Skip to main content

Vom „Söldner“ zum „Samariter“? Die narrativen Grenzen strategischer Imagekonstruktion von privaten Sicherheitsdienstleistern

  • Chapter
  • First Online:
Narrative Formen der Politik

Zusammenfassung

Private Militär- und Sicherheitsfirmen (PMSF) haben einen schlechten Ruf und versuchen diesen mittels narrativer Imagekonstruktion gezielt zu verbessern. Einerseits untersucht der Beitrag diese strategische Imagekonstruktion auf den Webseiten von britischen und US-amerikanischen PMSF und zeigt vier dominante Selbstcharakterisierungen auf: PMSF als technische und militärische Experten, professionelle Geschäftsleute, humanitäre Wohltäter und stolze Patrioten. Andererseits rekonstruiert er, wie die Imagekonstruktionen der PMSF nur sehr begrenzt von den Medien aufgegriffen werden: Medial werden die PMSF vielmehr als unfähige Cowboys, skrupellose Kriegsgewinnler, unkontrollierte Rechtsbrecher und/oder schmutzige Söldner charakterisiert. Der Beitrag erschließt das politikwissenschaftliche Potential der Narrativanalyse, um die Grenzen der strategischen Imagekonstruktion durch Narrative deutlich zu machen.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Wir möchten uns sehr bei Tobias Müller für seine wertvolle Hilfe bei der Fertigstellung dieses Beitrags bedanken.

  2. 2.

    Zu den untersuchten PMSF zählen die britischen Firmen Aegis Defence Services, AKE Group, Armor Group, Assured Risks, Ayr Group, Centurion Risk Assessment Services Ltd., Control Risk Group, Edinburgh International, Erinys International, Global Strategies Group, Gurkha Security Guards, Hart Security Limited, MineTech International, Olive Group, Pilgrim Elite, Saladin Group, Sandline International, TOR International und Track24. Die folgenden US-amerikanischen PMSF wurden analysiert: 3D Global Solutions, Academi (ehemals Blackwater bzw. XE), Aecom, Airscan Inc., AlliedBarton Security Services, American Security Group, Blue Hackle, CACI International Inc., Cubic Defense Applications, DynCorp, EOD Technology, GardaWorld, General Dynamics Information Technology, GlobalEnforce Inc., Global Security Services, Golan Group, Gryphon Group, H3 LLC, HSS-International, ICI of Oregon, KBR, Kroll Inc., L-3 Communications, Military Professional Resources (MPRI), Mission Essential Personnel, MVM Inc., Northrop Grumman, Overseas Security & Strategies, Inc. (OSSI), Pax Mondial, Reed, Ronco, SCG International Risk, Spartan Consulting Group, Special Operations Consulting Security Management Group (SOC-SMG), Steele Foundation und Triple Canopy.

  3. 3.

    Kroll, http://www.kroll.com/about/history/ [15.03.2012].

  4. 4.

    Golan Group, http://www.golangroup.com/company.shtml [17.03.2012].

  5. 5.

    Alle Zitate von Kroll, http://www.kroll.com/about/ [15.03.2012].

  6. 6.

    L-3 Communications, http://www.l-3com.com/about-l-3/message-from-the-ceo.html [18.03.2012].

  7. 7.

    Cubic Corporation, http://www.cubic.com/Solutions [15.03.2012].

  8. 8.

    Northrop Grumman, http://www.northropgrumman.com/capabilities/index.html [15.03.2012].

  9. 9.

    L-3 Communications, http://www.l-3com.com/business-segments/amm.html [18.03.2012].

  10. 10.

    L-3 Communications, http://www.l-3com.com/business-segments/government-services.html [18.03.2012].

  11. 11.

    Cubic Corporation, http://www.cubic.com/About-Us/History [15.03.2012].

  12. 12.

    Kroll, http://www.kroll.com/about/careers/ [15.03.2012].

  13. 13.

    Ebd.

  14. 14.

    Assured Risks Ltd, www.assuredrisks.com/index.php [14.03.2012].

  15. 15.

    Airscan, http://www.airscan.com/about.php [15.03.2012].

  16. 16.

    AEGIS Defence Services, http://www.aegisworld.com/index.php/about-us-2 [14.03.2012].

  17. 17.

    Saladin Security, http://www.saladin-security.com/about-us.php [14.03.2012].

  18. 18.

    Centurion Risk Assessment Services, http://www.centurionsafety.net/About.html [14.03.2012].

  19. 19.

    3D Global Solutions Inc., http://3dglobalsolutions.net.p2.hostingprod.com/ [15.03.2012].

  20. 20.

    Control Risks Group, http://www.controlrisks.com/aboutUs/SitePages/Our%20People.aspx [14.03.2012].

  21. 21.

    Alle Zitate von HSS-International, http://www.hssinternational.com/company.php [15.03.2012].

  22. 22.

    TOR International, http://torinternational.com/about/ [14.03.2012].

  23. 23.

    Centurion Risk Assessment Services, http://www.centurionsafety.net/About.html [14.03.2012].

  24. 24.

    Neptune Maritime Security, http://www.neptunemaritimesecurity.com/Neptune%20Maritime%20Security%20In%20Summary.pdf [15.03.2012].

  25. 25.

    Pilgrims Group, http://www.pilgrimsgroup.com/about.php [18.03.2012].

  26. 26.

    Reed, http://www.reedinc.com/web/page/587/interior.html [15.03.2012].

  27. 27.

    Olive Group, http://www.olivegroup.com/about.htm [14.03.2012].

  28. 28.

    Pilgrims Group, http://www.pilgrimsgroup.com/about.php [18.03.2012].

  29. 29.

    SCG International Risk, http://www.scginternational.com/services.html [15.03.2012].

  30. 30.

    The Washington Post, 11.12.2009, A02.

  31. 31.

    The Washington Post, 24.08.2007, D01.

  32. 32.

    The Washington Post, 16.06.2004, E01.

  33. 33.

    The Daily Telegraph, 04.05.2007, 12.

  34. 34.

    The Washington Post, 08.04.2004, A01.

  35. 35.

    The Washington Post, 28.05.2008, A03.

  36. 36.

    The New York Times, 04.04.2004, 5

  37. 37.

    The Washington Post, 23.05.2010, B06.

  38. 38.

    The Guardian, 21.08.2009, 23.

  39. 39.

    The New York Times, 03.10.2007, 25.

  40. 40.

    The New York Times, 18.08.2010, 10.

  41. 41.

    The New York Times, 21.01.2011, 4.

  42. 42.

    The Guardian, 21.08.2009, 23.

  43. 43.

    The Washington Post, 27.07.2008, B06.

  44. 44.

    The Daily Telegraph, 04.05.2007, p. 12.

  45. 45.

    The Washington Post, 07.10.2007, B01.

  46. 46.

    The New Yoke Times, 11.11.2009, 1.

  47. 47.

    The New York Times, 27.09.2007, 1.

  48. 48.

    The Guardian, 21.08.2009, 23.

  49. 49.

    Beide Zitate aus: The Guardian, 15.05.2004, 4.

  50. 50.

    The Washington Post, 03.10.2007, A18.

  51. 51.

    Alle Zitate aus: The New York Times, 23.09.2007, 1.

  52. 52.

    The Guardian, 15.05.2004, 4.

  53. 53.

    The Daily Telegraph, 10.12. 2004, 36.

  54. 54.

    The Washington Post, 21.12.2008, BW04.

  55. 55.

    The New York Times, 17.11.2006, 16.

  56. 56.

    The Washington Post, 21.12.2008, BW04.

  57. 57.

    Ebd.

  58. 58.

    Reed, http://www.reedinc.com/web/page/554/interior.html [17.03.2012].

  59. 59.

    GardaWorld, http://www.garda-world.com/whatwedo/services/ [15.03.2012].

  60. 60.

    EOD Technology, http://www.eodt.com/AboutUs/ [17.03.2012].

  61. 61.

    GDIT, http://www.gdit.com/about/aboutus.aspx?id=3458 [16.03.2012].

  62. 62.

    KBR, http://www.kbr.com/About/Business-Units/International-Government-Defence-and-Support-Services/ [16.03.2012].

  63. 63.

    Global Security Services, http://globalsecurityservices.com/component/option, com_frontpage/Itemid,1/ [15.03.2012].

  64. 64.

    H3, http://www.grouph3.com/index.php?option=com_content&view=article&id=140&Itemid=262 [15.03.2012].

  65. 65.

    GDIT, http://www.gdit.com/contact_us/contactus.aspx?ekfrm=3460 [15.03.2012].

  66. 66.

    GardaWorld, http://www.garda-world.com/whoweare/about/ [15.03.2012].

  67. 67.

    Beide Zitate von: GDIT, http://www.gdit.com/about/aboutus.aspx?id=2746 [16.03.2012].

  68. 68.

    Reed, http://www.reedinc.com/web/page/554/interior.html [17.03.2012].

  69. 69.

    Alle Zitate aus: The New York Times, 02.04.2004, 19.

  70. 70.

    The Washington Post, 01.12.2008, C01.

  71. 71.

    The Washington Post, 13.10.2007, A01.

  72. 72.

    The New York Times, 03.10.2007, 24.

  73. 73.

    The Guardian, 01.08.2007, 4.

  74. 74.

    The Daily Telegraph, 08.04.2011, 24.

  75. 75.

    The Washington Post, 23.04.2005, A01.

  76. 76.

    The Daily Telegraph, 31.05.2007, 4.

  77. 77.

    The Guardian, 08.03.2011, 25.

  78. 78.

    The Washington Post, 01.07.2004, A01.

  79. 79.

    The Daily Telegraph, 31.05.2007, 4.

  80. 80.

    The Washington Post, 04.11.2006, A12.

  81. 81.

    The Guardian, 01.08.2007, 4.

  82. 82.

    .The Guardian, 30.10.2006, 14.

  83. 83.

    The New York Times, 27.09.2007, 1.

  84. 84.

    The New York Times, 15.06.2004, 23.

  85. 85.

    The Washington Post, 04.11.2006, A12.

  86. 86.

    The Guardian, 21.06.2009, 20.

  87. 87.

    The Guardian, 17.04.2004, 13.

  88. 88.

    The Washington Post, 03.10.2007, A18.

  89. 89.

    The Guardian, 26.06.2004, 22.

  90. 90.

    The Washington Post, 23.04.2005, E01.

  91. 91.

    The New York Times, 15.06.2004, 23.

  92. 92.

    The Daily Telegraph, 04.05.2007, 12.

  93. 93.

    The Guardian, 26.06.2004, 22.

  94. 94.

    The Guardian, 02.04.2007, 5.

  95. 95.

    The Guardian, 26.06.2004, 22.

  96. 96.

    Alle Zitate von MPRI, http://www.mpri.com/web/ [15.03.2012].

  97. 97.

    DynCorp, http://www.dyn-intl.com/index.aspx [17.03.2012].

  98. 98.

    Edinburgh International, http://www.edinburghint.com/about-us/csr/ [14.03.2012].

  99. 99.

    Pax Mondial, http://www.paxmondial.com/ [15.03.2012].

  100. 100.

    DynCorp, http://www.dyn-intl.com/ [17.03.2012].

  101. 101.

    AEGIS Defence Services, http://www.aegisworld.com/index.php/our-approach-ethos-2 [14.03.2012].

  102. 102.

    Edinburgh International, http://www.edinburghint.com/about-us/csr/ [14.03.2012].

  103. 103.

    Hart Security Limited, http://www.hartsecurity.com [14.03.2012].

  104. 104.

    Saladin Security Ltd, http://www.saladin-security.com/corporate-social-responsibility.php [14.03.2012].

  105. 105.

    Hart Security Limited, http://www.hartsecurity.com/aboutus_codeofconduct.asp [14.03.2012].

  106. 106.

    Triple Canopy, http://www.triplecanopy.com/company [15.03.2012].

  107. 107.

    Triple Canopy, http://www.triplecanopy.com/company [15.03.2012].

  108. 108.

    DynCorp, http://www.dyn-intl.com/about-us/values-code-of-conduct.aspx [17.03.2012].

  109. 109.

    Pax Mondial, http://www.paxmondial.com/how-we-operate/ [15.03.2012].

  110. 110.

    Control Risks Group, http://www.controlrisks.com/aboutUs/SitePages/Ethical%20And%20Independent.aspx [14.03.2012].

  111. 111.

    MEP, http://www.missionep.com/company/vision [15.03.2012].

  112. 112.

    Pax Mondial, http://www.paxmondial.com/how-we-operate/ [15.03.2012].

  113. 113.

    DynCorp, http://www.dyn-intl.com/about-us/values-code-of-conduct.aspx [17.03.2012].

  114. 114.

    Control Risks Group, http://www.controlrisks.com/aboutUs/SitePages/Our%20Reputation.aspx [14.03.2012].

  115. 115.

    Centurion Risk Assessment Services, http://www.centurionsafety.net/About.html [14.03.2012].

  116. 116.

    Hart Security Limited, http://www.hartsecurity.com [14.03.2012].

  117. 117.

    Alle Verweise von AYR Group, http://www.ayrgroup.co.uk/ [16.03.2012].

  118. 118.

    TOR International, http://torinternational.com/about/ [18.03.2012].

  119. 119.

    Olive Group, http://www.olivegroup.com/about.htm [14.03.2012].

  120. 120.

    Edinburgh International, http://www.edinburghint.com/about-us/csr/ [14.03.2012].

  121. 121.

    Saladin Security Ltd, http://www.saladin-security.com/corporate-social-responsibility.php [14.03.2012].

  122. 122.

    Cubic Corporation, http://www.cubic.com/About-Us/Corporate-Responsibility [15.03.2012].

  123. 123.

    The Guardian, 02.01. 2010, 6.

  124. 124.

    The Guardian, 17.04.2004, 13.

  125. 125.

    The Washington Post, 21.12.2008, BW04.

  126. 126.

    The New York Times, 03.10.2007, 25.

  127. 127.

    The Washington Post, 21.12.2008, BW04.

  128. 128.

    The Washington Post, 12.10.2007, A01.

  129. 129.

    The Daily Telegraph, 08.04.2011, 24.

  130. 130.

    The Washington Post, 11.12.2009, A02.

  131. 131.

    The Washington Post, 04.11.2006, A12.

  132. 132.

    Beide Zitate aus: The New York Times, 11.11.2009, 1.

  133. 133.

    The Guardian, 15.05.2004, 4.

  134. 134.

    The Washington Post, 04.11.2006, A12.

  135. 135.

    The Guardian, 18.02.2008, 9.

  136. 136.

    The Guardian, 01.08.2007, 4.

  137. 137.

    The New York Times, 28.05.2006, 9.

  138. 138.

    The Washington Post, 12.10.2007, A01.

  139. 139.

    The Washington Post, 24.12.2007.

  140. 140.

    The Guardian, 31.10.2006.

  141. 141.

    CACI International Inc, http://www.caci.com/about/mission_lv.shtml [15.03.2012].

  142. 142.

    Gurkha Security Services, http://www.gurkhasecurityservices.co.uk/index.php?option=com_content&view=article&id=1&Itemid=2 [14.03.2012].

  143. 143.

    L-3 Communications, http://www.l-3com.com/about-l-3 [15.03.2012].

  144. 144.

    Northrop Grumman, http://www.northropgrumman.com/corporate-responsibility/ethics/our-vision-values-and-behaviors.html [15.03.2012].

  145. 145.

    CACI International Inc, http://www.caci.com/about/mission_lv.shtml [15.03.2012].

  146. 146.

    H3, http://www.grouph3.com/ [15.03.2012].

  147. 147.

    Gryphon, http://www.gryphonsecurity.com/index_2.htm [18.03.2012].

  148. 148.

    Beide Zitate von: MVM Inc, http://www.mvminc.com/in-the-community/ [15.03.2012].

  149. 149.

    Northrop Grumman, http://careers.northropgrumman.com/operation_impact.html [15.03.2012].

  150. 150.

    Erik Prince, in: The Washington Post, 03.07.2007, A18.

  151. 151.

    The Daily Telegraph, 04.05.2007, 12.

  152. 152.

    The New York Times, 05.11.2007, 24.

  153. 153.

    The Washington Post, 17.08.2010, A01.

  154. 154.

    Beide Zitate aus: The New York Times, 11.01.2010, 16.

  155. 155.

    The Guardian, 01.08.2007, 4.

  156. 156.

    The Guardian, 17.05.2004.

  157. 157.

    The Daily Telegraph, 08.04.2011, 24.

  158. 158.

    The Washington Post, 09.12.2008, A19.

  159. 159.

    The Washington Post, 21.12.2008, BW04.

  160. 160.

    The New York Times, 28.03.2006, 9.

  161. 161.

    The Guardian, 01.08.2007, 4.

  162. 162.

    The Washington Post, 21.12.2008, BW04.

Literatur

  • Avant, Deborah. 2005. The market for force: The consequences of privatizing security. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Baker, Mona. 2010. Narratives of terrorism and security: Accurate translations, suspicious frames. Critical Studies on Terrorism 3 (3): 347–364.

    Article  Google Scholar 

  • Berndtsson, Joakim. 2012. Security professionals for hire: Exploring the many faces of private security expertise. Millennium 40 (2): 303–320.

    Article  Google Scholar 

  • Chesterman, Simon, Chia Lehnhardt, Hrsg. 2007. From mercenaries to market: The rise and regulation of private military companies. Cambridge: Cambridge Univeristy Press.

    Google Scholar 

  • Deitelhoff, Nicole, und Anna Geis, 2010. Entkernt sich der Leviathan? Die organisatorische und funktionelle Umrüstung der Militär- und Verteidigungspolitik westlicher Demokratien. Leviathan 38 (3): 389–410.

    Article  Google Scholar 

  • Fludernik, Monika. 2009. An introduction to narratology. London: Routledge.

    Google Scholar 

  • Genette, Gérard. 1982. Figures of literary discourse. New York: Columbia Univ. Press.

    Google Scholar 

  • Herman, David. 2009. Narrative Ways of Worldmaking. In Narratology in the age of cross-disciplinary narrative research, Hrsg. Sandra Heinen und Sommer Roy, 71–87. Berlin: De Gruyter.

    Google Scholar 

  • Herman, Luc, und Bart Vervaeck. 2007. Ideology. In The Cambridge companion to narrative, Hrsg. David Herman, 217–230. Cambridge: Cambridge Univ. Press.

    Google Scholar 

  • Herrnstein Smith, Barbara. 1981. Narrative version, and narrative theories. Critical Inquiry 7 (1): 213–236.

    Article  Google Scholar 

  • Higate, Paul. 2012. ‚Cowboys and professionals‘: The politics of identity work in the private and military security company. Millennium 40 (2): 321–341.

    Article  Google Scholar 

  • Joachim, Jutta, und Andrea Schneiker. 2012. New humanitarians? Frame appropriation through private military and security companies. Millennium 40 (2): 365–388.

    Article  Google Scholar 

  • Krahmann, Elke, 2008. Security: Collective good or commodity? In European Journal of International Relations 14 (3): 379–404.

    Google Scholar 

  • Krahmann, Elke. 2010. States, citizens and the privatization of security. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Krahmann, Elke. 2012. From ‚mercenaries‘ to ‚private security contractors‘: The (re)construction of armed security providers in international legal discourses. Millennium 40 (2): 343–363.

    Article  Google Scholar 

  • Kreiswirth, Martin. 2000. Merely telling stories? Narrative and knowledge in the human sciences. Poetics Today 21 (2): 293–318.

    Article  Google Scholar 

  • Kruck, Andreas. 2013. Theorising the use of private military and security companies: A synthetic perspective. Journal of International Relations and Development 17 (1): 112–141.

    Google Scholar 

  • Lakoff, George, und Mark Johnson. 1980. Metaphors we live by. Chicago: University of Chicago Press.

    Google Scholar 

  • Leander, Anna. 2005a. The market for force and public security: The destabilizing consequences of private military companies. In Journal of Peace Research 42 (5): 605–622.

    Google Scholar 

  • Leander, Anna. 2005b. The power to construct international security: On the significance of private military companies. Millennium 33 (3): 803–826.

    Article  Google Scholar 

  • Leander, Anna. 2010. The paradoxical impunity of private military companies: Authority and the limits to legal accountability. Security dialogue 41 (5): 467–490.

    Article  Google Scholar 

  • Patterson, Molly, und Kristen Renwick Monroe. 1998. Narrative in political science. Annual Review of Political Science 1: 315–331.

    Article  Google Scholar 

  • Phelan, James. 2005. Living to tell about it: A rhetoric and ethics of character narration. Ithaca: Cornell University Press.

    Google Scholar 

  • Schneiker, Andrea, und Jutta Joachim. 2012. Private Militär- und Sicherheitsfirmen: Ein Chamäleon der internationalen Politik. Zeitschrift für Friedens- und Konfliktforschung 1 (1): 44–71.

    Google Scholar 

  • Somers, Margaret. 1994. The narrative constitution of identity: A relational and network approach. Theory and Society 23 (5): 605–649.

    Article  Google Scholar 

  • Spencer, Alexander. 2011. Bild Dir Deine Meinung: Die metaphorische Konstruktion des Terrorismus in den Medien. Zeitschrift für Internationale Beziehungen 18 (1): 47–76.

    Article  Google Scholar 

  • Spencer, Alexander. i.E., 2015. Romantic narratives in international relations: Rebels, pirates and heroes. Manchester: Manchester University Press.

    Google Scholar 

  • Toolan, Michael. 2001. Narrative: A critical linguistic introduction. London: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreas Kruck .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Fachmedien Wiesbaden

About this chapter

Cite this chapter

Kruck, A., Spencer, A. (2014). Vom „Söldner“ zum „Samariter“? Die narrativen Grenzen strategischer Imagekonstruktion von privaten Sicherheitsdienstleistern. In: Hofmann, W., Renner, J., Teich, K. (eds) Narrative Formen der Politik. Springer VS, Wiesbaden. https://doi.org/10.1007/978-3-658-02744-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-658-02744-5_9

  • Published:

  • Publisher Name: Springer VS, Wiesbaden

  • Print ISBN: 978-3-658-02743-8

  • Online ISBN: 978-3-658-02744-5

  • eBook Packages: Humanities, Social Science (German Language)

Publish with us

Policies and ethics