important contribution to the existing literature on securitization, with reference to cultural and political differences between countries, and its emphasis on the subjective dimension in the perception of threats (p. 154). this adds another interesting angle to the discussion, analysis, and understanding of the way in which israel has tackled security threats and the place of the united states in these contexts.
svg%3E
  • Book: Israel National Security and Securitization – The Role of the United States in Defining What Counts
  • By: Ori Wertman and Christian Kaunert
  • Publisher: Springer
  • Year: 2023
  • pp: 181

This book by Ori Wertman and Christian Kaunert, the scholar and his mentor, adds a further layer to the theoretical foundation of security or securitization. In this context, the book’s contribution is dual in nature. Together with a theoretical expansion of the components of the concept, referring to both the definition of extreme means and the types of audience, which can certainly be seen as an innovation, the authors have selected case studies—such as the Six-Day War—and have applied to them the principles of securitization in their latest and broadest conceptualization.

In their selection of essentially military-security case studies, which in any case were perceived as severe security threats, the authors stretch the definitions and the conceptual foundation of securitization to extremes that make the concept, its uniqueness, and its significance superfluous. The conceptual and theoretical development of securitization by the Copenhagen School and its successors was intended to provide an analytical tool to explain the way in which leaders seek to legitimize the use of extraordinary and extreme measures in order to deal with problems that are civilian by nature. The theoretical foundation provides the explanation through the idea of security argumentation and the conceptualization of an essentially civilian problem, by means of the same argumentation, as a severe and even existential security threat (for example, problems of migration, crime, and so forth). Given the existence of a serious or existential threat, it is essential to adopt extraordinary and extreme measures, including those that affect individual rights. If, as the authors propose, security threats, which in any case are conceived through security argumentation, can also undergo securitization, the unique contribution of the concept with reference to essentially civilian problems becomes superfluous. In my opinion, there is a logical failure in the very idea of securitizing a security problem, unless this controversial claim of theirs is the foundation for theoretical disputes that can sharpen and improve the existing theoretical foundation, and in this sense “a sword’s blade can only be sharpened against another one.”

The book is divided into seven central chapters, and the main points are covered in a long and detailed preface that gives a very clear presentation of the claims and innovations in the book. The first chapter presents the literature on the subject of securitization, referring to prominent milestones in the development of the theory and the most prominent scholars in this field, and with a partly critical discussion of the issues regarding the audience, the player, and the means of conveying the message from the player to the audience.

In the second chapter, the authors present the broader contribution to the conceptual foundation of the audience in the theory of securitization, which they seek to establish by means of four case studies later in the book. In this chapter, by critically engaging with the existing literature, they present two new concepts: the legal audience, which according to the laws of the state is the element that is authorized to approve the actions of securitization, and the political audience, whose support or lack of opposition is deemed essential for the implementation of these actions.

In the following four chapters (3–6), the authors present four case studies dealing with various security threats that the State of Israel has been forced to address (chapter 3—the Six-Day War; chapter 4—the Oslo Accords 1993–1995; chapter 5—Operation Defensive Shield; chapter 6—Operation Outside the Box—the bombing of the Syrian nuclear reactor in Deir ez-Zor, 2007). For each of these cases, the authors refer to relations between the political and military echelons, and between the government of Israel and the US administration. They have chosen case studies in which the American administration had an important role in one way or another, because in each case they refer to the American administration as a type of audience, to which they apply their innovative conceptual development.

In the final chapter of the book, the authors sharpen their theoretical innovation, which they have established through the four case studies. They define the book’s contribution to the existing literature, in the field of both international relations and Israeli studies, with an emphasis on American involvement and its impact on Israel, as well as indicating possible directions for further research.

As stated, the book’s main contribution is the first and unique reference, as far as I know, to the political-treaty process (the Oslo Process) as an expression of an extreme measure, essentially involving the recognition of the PLO, which until then was legally banned in Israel, and the political agreement with it, basically amounting to separation from the Palestinians. Prime Minister Yitzhak Rabin (the player), as an epistemic authority, sought to enlist public and political legitimacy for implementing the agreement, perceived by the Israeli public as an extreme and surprising move, through securitization of the danger of a binational state, which he conceptualized and presented as an existential threat to the State of Israel, requiring and justifying the use of what was an extreme measure for the time and circumstances.

To this significant innovation, the authors have added their expanded and updated conceptualization of the audience in the securitization equation, in which three components are recognized: the player, the audience, and the message. Apart from the typology of two types of audience (legal and political), the authors stress the role of the audience and its necessity for the sake of the legitimacy and success of the securitization process (p. xiii). In their reference to the issue of extended audiences, the authors refer to the existing literature while broadening their conceptual reach by clarifying or stressing the subjective dimension of how the threat is perceived. Their emphasis on the subjective dimension is also presented as a critique of what they define as the consensus over the objective dimension of threats. The authors are certainly persuasive with regard to the subjective dimension, but I am not convinced that treating the objective dimension as an existing consensus in the study of securitization is indeed valid.

In their comprehensive preface, the authors emphasize the book’s unique contribution, as the first broad treatment of the securitization of Israel’s terror threats and security threats, and because of their integrated approach that combines the worlds of international relations, the Middle East, political psychology, and sociology (p. xiv). Without detracting from the book’s contribution, the authors appear to have somewhat overstepped the mark with their stress on integrating a range of fields of knowledge. There is a difference between the use of concepts from the various disciplines and their theoretical integration. For example, their statement that “the book bridges the gap between accepted approaches to the security of the Middle East and synthesizes them with a perception and erroneous perception in international relations” (p. xiv) sounds rather pretentious.

The methodology chosen by the authors is a comparative analysis of case studies, with each case study chosen according to three main criteria: Each case study presents a different type of security threat; each case study describes a successful process of securitization; and for each case study, sufficient sources are available, taking into account the restrictions of Israeli security censorship. The three criteria were intended to ensure a sufficiently broad canvas for an analysis of the cases based on the updated and extended conceptualizations introduced by the authors and to validate them. The authors have relied on primary and secondary sources and based their work on personal interviews with a long and impressive list of Israeli decision-makers from the political and security-military echelons. In this context, it is worth stressing the methodological limitation of personal interviews, especially when the subject of the interview refers to events that happened many years ago and the interviewees may have a tendency to change their versions or adapt them to the zeitgeist. For example, this applies to the interviews with Ehud Olmert on the Annapolis process that took place in 2010–2012, compared to interviews in later years in which he presented some of the events in a different manner.

As stated, the case of the Oslo Accords—unlike the Six-Day War, Operation Defensive Shield, and the bombing of the Syrian nuclear reactor, which in my opinion were essentially security-military events to which the logic of securitization does not really apply—is an important innovation. Here a political move is referenced as securitization. The political move is the extreme measure that was taken and for the purpose of legitimizing its implementation, securitization was activated, hence the security argumentation.

The authors’ innovative reference to the audience and its typology—political and legal audiences—is persuasive and has added an important analytical tool to the analysis and understanding of securitization processes. Here the authors unintentionally point to an additional dimension that is worthy of further theoretical development and linked to the audiences. This additional dimension is the aspect of duality, as expressed in cases where the legal audience can at some stage become a political audience, and vice versa, or where a specific audience may be simultaneously both legal and political. For example, this could apply to the Israeli government in the case of the Oslo process when Yitzhak Rabin, as prime minister, had to persuade the government as the political audience of the necessity of the move and obtain their consent, to legitimize it. Another duality may be expressed when a political or legal audience becomes a player. For example, the Israeli government starts as the legal and political audience, which after legitimizing a securitization move, becomes a player facing another audience, such as the American administration (p. 19). This duality adds complexity that requires further theoretical development.

In summary, the book is focused, readable, and correctly structured, although it would be a good idea to tighten the links between the chapters, which seem to have been written as independent articles, in order to avoid repetition. It is important to be scrupulous with historical comparisons and define the significance of the context in each comparison. For example, there is the problematic comparison between two prime ministers, Ehud Barak and Arik Sharon (p. 155). It may be assumed that if Prime Minister Barak were operating in the context in which Prime Minister Sharon operated, he would not have acted differently from Sharon, and not in the way attributed to him in that comparison. The book contains a dimension of theoretical innovation, partly controversial in my opinion, and worthy of further discussion, and it certainly makes an important contribution to the existing literature on securitization, with reference to cultural and political differences between countries, and its emphasis on the subjective dimension in the perception of threats (p. 154). This adds another interesting angle to the discussion, analysis, and understanding of the way in which Israel has tackled security threats and the place of the United States in these contexts.

The opinions expressed in INSS publications are the authors’ alone.
Publication Series Book Reviews

Events

All events
The 18th Annual International Conference
25 February, 2025
08:15 - 16:00
svg%3E svg%3E svg%3E svg%3E svg%3E svg%3E svg%3E

Related Publications

All publications
Achieving the War’s Objectives and Improving Israel’s Long-Term Security: Recommended Policy for Ending the War with a Victory
This policy paper outlines the recommended strategy for ending the war in the Gaza Strip while fully achieving its objectives and improving Israel’s long-term strategic posture. The majority of the principles and proposed course of action presented in this document align with the Egyptian–Arab proposal for ending the war, which was presented in April 2025 and has not been discussed by the Israeli government. It is proposed that the principles of this plan serve as a basis for negotiations  As part of these negotiations, the following demands should be added: the disarmament of Hamas and the assurance that it will not be able to rebuild its military capabilities. Most importantly, steps must be taken to prevent the integration of Hamas into any future Palestinian governing framework.
09/06/25
Shutterstock
The “Cavalry Army” Becomes the “Hi-Tech Army”
The war that erupted on October 7, 2023, clearly demonstrated that the “cavalry army” is becoming an essential and central part of the “high-tech army”
05/06/25
Shutterstock
Israel–United States: From “Special Relations” to Just “Relations”?
When it comes to US–Israel relations, is it a case of “what was is what will be”? The significant erosion of the key pillars of this relationship does not bode well
05/06/25

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Iran and the Shi'ite Axis
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Cognitive Warfare
      • Economics and National Secutiry
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat A Realcommerce company.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Listen to this content
is security (securitization) indeed the face of everything? book: israel national security and securitization – the role of the united states in defining what counts. by: ori wertman and christian kaunert. publisher: springer. year: 2023. pp: 181. this book by ori wertman and christian kaunert, the scholar and his mentor, adds a further layer to the theoretical foundation of security or securitization. in this context, the book’s contribution is dual in nature. together with a theoretical expansion of the components of the concept, referring to both the definition of extreme means and the types of audience, which can certainly be seen as an innovation, the authors have selected case studies—such as the six-day war—and have applied to them the principles of securitization in their latest and broadest conceptualization. in their selection of essentially military-security case studies, which in any case were perceived as severe security threats, the authors stretch the definitions and the conceptual foundation of securitization to extremes that make the concept, its uniqueness, and its significance superfluous. the conceptual and theoretical development of securitization by the copenhagen school and its successors was intended to provide an analytical tool to explain the way in which leaders seek to legitimize the use of extraordinary and extreme measures in order to deal with problems that are civilian by nature. the theoretical foundation provides the explanation through the idea of security argumentation and the conceptualization of an essentially civilian problem, by means of the same argumentation, as a severe and even existential security threat (for example, problems of migration, crime, and so forth). given the existence of a serious or existential threat, it is essential to adopt extraordinary and extreme measures, including those that affect individual rights. if, as the authors propose, security threats, which in any case are conceived through security argumentation, can also undergo securitization, the unique contribution of the concept with reference to essentially civilian problems becomes superfluous. in my opinion, there is a logical failure in the very idea of securitizing a security problem, unless this controversial claim of theirs is the foundation for theoretical disputes that can sharpen and improve the existing theoretical foundation, and in this sense “a sword’s blade can only be sharpened against another one.”. the book is divided into seven central chapters, and the main points are covered in a long and detailed preface that gives a very clear presentation of the claims and innovations in the book. the first chapter presents the literature on the subject of securitization, referring to prominent milestones in the development of the theory and the most prominent scholars in this field, and with a partly critical discussion of the issues regarding the audience, the player, and the means of conveying the message from the player to the audience. in the second chapter, the authors present the broader contribution to the conceptual foundation of the audience in the theory of securitization, which they seek to establish by means of four case studies later in the book. in this chapter, by critically engaging with the existing literature, they present two new concepts: the legal audience, which according to the laws of the state is the element that is authorized to approve the actions of securitization, and the political audience, whose support or lack of opposition is deemed essential for the implementation of these actions. in the following four chapters (3–6), the authors present four case studies dealing with various security threats that the state of israel has been forced to address (chapter 3—the six-day war; chapter 4—the oslo accords 1993–1995; chapter 5—operation defensive shield; chapter 6—operation outside the box—the bombing of the syrian nuclear reactor in deir ez-zor, 2007). for each of these cases, the authors refer to relations between the political and military echelons, and between the government of israel and the us administration. they have chosen case studies in which the american administration had an important role in one way or another, because in each case they refer to the american administration as a type of audience, to which they apply their innovative conceptual development. in the final chapter of the book, the authors sharpen their theoretical innovation, which they have established through the four case studies. they define the book’s contribution to the existing literature, in the field of both international relations and israeli studies, with an emphasis on american involvement and its impact on israel, as well as indicating possible directions for further research. as stated, the book’s main contribution is the first and unique reference, as far as i know, to the political-treaty process (the oslo process) as an expression of an extreme measure, essentially involving the recognition of the plo, which until then was legally banned in israel, and the political agreement with it, basically amounting to separation from the palestinians. prime minister yitzhak rabin (the player), as an epistemic authority, sought to enlist public and political legitimacy for implementing the agreement, perceived by the israeli public as an extreme and surprising move, through securitization of the danger of a binational state, which he conceptualized and presented as an existential threat to the state of israel, requiring and justifying the use of what was an extreme measure for the time and circumstances. to this significant innovation, the authors have added their expanded and updated conceptualization of the audience in the securitization equation, in which three components are recognized: the player, the audience, and the message. apart from the typology of two types of audience (legal and political), the authors stress the role of the audience and its necessity for the sake of the legitimacy and success of the securitization process (p. xiii). in their reference to the issue of extended audiences, the authors refer to the existing literature while broadening their conceptual reach by clarifying or stressing the subjective dimension of how the threat is perceived. their emphasis on the subjective dimension is also presented as a critique of what they define as the consensus over the objective dimension of threats. the authors are certainly persuasive with regard to the subjective dimension, but i am not convinced that treating the objective dimension as an existing consensus in the study of securitization is indeed valid. in their comprehensive preface, the authors emphasize the book’s unique contribution, as the first broad treatment of the securitization of israel’s terror threats and security threats, and because of their integrated approach that combines the worlds of international relations, the middle east, political psychology, and sociology (p. xiv). without detracting from the book’s contribution, the authors appear to have somewhat overstepped the mark with their stress on integrating a range of fields of knowledge. there is a difference between the use of concepts from the various disciplines and their theoretical integration. for example, their statement that “the book bridges the gap between accepted approaches to the security of the middle east and synthesizes them with a perception and erroneous perception in international relations” (p. xiv) sounds rather pretentious. the methodology chosen by the authors is a comparative analysis of case studies, with each case study chosen according to three main criteria: each case study presents a different type of security threat; each case study describes a successful process of securitization; and for each case study, sufficient sources are available, taking into account the restrictions of israeli security censorship. the three criteria were intended to ensure a sufficiently broad canvas for an analysis of the cases based on the updated and extended conceptualizations introduced by the authors and to validate them. the authors have relied on primary and secondary sources and based their work on personal interviews with a long and impressive list of israeli decision-makers from the political and security-military echelons. in this context, it is worth stressing the methodological limitation of personal interviews, especially when the subject of the interview refers to events that happened many years ago and the interviewees may have a tendency to change their versions or adapt them to the zeitgeist. for example, this applies to the interviews with ehud olmert on the annapolis process that took place in 2010–2012, compared to interviews in later years in which he presented some of the events in a different manner. as stated, the case of the oslo accords—unlike the six-day war, operation defensive shield, and the bombing of the syrian nuclear reactor, which in my opinion were essentially security-military events to which the logic of securitization does not really apply—is an important innovation. here a political move is referenced as securitization. the political move is the extreme measure that was taken and for the purpose of legitimizing its implementation, securitization was activated, hence the security argumentation. the authors’ innovative reference to the audience and its typology—political and legal audiences—is persuasive and has added an important analytical tool to the analysis and understanding of securitization processes. here the authors unintentionally point to an additional dimension that is worthy of further theoretical development and linked to the audiences. this additional dimension is the aspect of duality, as expressed in cases where the legal audience can at some stage become a political audience, and vice versa, or where a specific audience may be simultaneously both legal and political. for example, this could apply to the israeli government in the case of the oslo process when yitzhak rabin, as prime minister, had to persuade the government as the political audience of the necessity of the move and obtain their consent, to legitimize it. another duality may be expressed when a political or legal audience becomes a player. for example, the israeli government starts as the legal and political audience, which after legitimizing a securitization move, becomes a player facing another audience, such as the american administration (p. 19). this duality adds complexity that requires further theoretical development. in summary, the book is focused, readable, and correctly structured, although it would be a good idea to tighten the links between the chapters, which seem to have been written as independent articles, in order to avoid repetition. it is important to be scrupulous with historical comparisons and define the significance of the context in each comparison. for example, there is the problematic comparison between two prime ministers, ehud barak and arik sharon (p. 155). it may be assumed that if prime minister barak were operating in the context in which prime minister sharon operated, he would not have acted differently from sharon, and not in the way attributed to him in that comparison. the book contains a dimension of theoretical innovation, partly controversial in my opinion, and worthy of further discussion, and it certainly makes an important contribution to the existing literature on securitization, with reference to cultural and political differences between countries, and its emphasis on the subjective dimension in the perception of threats (p. 154). this adds another interesting angle to the discussion, analysis, and understanding of the way in which israel has tackled security threats and the place of the united states in these contexts.
Read content
audio content is empty.
is security (securitization) indeed the face of everything? book: israel national security and securitization – the role of the united states in defining what counts. by: ori wertman and christian kaunert. publisher: springer. year: 2023. pp: 181. this book by ori wertman and christian kaunert, the scholar and his mentor, adds a further layer to the theoretical foundation of security or securitization. in this context, the book’s contribution is dual in nature. together with a theoretical expansion of the components of the concept, referring to both the definition of extreme means and the types of audience, which can certainly be seen as an innovation, the authors have selected case studies—such as the six-day war—and have applied to them the principles of securitization in their latest and broadest conceptualization. in their selection of essentially military-security case studies, which in any case were perceived as severe security threats, the authors stretch the definitions and the conceptual foundation of securitization to extremes that make the concept, its uniqueness, and its significance superfluous. the conceptual and theoretical development of securitization by the copenhagen school and its successors was intended to provide an analytical tool to explain the way in which leaders seek to legitimize the use of extraordinary and extreme measures in order to deal with problems that are civilian by nature. the theoretical foundation provides the explanation through the idea of security argumentation and the conceptualization of an essentially civilian problem, by means of the same argumentation, as a severe and even existential security threat (for example, problems of migration, crime, and so forth). given the existence of a serious or existential threat, it is essential to adopt extraordinary and extreme measures, including those that affect individual rights. if, as the authors propose, security threats, which in any case are conceived through security argumentation, can also undergo securitization, the unique contribution of the concept with reference to essentially civilian problems becomes superfluous. in my opinion, there is a logical failure in the very idea of securitizing a security problem, unless this controversial claim of theirs is the foundation for theoretical disputes that can sharpen and improve the existing theoretical foundation, and in this sense “a sword’s blade can only be sharpened against another one.”. the book is divided into seven central chapters, and the main points are covered in a long and detailed preface that gives a very clear presentation of the claims and innovations in the book. the first chapter presents the literature on the subject of securitization, referring to prominent milestones in the development of the theory and the most prominent scholars in this field, and with a partly critical discussion of the issues regarding the audience, the player, and the means of conveying the message from the player to the audience. in the second chapter, the authors present the broader contribution to the conceptual foundation of the audience in the theory of securitization, which they seek to establish by means of four case studies later in the book. in this chapter, by critically engaging with the existing literature, they present two new concepts: the legal audience, which according to the laws of the state is the element that is authorized to approve the actions of securitization, and the political audience, whose support or lack of opposition is deemed essential for the implementation of these actions. in the following four chapters (3–6), the authors present four case studies dealing with various security threats that the state of israel has been forced to address (chapter 3—the six-day war; chapter 4—the oslo accords 1993–1995; chapter 5—operation defensive shield; chapter 6—operation outside the box—the bombing of the syrian nuclear reactor in deir ez-zor, 2007). for each of these cases, the authors refer to relations between the political and military echelons, and between the government of israel and the us administration. they have chosen case studies in which the american administration had an important role in one way or another, because in each case they refer to the american administration as a type of audience, to which they apply their innovative conceptual development. in the final chapter of the book, the authors sharpen their theoretical innovation, which they have established through the four case studies. they define the book’s contribution to the existing literature, in the field of both international relations and israeli studies, with an emphasis on american involvement and its impact on israel, as well as indicating possible directions for further research. as stated, the book’s main contribution is the first and unique reference, as far as i know, to the political-treaty process (the oslo process) as an expression of an extreme measure, essentially involving the recognition of the plo, which until then was legally banned in israel, and the political agreement with it, basically amounting to separation from the palestinians. prime minister yitzhak rabin (the player), as an epistemic authority, sought to enlist public and political legitimacy for implementing the agreement, perceived by the israeli public as an extreme and surprising move, through securitization of the danger of a binational state, which he conceptualized and presented as an existential threat to the state of israel, requiring and justifying the use of what was an extreme measure for the time and circumstances. to this significant innovation, the authors have added their expanded and updated conceptualization of the audience in the securitization equation, in which three components are recognized: the player, the audience, and the message. apart from the typology of two types of audience (legal and political), the authors stress the role of the audience and its necessity for the sake of the legitimacy and success of the securitization process (p. xiii). in their reference to the issue of extended audiences, the authors refer to the existing literature while broadening their conceptual reach by clarifying or stressing the subjective dimension of how the threat is perceived. their emphasis on the subjective dimension is also presented as a critique of what they define as the consensus over the objective dimension of threats. the authors are certainly persuasive with regard to the subjective dimension, but i am not convinced that treating the objective dimension as an existing consensus in the study of securitization is indeed valid. in their comprehensive preface, the authors emphasize the book’s unique contribution, as the first broad treatment of the securitization of israel’s terror threats and security threats, and because of their integrated approach that combines the worlds of international relations, the middle east, political psychology, and sociology (p. xiv). without detracting from the book’s contribution, the authors appear to have somewhat overstepped the mark with their stress on integrating a range of fields of knowledge. there is a difference between the use of concepts from the various disciplines and their theoretical integration. for example, their statement that “the book bridges the gap between accepted approaches to the security of the middle east and synthesizes them with a perception and erroneous perception in international relations” (p. xiv) sounds rather pretentious. the methodology chosen by the authors is a comparative analysis of case studies, with each case study chosen according to three main criteria: each case study presents a different type of security threat; each case study describes a successful process of securitization; and for each case study, sufficient sources are available, taking into account the restrictions of israeli security censorship. the three criteria were intended to ensure a sufficiently broad canvas for an analysis of the cases based on the updated and extended conceptualizations introduced by the authors and to validate them. the authors have relied on primary and secondary sources and based their work on personal interviews with a long and impressive list of israeli decision-makers from the political and security-military echelons. in this context, it is worth stressing the methodological limitation of personal interviews, especially when the subject of the interview refers to events that happened many years ago and the interviewees may have a tendency to change their versions or adapt them to the zeitgeist. for example, this applies to the interviews with ehud olmert on the annapolis process that took place in 2010–2012, compared to interviews in later years in which he presented some of the events in a different manner. as stated, the case of the oslo accords—unlike the six-day war, operation defensive shield, and the bombing of the syrian nuclear reactor, which in my opinion were essentially security-military events to which the logic of securitization does not really apply—is an important innovation. here a political move is referenced as securitization. the political move is the extreme measure that was taken and for the purpose of legitimizing its implementation, securitization was activated, hence the security argumentation. the authors’ innovative reference to the audience and its typology—political and legal audiences—is persuasive and has added an important analytical tool to the analysis and understanding of securitization processes. here the authors unintentionally point to an additional dimension that is worthy of further theoretical development and linked to the audiences. this additional dimension is the aspect of duality, as expressed in cases where the legal audience can at some stage become a political audience, and vice versa, or where a specific audience may be simultaneously both legal and political. for example, this could apply to the israeli government in the case of the oslo process when yitzhak rabin, as prime minister, had to persuade the government as the political audience of the necessity of the move and obtain their consent, to legitimize it. another duality may be expressed when a political or legal audience becomes a player. for example, the israeli government starts as the legal and political audience, which after legitimizing a securitization move, becomes a player facing another audience, such as the american administration (p. 19). this duality adds complexity that requires further theoretical development. in summary, the book is focused, readable, and correctly structured, although it would be a good idea to tighten the links between the chapters, which seem to have been written as independent articles, in order to avoid repetition. it is important to be scrupulous with historical comparisons and define the significance of the context in each comparison. for example, there is the problematic comparison between two prime ministers, ehud barak and arik sharon (p. 155). it may be assumed that if prime minister barak were operating in the context in which prime minister sharon operated, he would not have acted differently from sharon, and not in the way attributed to him in that comparison. the book contains a dimension of theoretical innovation, partly controversial in my opinion, and worthy of further discussion, and it certainly makes an important contribution to the existing literature on securitization, with reference to cultural and political differences between countries, and its emphasis on the subjective dimension in the perception of threats (p. 154). this adds another interesting angle to the discussion, analysis, and understanding of the way in which israel has tackled security threats and the place of the united states in these contexts.
Close context player
Read content
Options
0:00
-:--
1x
Playback Speed
  • 0.5
  • 0.6
  • 0.7
  • 0.8
  • 0.9
  • 1
  • 1.1
  • 1.2
  • 1.3
  • 1.5
  • 2
Audio Language
  • English
  • French
  • German
  • Italian
  • Russian
  • Spanish
Open text
audio content is empty.
audio content is empty.
Select and listen