This volume appears just as the dust begins to settle over a period of rich, productive and stimulating transformation in the field of security studies.1 Since the late 1980s and the receding of the Cold War, a flurry of research and scholarship has nurtured new theoretical positions, generated a treasure trove of new empirical material, and developed new methodologies to unite them. Though there are signs of a levelling-out of this flood of activity, it is unlikely that the evolution of security thinking will diminish. Indeed, much suggests that this vigorous development will continue.
It is therefore a crucial time for stock-taking, a moment to pause and reflect on the newness of this new thinking, its premises and ambitions, its explicit and hidden values, its politics, the continuities and discontinuities with what remains of the Cold War tradition, and the meaning of the apparent transition from the one to the other. It is a milestone where we can ask how the field of security studies has structured itself, how certain methods are naturalized while others remain exotic, how certain theorizations of security crystallize while others resist or wane.
The Routledge Handbook of New Security Studies is in this sense not intended as a survey of the latest and greatest in security studies. A number of admirable books currently play this role, and new and coming books will certainly continue to do so. Instead, this book is meant as a contribution to a self-critique of the field of security studies. It is motivated by the principle that the renewal of the field carries with it as many pitfalls as it does creative or productive moments. Like any developing field, its coherence depends on its self-reflection and self-critique.
This volume does not carry out such a critique but instead aims to provide a certain point of departure for doing so. No case for the novelty of New Security Studies will be made here. This work represents neither a school nor a movement, neither theory nor empirical field. Instead of reviewing the major theoretical positions, empirical fields and methodological schools, the volume is organized along four pragmatic or applied axes of security. Instead of trying to account for the approaches and methods of security studies, it is organized and structured according to a number of variables in the way security is enacted, given meaning through its application.
If the rapid evolution in security theory has today calmed somewhat, some scholars see a kind of regression to a new-militarization of the concept, in large part due to the nature of political responses to the attacks of 11 September 2001 (Fierke 2007: 28â9). The canonical positions of post-Cold War security theory are also well-studied. Most begin with the tried and true distinction between theoretical realism and liberalism, the bulwarks of security thinking through most of the twentieth century, formulated in the works of Morgenthau (1948), Bull (1977) and many others, critiqued and developed into a variety of forms of neo-realism and neo-liberalism by even more (Doyle 1997; Keohane 1986; Mearsheimer 2001; Oye 1986; Waltz 1959).
In the late 1980s and 1990s a sea change passed over security theory in general, provoked by the exhaustion and decline of the Cold War bi-polar security complex. During this period conventional theories of security were widely regarded as inadequate to the task of accounting for a new landscape of security issues and actors and a new set or principles began to emerge (Aggestam and Hyde-Price 2000; Alkire 2003; Baldwin 1995, 1997; Booth 2005; Brown 1997; Buzan 1991a; Dalby 1997, 2000; Buzan 1991b; Derian 1993; Dillon 1996; Huysmans 1998; Kaldor 2000; Lipschutz 1995; Rothschild 1995; Tickner 1995; Ullmann 1983; WĂŚver 1997, 2000; Williams 1994; Wyn Jones 1999). These interventions cover a wide range of concerns, but their uniting theme and interest is a critique of realist and neo-realist perspectives through a radical, linguistically based âconstructivist turnâ in which social theories of security, linguistics and performativity become progressively more important to theoretical approaches. In addition, questions of identity and culture are seen as keys to understanding security and to supporting the translatability of security between social and political settings. This expansion also broadens the remit of security and links to nationalism studies, political philosophy and conflict studies.
Much of this scholarship coalesces around the advent of securitization theory that grew out of a research group at the Copenhagen Peace Research Institute in the 1980s and culminated in a number of influential works by WĂŚver, Buzan and others (Buzan et al. 1990, 1998; Buzan & WĂŚver 2003; WĂŚver et al. 1993). Securitization theory is a self-proclaimed âspeech act theoryâ of security that focuses on the means by which security issues are constructed through language. According to the theory, a given object becomes securitized by virtue of the pronouncement of a securitizing actor, appropriately positioned, permitting it to be shifted from the order of ordinary politics to one kind or another of exceptional politics.
The subjectivization of security through securitization theory has had distinct consequences for the objective side of the security equation. Through applications of this highly subject-oriented theory a number of new objective components of security are revealed. One important consequence of the theory is thus: that it is able to take cognizance of the broader field of security threats. The widening application of securitization theory reveals the process by which new objects of security are constituted. Thus the ânew security objectsâ discussed in this volume, and others again, are indebted to the realization that the security status of any object is a correlate of its situation within a field of political action, authority and democracy.
It is the aim of this volume to intervene in this evolution by giving it one structured presentation among several possible ones. This presentation does not have the ambition of an exhaustive coverage of themes, methods and objects of the field of security studies. Such a project is neither feasible nor useful. Instead, it organizes a selection of material in the form of four types of strategies for understanding and advancing research on the changing landscape of security and insecurity. These types differentiate and focus on (1) new concepts of security, (2) new subjects of security, (3) new objects of security and (4) new security practices.
New security concepts can be understood as ways of coupling ideas or principles of security with the empirical basis that supports them. They refer to the combinatory possibilities for synthesizing subject positions or perspectives from which security and insecurity is lived or operationalized with new empirical objects or areas of study. The chapters in this section focus on challenges of correlation. They seek to understand objects of security by making sense of how they are conceptualized, and how they are linked to those ideas, actors, institutions, etc., that have an interest in how they play out their positions. They deal with the forces of correlation and the antagonisms mobilized by conflicts between idea and world, high politics and fieldwork. This section includes five analyses all of which reflect the challenge of conceptually correlating subject positions and objects of security, perspectives and empirical scope, actors and fields. âCivilizational securityâ (Bowden), âriskâ (Kessler), âsmall armsâ (Krause), âcritical human securityâ (Owen) and âcritical geopoliticsâ (Dalby) all present constellations of security thinking and the surrounding tension between how the empirical world of security is experienced as a heterogeneous challenge to the very principles of that seeing. These chapters, each in their own way, present concepts as unities of the facts they conceptualize and the principles that give them their empirical validity.
New security subjects assemble a range of subjective positions relative to the empirical world of security and insecurity. To evoke the subject of security encompasses not only the perspective of the subject, but its value premises, interests, political valence and its situation in other discourses of security that participate in governing its validity. The collection of new security subjects in this section attempts to account for the changes in subject positions from which security is assessed, asserted and treated, increasingly made between analytic positions and a changing world. The chapters in this section present six subject orientations that have emerged in recent years, giving new and alternative meanings to the security objects that have traditionally been understood according to traditional models. âBiopoliticsâ (Dillon), âgendered securityâ (Shepherd), âidentity securityâ (Bilgin), âsecurity ethicsâ (Burke), âfinancial securityâ (de Goede), and âinternational law and securityâ (Sandvik) advance analyses that explicitly and implicitly put into question the transparency of the security subject, and document the analytic consequences of intensified focus on the subject position in security analysis.
New security objects assembles a set of studies that document and explore the character of emerging security threats to empirical objects traditionally not considered to be under threat. The six chapters in this section explore the direct and indirect consequences for conceptual analysis of these non-traditional security objects. The contributions, âenvironmental securityâ (Barnett), âfood securityâ (Slater and Wiggins), âenergy securityâ (Dannreuther), âcyber securityâ (Dunn Cavelty), âpandemic securityâ (Elbe) and âbiosecurityâ (Kuhlau and Hart), thus confront conventional premises and expectations of status quo security concepts, by suggesting how securitization processes can shift focus to objects outside of conventional approaches.
New security practices gathers a series of chapters illustrating the effects of construing security as practice, as a mode of operation or of implementation of security measures through means that are themselves governed by a variety of structures and drives. In contrast to the three previous sections, which explore security as positions in a subjectâ object equation, these chapters regard security as a management function with in a logic of governance. These chapters, âsurveillanceâ (Salter), âurban securityâ (Wood), âprivatization of securityâ (Leander), âmigrationâ (Walters), âsecurity technologiesâ (Guittet and Jeandesboz), âdesigning securityâ (Weber and Lacy), and ânew mobile crimeâ (den Boer) examine security less as a strategy aimed at ideally erasing insecurity from society than as a project of overseeing and regulating insecurity in society, integrating it into the social system, and administering resources that give it a role in the overall governance of society.
Note
- The realization of this volume has been supported through the invaluable editorial assistance of Monica Hanssen, Marit Moe-Pryce and Jonas Gräns.