12.07.2015 Views

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

the-evolution-of-international-security-studies

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

248 responding to 9/11: a return to national <strong>security</strong>?not as humiliating, torturing or gloating in <strong>the</strong> pain <strong>of</strong> o<strong>the</strong>rs. A similarconcern with women who transgressed traditional feminine constructionsarose with <strong>the</strong> advent and increase in <strong>the</strong> number <strong>of</strong> female suicidebombers, in <strong>the</strong> Palestinian–Israeli conflict, Chechnya, Sri Lanka, Turkeyand Iraq (Alison, 2004; Brunner, 2005; Gonzalez-Perez, 2007; Ness, 2007).Information technology, bio-<strong>security</strong> and riskOne group <strong>of</strong> widening scholars linked <strong>the</strong> politics <strong>of</strong> identity at <strong>the</strong> heart<strong>of</strong> <strong>the</strong> discursive, Constructivist, Feminist and Poststructuralist agendato an explicit concern with technology (Der Derian, 2004: 92; 2005).Technology came into <strong>the</strong> picture through <strong>the</strong> RMA, particularly <strong>the</strong> USuse <strong>of</strong> ‘global surveillance, networked communication, smart weapons,robotic aircraft, real-time simulation, and rapid deployment <strong>of</strong> specialforces’, a form <strong>of</strong> warfare that was ‘low-casualty, long-distance, goodvisuals’ (Der Derian, 2004: 92). O<strong>the</strong>r <strong>studies</strong> examined terrorist use <strong>of</strong>networked technologies, and how <strong>the</strong> Internet became a site for antiwar/peacemovements as well as targeted by government surveillance.The significance <strong>of</strong> cyberspace for critical infrastructures as well as forbuilding communities – including groups fighting totalitarian regimes –predated 9/11 in that <strong>the</strong> Clinton administration had recognised ‘cyber<strong>security</strong>’as an issue in <strong>the</strong> 1990s, but <strong>the</strong> GWoT took this concern to anew, more complex and heightened level (Arquilla and Ronfeldt, 1993,1996, 1997, 2001; C. H. Gray, 1997; Deibert, 2000, 2003; Bendrath, 2003;Der Derian, 2003; Latham, 2003; Nissenbaum, 2005; Hansen and Nissenbaum,forthcoming). What set Poststructuralists and those workingin a critical sociological vein apart from more traditional analyses <strong>of</strong>RMA was a stronger concern with how networked technologies change<strong>the</strong> ways in which non-territorial communities and referent objects canbe constructed.A particular concern was <strong>the</strong> way in which information technologyand securitisations were linked in <strong>the</strong> discourses and practices <strong>of</strong> Westerngovernments. The securitisation <strong>of</strong> ‘terrorism’ at <strong>the</strong> heart <strong>of</strong> <strong>the</strong> GWoTdiscourses worked, argued Critical scholars, to legitimise <strong>the</strong> transgression<strong>of</strong> a host <strong>of</strong> civil and human rights, most noticeably perhaps in <strong>the</strong> treatment<strong>of</strong> prisoners at Guantanamo and in <strong>the</strong> clandestine programmes<strong>of</strong> so-called extraordinary rendition through which suspected terroristswere believed to be transferred to regimes suspected <strong>of</strong> using torture.One group <strong>of</strong> scholars drew upon <strong>the</strong> Classical work on <strong>the</strong> exception byCarl Schmitt, as well as <strong>the</strong> more recent and influential Italian political

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!