Upload
uconn
View
0
Download
0
Embed Size (px)
Citation preview
Alex Kreidenweis – European Approaches to IR – 8 May, 2013
Introduction
Colloquially Copenhagen is a city, while to security scholars it connotes a distinctive
variant within critical approaches to security. This paper will blend the colloquial and the
scholarly by approaching the Copenhagen School as more city than school. What follows is
a grand, if less than comprehensive, tour of Copenhagen from foundations to suburbs. I
begin at the city square, famously erected by Ole Waever, paying close attention to efforts
which have sought to rejuvenate it as a central forum of security scholarship. The paper
then traces its way through some of the prominent, messy, and vibrant neighborhoods,
each with their distinctive tension or theme. I then look to politics within Copenhagen as
illustrative of the politics into which all security studies, critical or otherwise, is inhered. In
the end I play realtor and prospective buyer by cogitating on some points at which one
might stake a claim in the city, while perhaps leaving an indelible mark on its architecture.
Center City
With little doubt Copenhagen’s chief architect has been Ole Waever. Leveling the
ground upon which he might begin building, Waever unmoored security from its elsewise
“realist”, “state-centric” or “national” ontological berths. Such a heterodox act enabled a
careful assessment of the fundamental, and fundamentally unsettled, nature of what
security “is” and more prolifically what it “does”. Yet Waever viewed security itself is a
means to ulterior end; in the post-Maastricht Europe, flesh was being added to EU bones
and the “state of the state” was shifting. The hitherto sacrosanctity of state sovereignty and
clearly demarcated political identities appeared to be in flux (Waever, 104).
Having (in)famously abjured the notion of objectively constituted threats, the
relevant questions became how can something be conceived as a security issue, what is it
2
about security that makes clear political distinctions to other sorts of issues, and how does
one know a security issue when one sees it? (Waever, 106). The answers, according to
Waever, are to be mined out of the discursive processes by which security is constructed.
Nothing is a security issue, nothing is threatened or defended, and politics as usual prevails,
until someone makes a security issue. That is, there is no security prior to intentional
securitizations. Here the foundations come to be laid.
In theoretical terms, the foundational architecture laid by Waever is parsimoniously
elegant. Securitization is a solely discursive process in which agents seek to move issues
into the realm of security and threat through speech acts. Inherently self-referential, the
process neither measures nor weighs an issue against others to assess the measure or
weight of its existence. Instead, securitizing discourses constitute the sense of a palpable
threat and the meanings of apposite responses. Through their securitizing moves, an agent
demarcates a referent group whose very existence is placed into question by an extant
threat. That the threat be posed as existential is crucial, for it is only when so cast that a
threat might authorize a break with politics as normal. To securitize, then, is to enter into
the realm of exceptional politics (Waever, 107).
Parsimonious perhaps, yet securitization theory carried profound implications for
the study of security. Securitization highlighted a path by which issues beyond militarized
ones might be constituted as matters of security. By taking a flexible view of referents,
Waever’s securitization theory is also bound up in considerations of political communities
and identities which might be made, altered, or unmade through different securitizing
moves. This might be accomplished at, or towards at the level of states but also sub- or
supra-state levels. In this way securitization theory clearly evinced a mechanism which
3
allowed analysts to meaningfully speak about “security from what” and “security for
whom”. In mid-1990s Europe, and indeed within the UN system’s burgeoning tryst with
human security, two more salient questions were perhaps wont to be found.
The political landscape at the dawn of a post-Cold War world was no less vital to
early explications of securitization theory. Waever and his contemporaries saw actors
speaking capably not from or about the security of the state as such. The ambit of actors
putatively capable of “speaking security” had expanded to a degree that security no longer
began or ended with the state. As a consequence, it seemed too conservative a position to
assume that the referent objects, in whose name securitizing moves are made, were solely
states. Thus, the entire project upon which Waever toiled was to wipe away the erstwhile
orthodoxies of security studies in which the lone avatars were billiard ball states. The map
was to be repopulated anew by reflexively asking, “…who today is able to establish itself
with a self-referential gesture of security as a survival-demanding unit?” (Waever, 110).
The number of actors nudged into place upon Waever’s securitization blueprint was
originally quite small. Nations, states, and Europe were the only actors which could
meaningfully be spoken of as securitized, though with a number of politicized actors toeing
the securitization line. In any case, the end of the Cold War had reconstituted the
relationships between political identities to great effect upon security politics. Under the
rubric of security, political identities were cast, recast, reified, or shifted. In Western
Europe state and nation were actively decoupled as states shifted some governmental
functions towards the EU. The supra-state lurch of some governmental functions coincided
with European nationalities’ increasing insecurity complexes due to the receding capability
of nations to rely upon sovereign states to unilaterally intervene against socio-cultural
4
threats. Meanwhile Eastern Europeans were busy grafting together states and nations to
invidious effect. The bloody Yugoslavian split was a case in point; "where state and nation
do not fit, there will be competing claims over territory, and conflicts over 'minorities',
borders, etc.” (Waever, 114).
From East to West, the invocation of security bound political communities. From
Waever’s view, identity and security are inextricable; cultures or identities not cast in
security’s light will be extirpated. Yet in binding a referent community, securitizations bind
the identity of the “other” who threatens to raze or subsume. It is not enough to say that
amorphous trends such as globalization suffice for existential threats. “Western culture” or
“Americanization” are more evocatively specific.
It is here that Waever displays an affinity for a Derridian conception of political
identity. Because political identities are constituted through securitization, that is to say
that identity can only be produced by speaking through the dialogic filter of security, it
becomes possible to see that identity is never fully secure. As Waever demands, "one does
not speak of something that is unproblematic", thus security is constituted by the want for
something it does not have, namely security (Waever, 115). The Derridian paradox
emerges precisely in the recognition that security is a denotation of what one is in relation
to what one needs. To need protection is to need that which will affirm identity, but in
attaining protection the identity is necessarily not what it was before – namely, secure.
This may well highlight that states are no longer the only denizens of the pernicious
field of security politics, and yet states are certainly not to be forgotten. Within Waever’s
seminal framework, the ultima ratio meaning of state security is what it perhaps always
had been: sovereignty. Understood as the range of issues a state claims sole control over,
5
and the spatially bound, uncontested ability to set public law, it is possible to work through
the putative impasse of state versus EU sovereignty. The trickiness of this dichotomy was
bound up in the rhetoric that claimed European states “transferred sovereignty” to the EU.
This can be categorically rejected, Waever argued, as states retain full sovereignty, the
question is over what they retained sovereign authority. Simply stated, the emergence of
the EU heralded a renegotiation of over what domains states could claim legitimate and
uncontested control (Waever, 116). Thus it is argued that questioning whether states or
the EU had more or less sovereignty was to indulge a false dichotomy. Instead EU-
members are seen as actively engaging in the development of a supranational entity with
the inchoate potentiality to undermine state sovereignty. This is an important claim
precisely because it, unlike so many analyses, holds that the EU has not yet and is not
necessarily the death knell of state sovereignty (Waever, 116).
At the time of Waever’s writing, the “European project” had gained enough
momentum that it could be spoken of within the rubric of security. European integration is
curiously linked with the totalizing project of European security. Fearing its own balance-
of-power past, a distinctly European identity harping "European traditions", seemed to be
slowly imbricating itself over the heterogeneous political identities of Europe. Europe as a
political entity is simultaneously constituted and securitized against the specter of the
balance-of-power past (Waever, 122). What is so curious about this development is that
the referent is not EU institutions but the notion of European integration set against the
existential threat of fragmentation heralding a return to Europe’s macabre past.
Indirectly assessing city planning ten years on, Didier Bigo concurred with Waever
in important ways. Specifically, Bigo ascribes to the notion that state-centric views of
6
security are outmoded; security is a fundamentally dialogic process; and the empirics of
European security politics are illustrative of the unsettled nature of security. Yet the
landscape had been shifting underfoot - Copenhagen was in need of revitalization lest it
sink into the sand. Though not explicit in his intention to revitalize securtization theory,
Bigo is certainly directing matters from Copenhagen’s city square. To these ends two
matters are driven to the fore; first Bigo sets to disabusing claims that 9/11/01 was a
historical rupture which fundamentally altered what security meant and what it meant to
“practice security”. The second move is to engage with the occlusion of a formerly hard
dichotomy of external and internal security. Thus “spaces,” and “practices” of security help
update city infrastructure.
Bigo posits that the fusion of the formerly autonomous internal and external
security spheres had collapsed into homogeneity as a result of reapplied bipolarity. Since
the end of the Cold War, Western states had systemically “othered” the third world. This
“othering” painted the third world as a great morass of insecurity born of ethnic conflict,
arms and drug trafficking, and political instability. Worse, the third world purportedly
externalizes its problems via irregular migration. In response, the West had simply
resurrected the logic of bipolarity. 9/11 critically reified perceptions within the West that
a highly unstable third world machinates to violently interject into Western society
through terrorism, now coded as acts of war and crime. The omnibus war launched by
resurrected bipolarity had become distinctly clandestine, information-based, and
comfortable within an exceptional moment permissive of executive authority (Bigo, 387).
Following Waever, a central question is not simply "what" is securitized, but "who"
is securitizing (Bigo, 394). Contra Waever, Bigo avers that security professionals enunciate
7
threats pursuant to "inter-agency" rivalry (Bigo, 391). This is a critical point; who is
enunciating is irreducible from political ambitions - speaking of a threat is done to privilege
the role of one's agency in the transnational security mélange. An interwoven mélange of
police, intelligence officers, armed services, specialized military units, think-tanks, and
private security companies are those which are most actively enunciating contemporary
threats (Bigo, 387 - 388). These security professionals, in word and in deed, are animated
by logics internal to their Bourdieusian field and thereby transcendent of national or
political affiliation (Bigo, 389). Especially within the EU system, security actors across
states seem now more analogous to one another than to other citizens of their bounded
states (Bigo, 396). Further still, their commonalities are driven by the transnational use of
similar information technologies of security management (Bigo, 394).
The defining debates between security professionals in the post-Cold War, raised to
prominence by 9/11, pits two axes of professionals against one another. Along one axis are
security professionals who believe that globalized threats, stemming primarily from the
nucleic Al-Qaeda, can only be combatted through, "a permanent state of exception allowing
less judicial control…" engendered in a universal information network (Bigo, 388). The
parallel axis is drawn by professionals who prefer to bolster security at the borders, the
better to protect the homeland. That this debate has gained such traction within and
beyond governments has served as facilitating conditions for the occlusion of internal and
external spheres of security.
An additionally crucial aspect of Bigo's analysis is to point out that the notion of
starkly dichotomized roles for police and militaries is a product of political liberalism.
Their separation is neither certain nor natural given that both institutions deal in the same
8
currencies, namely applied coercion and (in)security. Tracing the genealogy of history
shows that the internal remit of police was only introduced to European society with the
emergence of political liberalism. Under the restraining tendencies of liberalism, police
become "an instrument to battle the real enemy of the population: crime" (Bigo, 392).
Concomitantly the military began a slow retrenchment from internal security matters.
Joakim Berndtsson and Maria Stern, similar to Bigo, look to spatial dimensions of
security. Where Bigo finds the erasure of internal and external in the shifting remits of
security professionals, Berndtsson and Stern pose the public/private distinction as a more
productive analytical marker of erratic security roles. This public/private distinction
remains arguably extant, unlike Bigo’s internal/external collapse, but the boundaries it
draws are repeatedly contested and renegotiated at particular spatial locations. By
confronting this problematique, Berndtsson and Stern are able to take deeper
considerations to task, such as “how, and by whom, security is produced and governed
remain central and controversial questions…" (Berndtsson & Stern, 411). Their revision,
small but prodigious, is to add “places" into Bigo’s colonnade of “spaces,” and “practices”.
Looking to Sweden’s Arlanda airport, a heterogeneous assemblage of public and
private security actors comes into focus. Each actor is "governed by competing,
intersecting, and coinciding security logics or rationalities (Berdtsson & Stern, 409). At
Arlanda, the inter-bureaucratic games teased out by Bigo have become frustrated through
the commodification of security provision within Western liberal democracies. The major
transformation of note is the addition of private security companies (PSCs) into the “what”
and “who” debates driving the unsettled meanings of security (Berndtsson & Stern, 411).
At Arlanda public/private markers starkly divides the discursive and practical meanings of
9
security, as well as the forms of power actors can exercise based on their location in
regards to that distinction (Berndtsson & Stern quoting Abrahamsen & Williams, 411). In
light of their dynamic interchanges, it becomes important to ask how various security
actors along the public/private continuum understand their work, how they interpret
national and international security directives, and how the increasing role of privatized
security agents has knotted up new political tensions.
Strikingly, security assemblages themselves attempt to attach meaning to the "what"
and "who" of security by positioning public/private as ontologically separate categories.
What is so mystifying is that these actors’ own practices calls into question the veracity of
an ontological distinction between public and private. Illustrative of the point, a PSC
spokesperson suggests that the legitimacy of private entities in security provision was
unproblematic for democratic governance so long as PSCs did not challenge the state's
rightful monopoly over the use of violence (Berndtsson & Stern, 414). Tellingly, these
notions inhere with PSC views that there are aspects of security provision in which
corporate efficiency trumps public bureaucratic impotence (Berndtsson & Stern, 415).
Alternatively, public actors such as the police assert a distinctly principal-agent view of the
relationship between public and private security actors. Here PSCs are viewed as ancillary
to the work of police, with the latter defining the appropriate roles for the former
(Berndtsson & Stern, 416).
The locus of debate surround security governance is whether PSCs undermine
democratic oversight. That the consideration here focuses on a matter so crucial as
security renders the issue in an alarming fashion. Arlanda Airport thereby can be seen as a
zone of indistinction between public and private, national and international, or at the very
10
least a zone where the limitations of political imaginaries fail to grasp the complex and
dynamic interplays defining security (Berndtsson & Stern, 417). What is of vital
importance is that Arlanda constitutes the spatial nexus between the public dictums of the
EU and various national capitals on the one hand, and the privatized technologies and
practices which engender them on the other (Berndtsson & Stern, 418).
Problematically, the assemblage at Arlanda is governed by imbricated and at times
diametric governance bodies and logics which confuse public/private boundaries and
whom is controlling at the site of security provision. For example the meaning of "police
supervision" requisite to defining and controlling the operational latitude of private
security companies is not at all clear; different interpretations are forwarded by private
security companies, police, and regulatory bodies (Berndtsson & Stern, 419 - 420). Further
confounding any clear articulation of "what" security is and "who" is to provide it are the
bureaucratic wrangling engaged in by state agencies reminiscent of Bigo's bureaucratic
games (Berndtsson & Stern, 421). In effect, the meaning of security is what security actors
choose within the spatial and temporal boundaries of instantaneous interactions
(Berndtsson & Stern, 420).
Berndtsson & Stern's findings have important implications for the confidence to be
placed in a parsimonious theory of securitization. In short, for Waever, and to a lesser
extent Bigo, the discursive meaning of security is determined by securitizing moves
undertaken by agents speaking on behalf of larger imagined communities or in line with
bureaucratic interests. Though Berndtsson & Stern do not necessarily countermand these
notions, they do cast doubt on whether the enunciated meanings of security are so clearly
translated when security is manifested through practice. Instead there appears a
11
problematic disjuncture between security speech and security practice - raising the
important epistemological question of whether it is more fruitful to determine the meaning
of security from Habermasian discourse or Bourdieusian practice. What it certainly calls
into question is any theory of securitization which leaves aside zones of security. Airports,
detention centers, and military checkpoints are sites wherein security assemblages actively
give meaning to security. The variegated milieus of security agents, regulations, and
bureaucratic interests functional at these sites may point to different answers of "who"
does security, or indeed "what" security is, based on the particular location.
Embedded in Copenhagen or Beyond It?
Waever, Bigo, Berdtsson and Stern have helped envision, set, and reinforce
Copenhagen’s city square. While the constructive efforts were more explicit for Waever,
the common discursive and practical conceptions of security central to Bigo, Berndtsson,
and Stern’s work shows them within the same square, augmenting the same infrastructure.
The view afforded from the square of empirical security landscapes, particularly European
ones, has become something of an attraction for European security scholars. Many have
passed through the city square, leaving behind balustrades, finials, and arcades. Steffano
Guizzini, for example, attempts to show how securitization is a “non-positivistic” causal
mechanism (Guizzini, 329). Luca Mavelli grapples with the securitization of Islam and its
implication for “…secular regimes for thinking security” (Mavelli, 159). Jocelyn Vaughn has
considered whether securitizing moves can name and persuade more than a single referent
(Vaughn 2009).
12
Yet the square, for all its grandiose embellishments, does not a city make. To get a
better sense of the city’s life, we must range into the neighborhoods. Keeping limitations in
mind, time and space allow for a visit of three.
One of the more unruly neighborhoods within the Copenhagen Schools view of
securitization actively brawls over the notion of "self-referential" speech acts. A strict
reading of self-referential might suggest that a securitizing speech act is not embedded
within a particular context, but rather shapes its own context in the process of being
uttered. Alternatively this runs the risk of forsaking any potential for a speech act to be
shaped and rendered meaningful by dint of emergence within a particular context. Central
to this tension is the role played by an audience, or referent of securitizing moves. If
security moves are strictly self-referential, then the reaction of the audience itself is
irrelevant; the act is sufficient to contextualize an issue as existentially threatening and
constitute the referent which is so threatened. If the consequences of any speech act is
undecided prior to its mediation within broader social contexts, then the speech act is
inextricable from the pre-constituted context into which it is uttered.
As a primary contender in these debates, Thierry Balzacq has faulted the
Copenhagen School for conflating illocutionary and perlocutionary speech acts. By this
argument Copenhagen theorists presume illocutionary speech acts, the act of posing
something as an existential threat, stand as the entire conception of securitization. In so
doing perlocutionary acts are left aside, or more simply the societal effects of a securitizing
move. From Balzacq’s view the Copenhagen School has taken an internalist analytical
perspective in which"...the words of the securitizing actor need to resonate with the context
within which his/her actions are collocated" (Balzacq, 182). Additionally, securitization is
13
accused of delving too far into the post-structuralist camp such that it cannot conceive of
the "brute facts" of a security landscape. Tanks commanded by ones enemies are, after all,
threatening irrespective of whether agents choose to recognize them as such (Balzacq,
181).
Holger Stritzel is largely in concurrence with Balzacq's reading of the Copenhagen
School. Early articulations of securitization theory are held to be internalist insofar as their
underlying assumptions are that by invoking an issue in the name of security, an utterance
carries constitutive capacity. Specifically, the content of a speech act gains subjectivity
through utterance, a subjectivity which produces both the meaning of security and the
knowledge of its contents (Stritzel, 361). The clear influences of Judith Butler and Jacques
Derrida have thus veiled Copenhagen’s view of a world rife with extra-discursive material
dangers. What is more, Stritzel believes the internalist position does not require an
enabling context for speech acts to successfully achieve securitization; the act itself is
constitutive of both the speaker and their ostensible authority to "speak security". The
actors and contexts relevant within securitization, by this view, are constituted in the wake
of discourse (Stritzel, 361).
Later specifications by Ole Waever and Barry Buzan, which bifurcate securitizing
actors and skeptical-or-acquiescent audiences, fares no better empirically. How does such
a theory account for multiple relevant audiences? Relatedly, the theory might be rendered
impotent in non-democratic contexts wherein the iron gauntlet of dictatorial rule obviates
the perlucutionary effects of a securitizing move (Stritzel, 363). Similar to Balzacq,
Stritzel's answer to internalist deficiencies is to further specify the contextual factors which
grant a securitizing actor and the contents of their speech acts intersubjective significance
14
(Stritzel, 367). Specifically, Stritzel believes securitization must be attentive to the
congruence between securitizing speech acts and extant social discourses; the greater the
degree of congruence, "the easier it is for [securitizing actors] to establish their preferred
individual text as a dominant narrative for a larger collective" (Stritzel, 370). Thus,
securitization is best understood by a triadic relationship between "the performative force
of articulated threat texts", the contextual embeddedness of securitizing moves vis-a-vis
extant discourse, and the social capital of the securitizing actor (Stritzel, 370). In essence
what Stritzel argues for is a more strongly post-structuralist positioning of securitization
theory than Balzacq suggests, but with the commonality that pre-existing contexts matter
in regards to the success or failure of securitizing moves.
Lene Hansen charges into this tumult by accusing both Balzacq and Stritzel of an
undiscerning analysis of Buzan and Waever's ontological and epistemological claims.
Ontologically speaking, Hansen argues that Buzan and Waever cannot find an anchor for
the "what is" question of security beyond discourse. That is to say that security concerns
are never quite the "brute facts" which Balzacq is anxious about missing. Balzacq’s and
Stritzel’s epistemological misread demands that audiences are shorn of relevance within
Buzan and Waever's internalist position. Buzan and Waever’s true epistemological claim,
argues Hansen, is that security's contents can only be known through intersubjective
discursive processes (Hansen, 360).
Deeper still, Hansen believes that one cannot simultaneously claim that the
Copenhagen School casts its lot with post-structuralists and speak meaningfully about
externalist and internalist positions. The very notion of an externalist position casts oil
into the post-structualist waters; at root the externalist position adduced by Stritzel
15
contends that there is a contextual universe which discourse may or may not recognize.
Yet amongst the foundational postulates of post-structuralist enterprises is that context is
always internal to discourse - the idea of an "external reality" holds intellectual purchase
owing to its discursive constitution. To suggest otherwise would rob discourse of
constitutive power. At most discourse would be capable of signifying, more or less
accurately, "brute facts" (Hansen, 360).
What Hansen suggests instead is a strengthening of post-structuralist foundations
by the Copenhagen School. First, securitization could be specified through attention to the
discursive content that attempts to mark "...a given event, case or process…" as a security
threat. Of interest here are the discursive markers which link the signifier "security" to
exceptional politics (Hansen, 362). To illustrate the point, Hansen turns focus to how the
"Mohammed cartoon crisis" was securitized in reference to the "clash of civilizations"
macro-discourse (Hansen, 364). A second specification might contemplate the unstable
and contested regimes of knowledge that signify a totalizing set of relations allowing for
securitization to occur (Hansen, 363). In short, what is knowable about the threat and how
is it made knowable? In regards to the Mohammed cartoons, debates swarmed over
whether the cartoons themselves were offensive, or whether it was in the act of
interpretation or constitution of the cartoons by Muslim subjects that manifested the
offense and subsequent securitization (Hansen, 366). Hansen's third suggestion is to
interpolate a Foucauldian notion of "structural modality" into securitization analysis, which
suggests that securitizing moves are less decisive than often assumed in regards to the
referent communities they bind and thereby how security is to be pursued. In regards to
the Mohammed cartoons, there was an undecidability about whether the threat posed was
16
towards liberal notions of free speech or Muslims as a bound religious community (Hansen
2011, 367).
Normativity
Sinners and the virtuous are the denizens of the second neighborhood. Here one’s
daily tasks are set to attaching approbation or opprobrium to those who securitize, as
much as those who study it. One might certainly be excused for missing the normative
trusses buried deep in early articulations of securitization theory for its “sterner stuff”. Yet
there has always been a muted normativity – a faint tone, but there all the same.
Securitizing discourses seem to present no opportunity for constructive political dialogue.
One cannot dialogue with the “other” for their very existence constitutes an existential
threat – the exceptional moment itself forecloses all possibility of pacific resolution.
Waever himself has always been aware of the mutual exclusivity of securitizations and
politics, “for politics to emerge…we need to eliminate the logic of war, which in its extended
sense…means to stop using the security act amongst ourselves. In war we do not have to
discuss with the other, we can eliminate him” (Waever, 127).
In more explicit ways, Bigo’s palpable concern for democracy was born by the
construction of apocalyptic security narratives. Within the exceptional moment
crystallized by virtue of such narratives, the "protection of the weakest against injustice,
exploitation, and marginalisation" as the core element of security is endangered (Bigo,
402). The normative implications of securitization also transpose onto those who “speak
and write” it. As Jef Huysmans reminds, "...speaking and writing about security is never
innocent" (Huysmans, 43). Scholars of security, by virtue of their very object of study,
engage in an ethico-normative endeavor. By mobilizing knowledges about "what security
17
is" or "who is capable of security" and "how securitization is possible", security scholars are
inhered to the Foucauldian political technologies which manage security politics. By
necessity, speaking and writing security introduces scholarly knowledge into the contested,
political spaces of the academy where success can sway scholarly discourses on the
foundational questions of security. Knowledge also has a slippery quality which can
squeeze it beyond the erudite confines of the academy and into the realm of policy.
Scholars, as much as policymakers, can be securitizing actors (Floyd 2007, 10).
A reflexive question wrought by these thorny realities is how one might judge the
ethical implications of a securitizing move. To this effect, Rita Floyd has advocated for a
normatively informed theory of securitization. As a base matter, Floyd has stated that
securitizations may be evaluated as positive or negative. Adopting a consequentialist
approach allows for such evaluations based on whether securitizations, understood as
politicization in the extreme, produce more positive outcomes than "mere politicizations"
would have (Floyd, 338).
In this way security scholars may find a path out of the normative dilemma of
speaking and writing security. By assessing the relative desirability of some
securitizations, scholars may "...encourage some securitizations and renounce others…"
(Floyd 2007, 339). It is here as well that Floyd attempts to link Copenhagen and
Aberystwyth; if Copenhagen allows analysts to see securitizing moves clearly, then
Aberystwyth encourages them to critically engage with policymakers (Floyd 2007, 339).
Elsewhere Floyd has evinced impactful arguments in favor of evaluative procedures
which can parse out the justice of a securitization. To do so Floyd fuses Copenhagen’s logic
with just war doctrine. In doing so she arrives at three core criteria of judgment: first, the
18
securitization must take as its object an extant and existential threat. Second, the referent
of security must be "...conducive to human well-being defined as the satisfaction of human
needs" (Floyd, 428). Finally, responses to a threat must at once be proportionate to the
threat and responders must be seen as acting on virtuous motives. Building from these
criteria requires some finagling of Copenhagen’s foundations; securitizations, according to
Floyd, are successful when speech acts cause relevant action by either securitizing agents
or their proxies. One must therefore not only talk the talk of securitization, one must also
then walk it (Floyd 2011, 428). What Floyd gains with this modification is the ability to
discern the sincerity of a securitizing move. Simply stated, if a securitizing move lacks
sincerity then the speech act will not portend a relevant shift in action or policy (Floyd
2011, 429). Additionally, the notion of sincerity alleviates security analysts, scholars
among them, of moral culpability. It is not the speech act itself that suffices for
securitization, but the actions of those who are persuaded by such moves.
To the likely chagrin of those sympathetic of Lene Hansen's arguments in favor of
further post-structuralization, Floyd has bound just securitizations to a materialist reading
of threat. This is perhaps unsurprising given the overarching aim of identifying universal
principles capable of evaluating normative concepts as weighty as justice. To wit, if threats
are purely discursive then how can one determine whether securitizing agents act in the
interests of a larger collective or simply by the ulterior dictates of Habermasian strategic
rationality?
Unmaking Securitization
Abutting the second neighborhood lies a third. Similar yet distinct, the pith of the
“desecuritization” adjacency is a normative preference away from securitization. As
19
Christopher Browning and Matt McDonald argue, the main thrust of the Copenhagen
School’s critical engagement with its own theory has been to extrapolate out what means
might make desecuritization possible (Browning & McDonald, 11). As noted, the
exceptional chasms opened by securitization may prove second to none in the ability to
elevate issues to the top of a political agenda, but at those heights the prevailing logics close
down deliberation and public oversight.
Paul Roe shows that the Schmittian exception lurks in the largely unregulated
politics invoked by securitization. What Schmitt comes to signify for the logic of
securitization is the abrogation of normal, deliberative, democratic procedures to the
advantage of an unchecked sovereign (Roe, 252). Relatedly, the questionable effectiveness
of securitization to resolve political issues in a positive manner suggests that some issues
may be better handled within the boundaries of normal politics (Roe, 253).
The Gordian Knot here becomes “what kind of politics we want” (Tjalve, 442).
Vibeke Tjalve reads the Copenhagen School as systemically indecisive about the normative
importance of including attentive publics. This indecisiveness stems from two causes; first,
the enduring neoliberal notion of sovereign states is bound up in the ideal of “transparency
and deliberation”. In short, a populace can engage in open deliberation only in the
presence of institutional bulwarks of civil society (Tjalve, 443). The second reason
emerges from the European political experiences which inform securitization theory, most
prominent among them pernicious dalliances with fractious, xenophobic, and hyper-
nationalist politics, particularly during the inter-war years. One cannot easily forget the
antipathies born of inter-war politics which ended in total war and genocide (Tjalve, 444).
The way forward, Tjalve argues, is to endorse a politics of contestation in which easy slides
20
towards a given securitizing move are difficult. American republicanism is held up as
exemplary of the potential – in what Americans presently regards as political gridlock and
impotence, Tjalve sees a steadier normative foundation for Copenhagen (Tjalve, 448).
Similarly, Claudia Aradau finds unsatisfactory the Copenhagen School’s indecision
on the matter of preference for securitization or desecuritization. Rather than historically
rooted, she believes that Waever and Buzan in particular show a trepidation towards
normative theorizing, preferring instead to retain desecuritization as an analytical concept.
Aradau pushes for a “politics of emancipation” capable of overturning the institutional
knowledges which legitimize securitizing moves (Aradau, 406). An emancipatory lever is
presented by the universalizing principles of democratic governance under which citizens
are rights-bearers. Liberal rights are thereby presented as the foundations of resistance
against the Schmittian exception invoked by securitizations.
What Copenhagen Cannot See
For all that the Copenhagen School has offered the study of security; it remains
short of a panacea. Standing within the city square, or traversing its intellectually
stimulating precincts tucks away from sight the various “whos” and “whats” that lean in on
the city walls.
Admittance into Copenhagen requires one be able to speak, or at least to be spoken
about. To this end, Lene Hansen has poignantly shown the limitations of placing too much
stock in speech-act theory. In simple terms, the Copenhagen School presumes that
subjectivity can only be constituted when speech is possible - to pose something as
threatened necessitates it to be spoken about in such terms. By contesting the ontological
foundations of security as bound to materialism, the Copenhagen School had adroitly been
21
able to explain the broadening scope of security politics. Yet, Hansen argues that the over-
reliance on speech cannot account for the mute, or those who cannot speak with requisite
volume.
Much of this incapacity is due to the specification of the theory - foremost in
reaction to scholarly jibes that securitization theory opened itself up to an infinite egress of
potentially securitized issues. Copenhagen effectively guarded against these prods by
bifurcating international security from societal security, with the former being the rightful
province of security studies. What distinguishes these two realms is that issues of the
former are discursively framed as existential threats to an entire social collective, whereas
the latter focuses on threats emanating from within a social collective towards its
individual members (Hansen 2000, 290).
Gender therefore becomes a dimension of security politics that Copehagen cannot
see or, more appropriately, hear. It is deaf, for instance, to the honor killings of Pakistani
women, killings based on victims’ gendered identities. Copenhagen fails to hear that these
women are killed due to their purported transgressions of sacrosanct gender norms
(Hansen 2000, 291). Women are sequestered in silence as enunciating their common
existential threat will only exacerbate their precarious position. A raped Pakistani woman
cannot speak for fear that it will lead to her death upon the altar of patriarchal honor
(Hansen 2000, 294).
An alternative problem arises from the necessity of securitizing moves to name an
independently constituted security referent (Hansen 2000, 298). For women to be
securitized under this logic, gender must be isolated from nationality, religion, or ideology.
Yet in the example of honor killings, it is precisely the intersection of gender with other
22
identities such as religion and culture that are the source of existential threat (Hansen
2000, 299). Hansen believes that broadening analytical focus to incorporate nonverbal
communication would help sharpen Copenhagen's hearing. On the one hand, if women
cannot vocalize security then perhaps their bodies are capable of speaking it. The
insecurity inflicted upon a gendered Pakistani body may speak to collective insecurity even
when texts and dialogues are silent (Hansen 2000, 305).
Megan MacKenzie has trenchantly shown further gendered deafness within the
Copenhagen School. Desecurization in particular is shown to be an unequal and power-
bound process, even when invoked in the name of democracy. MacKenzie trains focus on
the slide from civil conflict to post-conflict reconstruction in the Democratic Republic of
Congo in order to show the unequal impacts of purposively re-entering “normal politics”. It
is at this historical juncture, “…that issues understood as traditional security concerns,
including disarmament, unemployed men, and male soldiers have been given significant
attention…matters relating to women, including sexual violence and female soldiers,
continue to be categorized as domestic, social, or private matters” (MacKenzie, 259).
A further pocket of deafness is exhibited by the inability to hear how
desecuritization parses out who is an enduring security concern along gendered premises.
For instance, “the DDR program in Sierra Leone effectively (re)constructed female soldiers
as “wives,” camp followers,” or “sex slaves” in order to desecuritize them and to distinguish
them from securitized male soldier subjects” (MacKenzie, 243 – my emphasis). What is
more, development NGOs and international organizations contributed to the gender-
spliced process of desecuritization (Mackenzie, 259). Thus securitization theory leaves
Copenhagen’s builders and visitors twice confounded. In the first instance the Copenhagen
23
School will be dumbstruck to the reality that both men and women have fought and killed,
yet (de)securitization cleanly divides security from domestic concerns based on gender. To
realize that the very organizations struggling to desecuritize DRC towards pluralistic
democracy willfully engaged in exclusionary politics is to be dumbfounded yet again.
Securitizing Moves & Academic Politics
With little doubt, the Copenhagen School now constitutes an enormously popular
locale for security scholars. By some counts its “citizens” included somewhere in realm of
83 conference papers and journal articles between 1996 and 2009 and perhaps as many
workshops, panels, and roundtables (Gad & Peterson, 316). It also stands as one of the
most developed metropolises of security studies beyond its trans-Atlantic counterparts.
Little surprise then that its foremost theorist, Ole Waever, would have reason to reflect on
the differences between American and European security architectures. In a 2004
conference paper, Waever offers predictable lamentations about their differences. Citizens
of security studies, it appears, do not travel; Europeans yawn or chuckle at the positivist
predilections of their American counterparts. Europeans critically and publicly engage
with the role of security in political life, while Americans either toil away in ivory towers or
push for relevance to Washington. Americans’ architectures are built with the monies of
"supersized" funding institutions, while Europeans draw from more meagerly sized
funding sources (Waever 2004). Waever, chief architect of the Copenhagen framework,
had effectively blueprinted security studies, even across its European metropolises, as
fractious, balkanized and disinclined to intra-disciplinary dialogue.
To the easel stepped twenty five, mostly junior, security scholars. Labeling
themselves the "CASE collective" they undertook the outwardly ambitious project of
24
revitalizing European Critical Security Studies (CSS) and lending some modicum of
coherency to its otherwise disparate dialogues. By offering up a unified research agenda
CASE purported to promote collegial dialogue while suppressing individualistic
competitive tendencies (CASE, 444).
Much of this blueprint delineates an old schema on new paper. The debates named,
neighborhoods drawn, and citizens sketched are reminiscent of what has already been
visited in this paper. For example, how scholars are to grapple with the normative
implications of studying security logics without increasing the ambit of security
practitioners? (CASE, 461) How to renew the critical dimensions of peace research such
that it might offer trenchant counterpoint to militarized interventions in the name of
peace? How to critique a neocolonial redolent fusion of security and development? (CASE,
463)
With a final reflexive flourish, CASE denoted what might be properly called “critical”
about CSS. The turn of phrase “theoretical relevance and relevance of theory” well captures
the intent. Critical scholarship, at minimum, obliges one to "...generate and study
academically original questions…" Critical engagements with politics are a second
requisite, mostly by enabling multiple views of a security landscape or to promote
circumspect policy discourses (CASE, 474).
A superficial assessment of the CASE collective’s blueprint of the future may adjudge
it as just that - an admirable attempt to envision unity across the obscurant and isolated
metropolises of CSS. Christine Sylvester reminds that CASE is as political as that which it
studies. The inspirational touchstone of CASE's unified blueprint after all, is an
unpublished paper by Ole Waever - a fact tucked into the "eccentric space" of a footnote
25
(Sylvester, 548). Without reading the disclaimers then, CASE draws a rather political
sketch. The initial strokes trace the people who have shaped CSS; the erstwhile architects
of Aberystwyth, Copenhagen and Paris (though it remains unclear that Paris is a school or
simply Didier Bigo). CASE's knock-on arrogation is to pen itself as the inheritors of the CSS
architecture and so set to rendering prototypes of key debates in which the field,
constituted not subtly by themselves, will engage (Sylvester, 549).
From process to completed prototype, CASE is bound to the political as much as it is
capable of studying it. Leaning on the walls of the new prototype, side-by-side with
women, are now scholars, many of them feminists. Only glancing references to other
schools of thought, or more imposingly "ists", are offered. Neighborhoods not sketched are
deferred to the future, thus appropriating artistic license in deciding what will be sketched,
who will be sketched, and when they are to be sketched. There is no attempt at even
minimalist depictions of unnamed scholars, camps, or debates; they are relegated without
any proper citation (Sylvester, 550).
CASE’s response bristles at being so sternly assessed. Sylvester is charged with
having wrongly interpreted their intentions, which were illustrative rather than exhaustive
(CASE 2007, 565). Besides, CASE demands, the feminist writings Sylvester lays as
accusations look to the intersections of gender and war, which is to say something other
than gender and security. As a final aside, it is claimed that some feminists are too
sanguine about militarized interventions to critically engage them. Far better then, that IR
feminists bring into line the misinformed critical scholars in their own ranks than snipe at
CASE’s research program (CASE 2007, 567).
26
The irony is that CASE comes to look very much like a securitizing actor. Without
synergizing Paris, Aberystwyth and Copenhagen, their argument tacitly suggests that CSS
will no longer constitute a recognizable field of academic inquiry. Sylvester even muses
that IR feminists, thoroughly if silently eschewed by CASE, may be the object of passive
derision because they are "threatening to the critical traditions some are endeavoring to
establish…" (Sylvester, 554). They are the threatening “others” against which CSS must
guard.
In the denouement, CASE finds itself not a successfully securitizing actor, but yet
another emergent IR camp balkanized to the rest of the field. It muddles through solutions
teased out in broader CSS literatures without engaging that literature headlong. It cannot
do so by virtue of the walls it has drawn into the blueprint. The women and IR feminists
once leaning on CASE’s walls proved transient squatters - they have largely struck out in
search of more hospitable locales. What is left for CASE is to speak to its neighbors with no
possibility of welcoming strangers, nor to travel outwards to visit other cities.
Perhaps this acrimonious altercation casts in clearest relief the inability to
distinguish between politics and scholarship. There is a research of the political and the
political within research. The political moment inherent in research is not solely met by
scholars stepping down from gilded towers, entering into a fracas of securitizing moves,
speech acts, and perlocutionary effects in order to hold up a mirror of reflexivity. The
instant before stepping out of the tower, when one has stated to their peers what they
intend to do, and ever so often, what their colleagues ought to be doing as well. The
moment before an architect puts pen to page, staring into the infinite possibility of empty
canvas, when intentions coalesce and the imminent picture emerges in one’s mind. These
27
are no less political moments, exceptional in their own right. They are reason enough to
turn the mirror of reflexivity towards ourselves, for to do elsewise is to risk the silence and
deafness we as critical scholars often rail against.
Copenhagen Inspired Homebuilding
Touring Copenhagen can be an inspiring experience. One begins to ponder the
wisdom of “buying in” to a suburb, or renting space within the city square. More ambitious
seekers might consider contributing to the Copenhagen architecture, to leave some lasting
accentuation which enables others to more keenly and critically see, hear, and experience
international security landscapes. To be certain there are spaces to be bought or rented,
and architectural adornments left to be envisioned and constructed. I will briefly hazard
the role of realtor and architect to show but a few such potentialities.
A finer pen might be taken to Copenhagen’s structural logic so as to further
reinforce its bulging urban sprawl. One might think to the likely role of affect in processes,
speeches, and practices of security. The moral crusades against human trafficking and
child soldiers are equally illustrative here. Both are spoken through discursive filters of
security – one an indiscriminate threat to women and children, the other an
unconscionable and existential threat to youthful innocence. What motivates action,
sometimes preternatural action, is a politicized mixture of empathy and moral outrage.
One might also rent space in Copenhagen and invite Giorgio Agamben for an
extended visit. As Bigo’s work in particular hints at, the exceptional politics authorized by
a global war on terrorism seems to have stuck the exception as the new rule. Agamben
might muse, from a Copenhagen condo, how securitizing moves in the West play out in
28
drone strikes upon naked lives in Pakistan and Afghanistan, sometimes the wrong naked
lives.
Given Carl Schmitt’s resurgent popularity in European spheres of security studies,
an invitation in his direction would hardly seem amiss. Indeed, Schmitt’s exception seems
to subtly pervade Copenhagen from square to suburb. Yet, interactions with Schmitt have
hardly played themselves out in Copenhagen. The exception born of securitization is not as
unmediated as it might seem. The 2013 Boston Bombings reminded that exceptional
moments are frequently racialized and xenophobic instances which put a sovereign to
searching for brown bodies. The Schmittian exception is also technologized; in the
unregulated politics that followed the bombings, cell phone services were cut, an
impromptu manhunt occurred across social media websites, and thermal imaging
technology finally apprehended Dzokhar Tsarnaev. Dzokhar’s glowing red body, tucked
into the belly of a boat, splashed onto millions of TVs throughout the US, seemed something
of an unintentional instantiation of the efficacy of the sovereign exception.
Thank You For Visiting
Copenhagen – an IR camp that became a city. Arguable proof that IR’s proclivity for
recurrent, discipline (re)defining debates are not quite the idle or futile affairs they may
outwardly appear. Like most any city its problems are palpable, within and beyond the city
walls. In that way it is also a reminder that the whole endeavor of security studies is
encapsulated within the political; attempts to create distance between scholars and
security practitioners will prove ultimately unprofitable. Yet there is undoubtedly
something attractive about the city square, something alluring about Copenhagen’s
29
vivacious neighborhoods. Meandering through it, guided or otherwise, can jog scholarly
inspiration. It is worth a visit, even if one does not become a permanent resident.
30
Works Cited Aradau, C (2004) Security and the democratic scene: desecuritization and emancipation.
Journal of International Relations and Development (7): 388 – 413. Balzacq, T (2005) The Three Faces of Securitization: Political Agency, Audience and
Context. European Journal of International Relations 11(2): 171 – 201. Bigo, D. (2006) Internal and External Aspects of Security. European Security 15(4):
388-414. Berndtsson, J. & Stern M (2011) Private Security and the Public–Private Divide: Contested
Lines of Distinction and Modes of Governance in the Stockholm-Arlanda Security Assemblage. International Political Sociology 5(4): 408-425.
Browning S & McDonald M (2011) The Future of Critical Security Studies: Ethics and the
Politics of Security. European Journal of International Relations: 1 – 21. C.A.S.E Collective (2006) Critical Approaches to Security in Europe: A Networked
Manifesto. Security Dialogue 37(3): 443-487. CASE Collective (2007) Europe, Knowledge, Politics – Engaging with the Limits: The CASE
collective Responds. Security Dialogue 38(4): 559 – 576. Floyd, R (2011) Can securitization theory be used in normative analysis? Towards a just
securitization theory. Security Dialogue 42(4-5): 427 – 439. Floyd, R (2007) Towards a consequentialist evaluation of security: bringing together the
Copenhagen and the Welsh Schools of security studies. Review of International Studies 33: 327 – 350.
Gad, U. & Petersen K (2011) Concepts of politics in securitization studies. Security Dialogue
42(4-5): 315 – 328. Guzzini S (2011) Securitization as a causal mechanism. Security Dialogue 42(4-5): 329 –
341. Hansen, L (2000) The Little Mermaid’s Silent Security Dilemma and the Absence of Gender
in the Copenhagen School. Millennium 29(2): 285 – 306. Hansen, L (2001) The Little Mermaid’s Silent Security Dilemma and the Absence of Gender
in the Copenhagen School. Millennium 29(2): 285-306. Hansen, L (2011) The politics of securitization and the Muhammad cartoon crisis: A post-
structuralist perspective. Security Dialogue 42(4-5): 357 – 369.
31
Huysmans, J (2002) Defining Social Constructivism in Security Studies: The Normative
Dilemma of Writing Security. Alternatives: Global, Local, Political 27: 41 – 62. Huysmans J (2011) What’s in an act? On security speech acts and little security nothings.
Security Dialogue 42(4-5): 371 – 383. Hansen, L (2012) Reconstructing desecuritisation: the normative-political in the
Copenhagen School and directions for how to apply it. Review of International Studies 38(3): 525 – 546.
Knudsen, K (2001) Post-Copenhagen Security Studies: Desecuritizing Securitization.
Security Dialogue 32(3): 355 – 368. Kurki M (2011) The Limitations of the Critical Edge: Reflections on Critical and
Philosophical IR Scholarship Today. Millennium 40(1): 129 – 146. MacKenzie, M (2009) Securitization and Desecuritization: Female Soldiers and
the Reconstruction of Women in Post-Conflict Sierra Leone. Security Studies 18(2): 241 – 261.
McDonald M (2008) Securitization and the Construction of Security. European Journal of
International Relations 14(4): 563 – 587. Mavelli, M (2013) Between Normalisation and Exception: The Securitisation of Islam and
the Construction of the Secular Subject. Millennium 41(2): 159 – 181. Roe, P (2012) Is securitization a 'negative' concept? Revisiting the normative debate over
normal versus extraordinary politics. Security Dialogue 43(3): 249 – 266. Stritzel, H (2007) Towards a Theory of Securitization: Copenhagen and Beyond. European
Journal of International Relations 13(3): 357 – 383. Sylvester, C (2007) Anatomy of a Footnote. Security Dialogue 38(4): 547-558. Tjalve, V (2011) Designing (de)security: European exceptionalism, Atlantic republicanism
and the 'public sphere'. Security Dialogue 42(4-5): 441 – 452. Waever O (2004) Aberystwyth, Paris, Copenhagen New 'Schools' in Security Theory and
their Origins between Core and Periphery. Unpublished Conference Paper: ISA Annual Meeting, Montreal.
Waever, O (1996) European Security Identities. Journal of Common Market Studies 34(1):
103-134.