12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

discursive <strong>security</strong> 217possible to a much larger extent. Constituting something as a <strong>security</strong>problem might be a problematic or even dangerous strategy in that itgrants privilege to <strong>of</strong>ficial leaders and legitimises <strong>the</strong> suspension <strong>of</strong> civiland liberal rights (see also Deudney, 1990, for a similar point). But, criticsargue, desecuritisation may not be normatively desirable if it merelyillustrates <strong>the</strong> repression <strong>of</strong> an issue (Huysmans, 1998b; Aradau, 2004b,2006; Alker, 2006; Behnke, 2006; Elbe, 2006; Taureck, 2006; Floyd, 2007).It is crucial, <strong>the</strong>refore, that desecuritisation is contextualised and that itis replaced by <strong>the</strong> possibility <strong>of</strong> politicisation, ra<strong>the</strong>r than mere silence.Ano<strong>the</strong>r set <strong>of</strong> articles have responded to <strong>the</strong>se issues by deepening <strong>the</strong>linguistic foundations <strong>of</strong> securitisation <strong>the</strong>ory (Balzacq, 2005; Stritzel,2007; McDonald, 2008; Vuori, 2008), its attention to media and ‘visualsecuritisation’ (Williams, 2003: 527; Möller, 2007; Hansen, forthcoming),or by exploring <strong>the</strong> role <strong>of</strong> ‘violisations’ that take <strong>security</strong> from <strong>the</strong> speechact to acts <strong>of</strong> physical violence (Neumann, 1998).A related critique has come from Bigo (2002: 73) and Huysmans (2006b:5), who argue that <strong>the</strong> conceptualisation <strong>of</strong> securitisation through discourses<strong>of</strong> drama and emergency misses <strong>the</strong> bureaucratic routines and <strong>the</strong>‘effects <strong>of</strong> power that are continuous ra<strong>the</strong>r than exceptional’, for instance<strong>the</strong> concrete everyday practices undertaken by <strong>the</strong> police and groups <strong>of</strong>‘<strong>security</strong> pr<strong>of</strong>essionals’ patrolling <strong>the</strong> border. Drawing on Foucault andBourdieu, Bigo’s conceptualisation <strong>of</strong> <strong>security</strong> is, like <strong>the</strong> CopenhagenSchool’s, discursive, but with more explicit links to Poststructuralismand an emphasis on <strong>the</strong> importance <strong>of</strong> <strong>the</strong> institutionalisation <strong>of</strong> <strong>the</strong>field <strong>of</strong> <strong>security</strong>. Networks <strong>of</strong> surveillance and data-mining help to createa ‘<strong>security</strong> state’ where everybody is under electronic surveillance, andBigo emphasises <strong>the</strong> way in which governments and <strong>the</strong>ir bureaucracieshave managed to gain control over <strong>the</strong> political process at <strong>the</strong> expense <strong>of</strong>parliaments and oppositional political actors (Bigo, 2002).Finally, as noted above, <strong>the</strong> Copenhagen School rests on a Schmittianunderstanding <strong>of</strong> <strong>security</strong> as danger and <strong>the</strong> exceptional character<strong>of</strong> <strong>security</strong> politics (Huysmans, 1998b; Williams, 2003). Since this is aparticular set <strong>of</strong> political and normative assumptions, ra<strong>the</strong>r than objective,empirical facts, this in turn leads <strong>the</strong> Copenhagen School to confronta similar set <strong>of</strong> questions to those which have been asked <strong>of</strong> bothRealism and Poststructuralism: what are <strong>the</strong> implications <strong>of</strong> this conception<strong>of</strong> <strong>security</strong> and state identity? Does <strong>the</strong> state rely upon enemiesto maintain identity/control over its population? How may this logicbe changed, and what would a post-Schmittian <strong>security</strong> scenario looklike?

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!