25
Security in ambiguity Towards a radical security politics WILLEM DE LINT AND SIRPA VIRTA University of Windsor, Canada and University of Tampere, Finland Abstract In this article we offer a reconceptualization of security that attempts to reconcile a post-critical and normative agenda. The article proceeds by unpacking features of the dominant security discourse and then resituating the question in a radical politics. We contend that moving forward on this question requires a rejection of the association between security, certainty and authority. Rather than following the classical realist view that security requires exceptions from politics, we choose to see security as dependent on political uncertainty. Borrowing from H¨ anninen’s idea that politics is ‘living with ambiguity’ and taking from post-Foucauldian thought against the violence of tyranny, we advocate the ongoing repoliticization of the security field informed by harm reduction. We offer ‘security in ambiguity’ as a conceptualization of this synthesis. Key Words governmentality • policing • post-critical criminology • radical politics • security Introduction Over the past decade there has been a convergence of international relations and criminological literature on the security question. Under the rubric of concepts like ‘human security’ and in the context of post-Cold War, infowar and postmodern power considerations, security has been 465 Theoretical Criminology © 2004 SAGE Publications London, Thousand Oaks and New Delhi. www.sagepublications.com Vol. 8(4): 465–489; 1362–4806 DOI: 10.1177/1362480604046660

Security in Ambiguity

Embed Size (px)

DESCRIPTION

g

Citation preview

Page 1: Security in Ambiguity

Security in ambiguityTowards a radical security politics

WILLEM DE LINT AND SIRPA VIRTA

University of Windsor, Canada and University of

Tampere, Finland

Abstract

In this article we offer a reconceptualization of security thatattempts to reconcile a post-critical and normative agenda. Thearticle proceeds by unpacking features of the dominant securitydiscourse and then resituating the question in a radical politics. Wecontend that moving forward on this question requires a rejectionof the association between security, certainty and authority. Ratherthan following the classical realist view that security requiresexceptions from politics, we choose to see security as dependenton political uncertainty. Borrowing from Hanninen’s idea thatpolitics is ‘living with ambiguity’ and taking from post-Foucauldianthought against the violence of tyranny, we advocate the ongoingrepoliticization of the security field informed by harm reduction. Weoffer ‘security in ambiguity’ as a conceptualization of this synthesis.

Key Words

governmentality • policing • post-critical criminology • radicalpolitics • security

Introduction

Over the past decade there has been a convergence of internationalrelations and criminological literature on the security question. Under therubric of concepts like ‘human security’ and in the context of post-ColdWar, infowar and postmodern power considerations, security has been

465

Theoretical Criminology© 2004 SAGE Publications

London, Thousand Oaksand New Delhi.

www.sagepublications.comVol. 8(4): 465–489; 1362–4806

DOI: 10.1177/1362480604046660

Page 2: Security in Ambiguity

reconfigured to meet challenges from the ‘death of the social’ to the‘collapse’ of the nation state. Many analysts document the subordination ofpolitical process and practice to subpolitical, privatized and subcontractedbureaucratic elites. Emphasis is placed on local crime control and knowl-edge and minority participation in the grounding of security politics. Theoverwhelming focus of political thinking about security has been how to re-legitimate a public sphere of provision that is capable of accommodatingthe increasing plurality of demands for order. Network analyses and othertechniques have addressed the problem within a broadly liberal politicalframework and theorists have created new models of democratized securityproduction. Yet, it has been obvious to radical commentators that sover-eign power is not waning despite ‘governmentalization’. Emergency pow-ers, executive fiat, secrecy and public relations are palpable features ofgovernments from Washington to P’yongyang.

As Ole Wæver (1995) has written, the ‘securitization’ of social life is acondition in which issues are depoliticized and alternative ways of framingand responding to the problems of order are lost. In community safety andgovernance of crime literature, the term is understood and explored as anoutcrop of the mechanisms or methods of network building (communitysafety strategies, policy making and participation). Criminologists havealso noted that so powerful is the discourse of security that objections—arguments against security—are completely out of place (Neocleous,2000b: 8). The command to ‘think security’ instead of full employment,public education or the good society illustrates the depoliticizing potentialof crime prevention and community safety initiatives (see Neocleous,2000b: 12; Halsey, 2001: 396; McLaughlin et al., 2001: 313; Virta,2003).

A feature of post-critical understanding is that knowledge about securitycan foster political closure. In critical criminology there has not been equalexamination of the root of ‘security’ (Neocleous, 2000b: 8) and ‘politics’,particularly their interaction.1 In this article, we probe security by examin-ing it as a product of a dominant discourse characterized by positivism,elitism and dualism. After then resituating security in the context of anopen politics conceptualization, we advocate the ongoing repoliticization ofthe security field informed by the standpoint of radical resistance. Wecontend that this repoliticization must be informed not only by a rejectionof the association between security, certainty and authority but also by a re-stimulation of the ambiguity of the political.

Security in international relations and post-criticalcriminology

In international relations the framing of security draws on political realismand the view that the state is the principal actor in an international systemwhere the raison d’etre is the preservation or expansion of self-interest.

Theoretical Criminology 8(4)466

Page 3: Security in Ambiguity

According to Morgenthau (1954) the system of world politics is un-alterably anarchic and the implacable—but not overreaching—pursuit ofnational interests is the crux of good statecraft.2 It is also a long-standingtruism of political realism that the weak must align with the strong topreserve themselves and that this demands a relinquishment of someautonomy and independence. This view also relies on a domestic archi-tecture (see Carter, 2001), a Hobbesian state structure which consolidatesorder through the authority of sovereign rather than civil relations. Tradi-tional security issues founded in realist doctrine include war and peace,balance of power, proliferation and international economic relations.

A variety of critical theorists, including Krause (1997), Buzan et al.(1998) and McSweeney (1999) have expanded the security continuum toplay up the inter-linkages between varieties of actors. It is argued that ‘theemergent realities of material interdependence and patterns of interactionamong peoples is no longer reconcilable with ‘the inherited legal/politicalstructure of the nation-state system’ (Brown, 1998: 3). The exclusive focuson national laws and institutions (nation states and national governments)does not accommodate subnational, transnational and subpolitical devel-opments in the international system. The realist delimitation also over-estimates the role of coercive power in interstate and intrastate relations(see Brown, 1998). Additionally, realism, like structural functionalism insociology, fails to capture actors and actions as the product of deliberative,recursive and interpretive construction.

Nearer to ground level, it is managerialism, professional expertise,operational autonomy and now ‘common business sense’ that structuresdiscourse (and exclusions) on public security provision (Melossi, 1997;Young, 1999; Innes, 2001; Garland, 2002). In criminology informed bygovernmentality3 what is emphasized is the loosely coupled relationshipbetween the ‘culmination’ of the state and discrete means, includingpluralized delivery, partnerships, responsibilization and the intermediationof experts—or ‘government at a distance’ (Miller and Rose, 1990; Barry etal., 1996). Recent scholarship has explored the variety of sub- and supra-political authorities and investigated the many complex hybridizations ofpublic and private domains (Loader, 2000; Johnston and Shearing, 2003).Variegated, overlapping ‘bubbles’ or ‘nodes’ of governance are betterunderstood (Rigakos and Greener, 2000; Shearing and Wood, 2003), it isasserted, by giving attention to the specific and local disciplining orregulating mechanism in each ‘governable place’ (Smandych, 1999) inwhich the relation of subordination is effected (Garland, 1996; O’Malleyand Palmer, 1996). Space, community and the identity and habitat ofresidents are reconfigured in the name of security (Rose, 1999: 245). Suchpractices of ‘blanket securitization’ (Neocleous, 2000b: 8) have explicitlypolitical repercussions but they may not be easily contestable.

Contestation to secure the normative and material production andreproduction of government consistent with a neoliberal governmentalrationality occurs in time and space. However, governmentality work is

De Lint & Virta—Security in ambiguity 467

Page 4: Security in Ambiguity

ahistorical and non-normative (Rigakos, 2002) by design and thus carvesaway material interests and positions from analytical notice.4 Govern-mentality rejects ‘critique’ and tends to view politics as ‘mentalities of rule’instead of as social relations (O’Malley et al., 1997). If the effort is to movetowards the construction of a (more) democratic and open society, Fou-cault may be drawn on to comfort rather than contend those interested inmanaging high politics from positions of privilege.5 Indeed, it has beenargued that the whole field of criminal justice and crime control ought to berestructured to support rationalized policy-making premised on ‘best prac-tice’, ‘what works’ and a non-ideological and apolitical logic of cost-effective evaluation and audit (McLaughlin et al., 2001: 313). This mayalso inform local decision-making styles within policing partnerships,effectively displacing the political with the administrative (Virta, 2003).

To deter such security displacements may require, in addition to describ-ing processes, acknowledging conflict over politics and embracing at leastthe value of democracy. Large-scale conflicts creating a scarcity of securitymay be better explained by reference to what Stephen Gill calls ‘thedisintegration of social hegemonies and the formation of counter-hegemony in the global political economy’ (2003: 37). The (for some)outlawed term ‘hegemony’ refers to the conflict over values whichproduces tensions in the international system. In particular, these tensionsare evident where liberal democratic ideas and interests clash with the‘embedded mercantilist and statist perspectives’ (2003: 29) associated withthe security complex. Key to Gill’s thinking is the Gramscian differentiationbetween politics and the state. While Gramsci views the state as ‘a classbased apparatus of rule’ politics is the ‘search to establish conditions for thegood society’ (2003: 19).

For Foucault and many following him, Hobbes fails because security isalso if not mainly an accomplishment of governance beyond the state. Butfor Gramscians like Gill, the Hobbesian state structure fails because it‘lacks ethical credibility’ and because its political system is ‘not embeddedin a strong civil society’ (Gill, 2003: 33; see also Lustgarten and Leigh,1996). It is not extra-sovereign or extra-state security but extra-state goodsother than security which are important even for hegemony. State–civilsociety complexes like the states of the EU and the Anglo-Saxon countriesmay be hegemonic because they follow not the Hobbesian but the Lockeianmodel of vigorous and largely self-regulating civil society emphasis, provid-ing the possibility that an apparatus based on social inequality may yetdevelop into an ethical public sphere.6 To put this in Claude Lefort’s words,it is the ‘balance of ambiguity’ in democracies that has thus far preventedthe ‘agencies of power, law and knowledge from fusing into a single leadingorgan’ (in Scheureman, 1994: 229).

Ambiguity is indeed the proper stay against those tendencies of con-solidation destructive both of democracy and security. Today the balance ofambiguity is under pressure as a neophyte international state works to

Theoretical Criminology 8(4)468

Page 5: Security in Ambiguity

order relations of subordination (see Tilly, 1985). There is a furtherconsolidation of material interests in a politics which objectifies ‘security’as a scarce commodity. In the next section, we probe the discursivedelimitation of ‘security’ according to the realist narrative. We follow thisby looking at how ‘security’ may be contrasted to politics in a process thathas come to be known as ‘securitization’. We are most interested in furtherunpacking this relation, particularly, as both ‘political’ and ‘security’ isconstructed to discredit the ambiguous and uncertain with the lack ofgovernment.

Elements of the dominant security discourse

As a field of knowledge, security presents us with privileged or dominantconstructions.7 These emerge from constitutive tensions and disciplinarycontests played out in historical contexts. Accordingly, we may perceivesecurity by typifying its grounding. Standpoint is also a significant con-sideration, given our interest in security as an object of politics. Last, wenote one substantive feature of the dominant construction, namely, its non-transitivity.

First, what is the episteme of the dominant realist security narrative? AsWalzer (1977) demonstrates, it takes its genealogy from Thucydides, inparticular his observations about the Athenian decision to attack Melos.Interpretation of this historical incident has been converted into an ahistor-ical truism about the mandatory properties of a secure order. In ThomasHobbes’ Leviathan, and Machiavelli’s Prince, realist constructions areelaborated as the necessary conditions between authority and security(Walzer, 1977). This realism is succoured by Cartesian doubt and anxiety.It belongs with what Edwards (1997) more recently has described as a‘closed world’ epistemology in which the quest is the final measurement—and thereby control—of all objective threats. With the presumed necessityof the fixing of interpretation offered by the heurism of the Leviathan,security discourse is oriented towards the closure of the textual andcontextual antecedents. This makes the dominant security discourse ahis-torical and positivistic.

What of the standpoint of security analysis? Following the defaultepistemology, this lies with the privilege of leadership. It is from theviewpoint of leadership that technocratic and managerialist aims aredocumented (Gill, 2003). The dominant strain in the liberal tradition hasincorporated the notion that the norm emerges in the wake of the innova-tion of leadership (see Corrigan and Sayer, 1985; Tilly, 1985; Scheureman,1994). In addition to Machiavelli this takes from Nietzsche in abstractingpure leadership and accountability as antithetical; accountability is a formof subordination. The leader and the order are sequentially distinguished in

De Lint & Virta—Security in ambiguity 469

Page 6: Security in Ambiguity

terms of the requisite normativity that inheres. The G.W. Bush administra-tion, for instance, takes from the political philosophy of Carl Schmitt, whoargued that ‘classical legal norms are to make way for (normless) executiveand administrative decrees’ (Scheureman, 1994: 79). In the book, Bush atWar, Bob Woodward quotes Bush as saying, ‘that’s the interesting thingabout being the President. Maybe somebody needs to explain to me whythey say something, but I don’t feel like I owe anybody an explanation’(Woodward, 2002: A01). Only by such executive precedence or fiat cangovernmental administration be consolidated and national security guaran-teed. Accountability, as transparency to the norm, marks the termination orend of leadership.

Third, how is the analytic of security constructed? Consistent withpositivism and Cartesian dualism in policy talk, the term is deployed as ifit were an object that may be freed of constitutive relations and capable ofstanding as a clean, idealized signifier. It may then supplant ‘weaker’ policyagendas, such as the Aristotelian good. The utility of security for politicalexpediencies has contributed to this purification. Leaders, after all, must fixthe signifier, must privilege one value over another, and so prevent endlesssignification and indecision. Politics, in this construction, becomes techne:it is equated with techniques to simplify those significations and decisions.For example, in the United States, the Customer Assisted Passenger Profil-ing program known as CAPS II has been reviewed by the General Account-ing Office on its ability to differentiate ‘between terrorists and innocentpeople’ (Blumenthal, 2003). Similarly, a book written by two prominentneoconservatives, David Frum and Richard Perle, is entitled An End toEvil: How to Win the War on Terror.8 This is not merely a simplisticrendering of the social world into subjects and objects, however, because itutilizes value dualism recursively as a constructive choice or tool in theservice of power politics.

The ‘security wall’—a barrier separating Israel from the Palestinians—exemplifies the features of the dominant discourse: the episteme of positiv-ism, the standpoint of leadership impunity and the analytic in whichsecurity is cast as an object or commodity free of historical social relations.Although the actual object may be renamed to fit public relations prefer-ences, ‘security wall’ conveys this construction in which political transitiv-ity is fixed for security from the standpoint of privileged leadership. The USDepartment of Homeland Security’s threat advisory system is also illus-trative.9 The system—with colour-coded levels of threat from ‘low’,‘guarded’, ‘elevated’, ‘high’ to ‘severe’—continuously injects into publicpolicy and discourse the affirmation that security and political freedom areset against one another in a binary, zero-sum relation. The programme alsoenacts security as quantifiable and establishes the quantity by executiveauthority. This is attended by the suggestion that dangers are repelledthrough military or quasi-military strategy, even domestically. The stratifiedbinary of security and freedom and the militarization of domestic security

Theoretical Criminology 8(4)470

Page 7: Security in Ambiguity

are also seen in the recent innovation, the ‘designated free-speech zone’, inwhich protestors with placards unfavourable of the Bush administrationare quarantined by the secret service and local police out of sight of thepresident and the attendant press while favourable speech may be offeredin the presidential frame.

Realist security doctrine is also usefully pointed at in the proliferation ofhard security technologies and for-profit weapons, intelligence and infra-structure providers. In the relative absence of a public security lobby andunder the gaze of neoliberal privatizing and off-loading strategies, aninternational security market has emerged to promote the intersection ofviolence monopoly and private profit. Weapons manufacturers, infra-structure support providers, comprehensive ‘security’ companies, intelli-gence professionals and mercenaries10 have busily been competing forsecurity relations as a market prize. Increasingly in aid of transnationalcorporate (TNC) interests, these private security specialists prepare theworld’s ‘hot spots’ for TNC profit taking. The huge growth of theinternational security market11 has furthered the association of insecuritywith the absence or scarcity of military and corporate order.

Dominant security expertise is both disciplined and disciplining. It isproduced in the material spaces disciplined by funding flows, which aredominated by private and conservative public funding institutions. Thepresumptive dominance of the super-ordinate position then also invites thecollection of security knowledge according to the priority of the dominantorder. Insecurity is then cast with uncertainty as an object that may beintermediated through experts and their tools. Security experts also dis-cipline security, pointing to their own tools of intervention to ‘fix’ theproblem. Security, like psychiatry and criminology, in this way produces thepathology it alone may cure. Under such securitization the value ofindividual self-determination and politics is subordinated. More problem-atically, the balance of ambiguity is tilted against the political in favour ofdominant security crystallizations: governing slips into emergency manage-ment.12 Where security politics is dominated by realist discipline, securityorthodoxy displaces politics and heterodoxy, or knowledge of the veryconditions of our life and existence (Bourdieu, 1977).

Much thinking on security today has taken up the necessity in liberaldemocracies of accommodating an increasing plurality of demands fororder.13 Scholarship has also explored various means by which suchpluralities may be accommodated. We are concerned, particularly, ingetting behind how dominant security discourse shapes the contours ofpublic policy. Having, hopefully, placed the elements of the dominantdiscourse in stark relief, we now want to follow others in proposing analternative normative framework. We would like to offer some roughoutlines of a radical political theory of security—a radical politics ofresistance—and offer some thought on its implications for crime and itscontrol.

De Lint & Virta—Security in ambiguity 471

Page 8: Security in Ambiguity

Not falling for the security gap

The dominant realist discourse security, then, is understood as an objectstripped of contextuality, frame or observer. Uncertainty is displaced withknowledge, particularly knowledge about security as an object. Security isthen something made up with limits and boundaries. This is aided by apolitical philosophy that champions necessity and exceptionalism,14 se-crecy, public relations and strong leadership. Security must be knownthrough elite command of information. The authorized subject alone canproperly know. As a discursive mobilization this involves the discovery andproduction of substantive dimensions of security knowledge deficits,known as ‘security gaps’.15

The security gap is the space or ‘dark figure’ between the securitymeasures and quantities. The security episteme is grown as the elements ofsecurity are objectified, quantified, commodified and interdicted against.These become a regular and predictable stream of threats to be sought andprocessed. Security economies come to depend on the regular identificationof new risk markets (Rigakos, 2002) that may sustain the appetite forsecurity production. In the meantime, as security policy is entwined withauthority and sanctioned knowledge, vulnerabilities to irregular and sys-temically excluded sources of threat are ironically enhanced. The dominantsecurity episteme produces the social fact of insecurities, especially in theendless quest for new markets.16

As has been well documented by sociologists, this appetite of thedominant security episteme steals from social and political life. It is areading of cultural expression according to a superordinate view of in-stabilities. The mutual knowledge between experts and lay members of thepolity or civil society is not understood according to the Lockeian model asinsurance against the larger corrections of power imbalances. Rather, it ispolitics or ambiguity that is increasingly closed out, except as a target ofsecurity mobilizations.17

In order to meet the challenges posed by such thinking of security andgaps, constructivists argue for expanding the security frame. Securityexpertise has, to use Paris’s terms (2001: 97), broadened and deepenedbeyond statecraft to include disease, overpopulation, environmental scar-city and ecological degradation. The neorealistic school of Copenhagen, ledby Barry Buzan (1983, 1991; Buzan et al., 1998) pays heed to the notionthat security is a social construction and allows a more inclusive palette offorces. Given wide encouragement in the 1994 United Nations HumanDevelopment Report, ‘human security’ has also emerged as a broadcategory of research giving privilege to non-military and non-statethreats.18 In general, international relations constructivists argue for a moreholistic and ecological view of the security problem, one which seesexternal threats to states as a piece of a larger security ecology, whichincludes the claims of nations, groups, individuals, ecosystems, biodiversityand even the claim to self-determination of other species.19 The survival of

Theoretical Criminology 8(4)472

Page 9: Security in Ambiguity

societies, groups and individuals is the ‘for whom’ where the source of thethreat is redefined to include social, environmental and economic security(Paris, 2001: 98).

Radical or critical perspectives and governmentality conceptualizationsalso continue to look for a discursive context for the grounding ofvaluations: in the hegemony of political economy or in the practices ofgovernment under sovereign law, disciplinary normalization, or actuarialregulation. Accordingly, there can be no extrapolation of a security a prioriin, for instance, the ‘state of nature’; governmentalities productive ofsecurity relations may arise in the liminal spaces. So with respect to theepistemic position, we know that, unlike natural or first-order phenomena,security is already a ‘pre-ordered social structure’ that has been informedby the ‘collective agency of human beings [to] produce regularities that aremore or less institutionalized over time and space’ (Gill, 2003: 16).20 Muchwork has decoupled the binary of subject and object and security likepower is now commonly understood as a relation.

But what sort of regularities do we wish to engage in producing andaccording to which foundations? What if we begin with the notion of a gaprather than working towards it? It is the agency of the person thatrepresents a gap, after all: a gap of chance. Rather than viewing the lack ofauthoritative knowledge with gaps as insecure, why not begin with the gapas the wellspring of politics. To put it another way, the alternative toexpanding the security frame is to follow the logic of realism and narrow itaccording to the familiar axis of necessity—the necessity of politics ratherthan Leviathan. In the remainder of the article we conceptualize politics asthe fulcrum on which the problem of security must be situated. We thenaddress some substantive and normative features of a radical securitypolitics.

Security from politics

Numerous writers have reviewed how the political ought to be perceivedfor late modern times. Many (e.g. Mouffe, 1993; Bauman, 1997; Beck,1997) have challenged, as the Finnish political scientist Sakari Hanninenputs it, ‘undemocratic regimentality, governmentality or managementality’(2000: 27). In his own conceptualization, Hanninen argues that politicsmay be usefully defined with the term ‘living with ambiguity’. This followsthe Pocockian idea that politics ‘deals with the contingent event’ (inHanninen, 2000: 27). It is also consistent with Theodore Adorno’s defini-tion of the authoritarian personality: intolerance of ambiguity. Authoritar-ianism is an intolerance of relationships other than dominion or submissionand for the ambiguity that equal standing implies. It is identified with apredilection for decisive judgement and premature closure. A radicalsecurity politics, then, is both a rejection of authoritarianism and anembracing of ambiguity.

De Lint & Virta—Security in ambiguity 473

Page 10: Security in Ambiguity

It follows that the object of playing politics is relief from the in-determinacy and vulnerabilities of the political. Recourse to the dominantand familiar security discourse is one vehicle of sanctuary and authoriza-tion. This is what we mean to convey with the concept, ‘security frompolitics’. Here, political realism appeals because it promises to reduce theambiguities and contain the range and unpredictability of political actionand prescription according to a dominant reading of order. Under ajustificatory narrative for power consolidation it works to displace abstractprinciples (society, public, rights, justice) with concrete, finite relations (e.g.consumer–producer, leader–follower). Security is conceptualized in wayswhich privilege finitude, certainty, realism and executive authority so thatpotentially endless ambiguities may be cut short. Security talk offers avariety of closures when exercised to privilege the dominant discourse.

Squeezing security politics in this way is productive of a conditionvariously described along the lines of social and political control (Deleuze,1990; Hanninen, 2000; Innes, 2001; Garland, 2002).21 According toHanninen (2000), in a ‘society of control’ political action becomes anexternality. This is to say, politics is continually conceived as separate frompower and dangerous to order. The separations are aided by our inability toimagine politics as bounded in definite territorial and public space and byour thinking of ‘pure political events as always something which has justhappened or is about to happen’ (Hanninen, 2000: 30). Seen as a con-tingent event or a moment of chance, politics is the object of govern-mentalization (Holquist, 1997). It is a target of specific control practices,including criminalization, by various institutional arrangements such asnetworks or markets. Recent criminology on securitization documentsmany of the depolitizing strategies (Bayley and Shearing, 1996; O’Malleyand Palmer, 1996; Simon, 1997; Loader, 2000; McLaughlin et al., 2001). Inshort, where politics is a contingent event or a moment of chance—unpredictable, unanticipated, incalculable, ambiguous and alterable—thesociety of control is a condition in which the political is contained,controlled or pre-empted.

While liberal democracies require political institutions that are maxi-mally open to plural orders, the dominant discourse of thinking aboutsecurity holds that order depends on strong leadership. Today especially,we see the development of exceptionalism in both American foreign anddomestic security policy and in the policies of other governments followingthe American lead. Thus there is a great institutional dilemma wherepluralism is incessantly countermanded by security protocols. This isreflected, for instance, in the movement towards the intelligencification ofdiplomacy—which has seen CIA director George Tenet brokering a peaceaccord and Iraq inviting the CIA to monitor it. It is also perceptible in thecontinual politicization of intelligence, including the latest example inwhich even the political product of the regular intelligence services may bepurposely augmented to argue for a predetermined course.22 Intelligence,here, is already too subject to ambiguity and unpredictability: its politiciza-

Theoretical Criminology 8(4)474

Page 11: Security in Ambiguity

tion really means the production of a governmental politics along thecontours of a national security state (Holquist, 1997). Securitization, orsecurity from politics, is then also a movement towards the fusing ofknowledge, order and authority.

The application of equality, participation, even politics itself, retreats infront of ‘security from politics’ mobilizations. The society of control has anelective affinity with this security talk. Whether in the expression of theleadership imperative, expertise or popular opinion, the political arena is aforum in which the institutional disposition towards regularity, predictabil-ity and routinization gives weight to fascist subjectivities. But the tendencyis counter-hegemonic, that is, it moves from a balance of ambiguity and istherefore ultimately more insecure. In the remainder of the article, we willoffer a sketch of what may be necessary to counter the current trend: ingeneral, we support the contrary claim that ‘true’ security can only derivewhere multiple, shifting and plural orders are understood as constituent.

Towards a radical security politics

If security should not be understood as exclusive of politics, or a means ofsqueezing the range of the political, may it be conceived—radically—asdependent on ambiguity?

It is useful to begin with Deleuze and Guattari’s (1983) point that, bydefinition, a radical politics will not seek the regimentation of individualsaccording to a totalitarian system of norms. Rather, it will de-normalizeand de-individualize through a multiplicity of collective innovations againstpower. This is nicely summarized in Foucault’s preface of Deleuze andGuattari’s Anti-Oedipus: Capitalism and Schizophrenia:

Free political action from all unitary and totalizing paranoia, develop actionand thought by juxtaposition and disjunction, and not by subdivision andhierarchization, prefer what is positive and multiple, difference over uni-formity, flows over unities, mobile arrangements over systems. Believe thatwhat is productive is not sedentary but nomadic. Use political practice as anintensifier of thought, and analysis as a multiplier of the forms and domainsfor the intervention of political action. Do not become enamoured ofpower.

(Foucault in Deleuze and Guattari, 1983: xiii)

De-normalization might begin by collapsing the dominant viewpoint.Here, it is useful—to borrow also from Foucault—to remember that powerrelations conceive reversibility. Instead of security = certainty we mayperceive security = uncertainty. Uncertainty is the co-requisite of open or‘green world’ epistemology (Edwards, 1997)—where green world suggestsan indeterminate space receptive to magical (unknown) or transcendentalforces and ‘closed world’ discourses represent the ordering and fixing ofdiscipline. In the field of security relations, a centralized political powerdominant of civil society is hegemonically insecure (Gill, 2003). In the

De Lint & Virta—Security in ambiguity 475

Page 12: Security in Ambiguity

meantime, the organization of nation states far from offers protectionsagainst escalations of violence and death (Buzan, 1991). Where uncertaintyor ambiguity is a pre- and co-requisite of open democracies and wherefallibility is an antidote to tyranny, it is uncertainty that supports democ-racies and their security (see Lustgarten and Leigh, 1996). Support forgreen world discourse is also found in the biosphere. Biologists understandthe importance of diversity to ecosystem survival and management con-sidering the mutual interdependencies that pertain. In the field of cyberse-curity, too, open (green world) code is viewed by many as more robust thanproprietary (closed world) code because it must withstand regular attack.Security is a process in which the field of risks are cultivated in the serviceof ongoing and potential operations. Thus, normatively and substantively,security = uncertainty.

Can criminology marshal support for the thesis that uncertainty andambiguity is productive of security? John Braithwaite’s (1997) elaborationof Charles Tittle’s ‘control-balance’ (1995, 1997) offers a criminologicalreferent for Lefort’s contention that there must be a balance of ambiguityeven for the modest purpose of avoiding hegemonic breakdown. InBraithwaite’s conceptual simplification (1997: 86), predatory deviance maybe associated both with surpluses and deficits of control, or controlimbalances. Control deficits and surpluses are conducive to deviancebecause deviance results when motivation is triggered by provocation andenabled by the presence of opportunity and the absence of constraint. Onthe control surplus side, subordination feeds corruption by inviting abusesof power. When there is resistance to the control exercised, there is likelyresort to deviance to ensure the maintenance of the control surplus. On thedeficit side, when legitimate opportunities to exercise self-determination arestructurally wanting, frustration-aggression and humiliation are easilyconverted into predatory deviance. At the societal level, societies with largecontrol imbalances are expected to be more prone to deviance because theyproliferate more humiliation.

As Braithwaite rightly argues, Tittle’s theory supports a normative theoryof criminology: the republican redistribution of control. Control balance isalso consistent with our claims for a radical security politics findingsecurity in ambiguity. Here, it might be extrapolated that where there is asurplus of ambiguity or where personal security is dependent on a contextof relatively more dynamic contingency, the resultant condition is less likelyto engender the sort of deviations that attend conditions of surplus ordeficit. At the domestic level, there is a reduction of the frustrations and‘corrections’ of economic and violent ‘self-help’ (Black and Baumgartner,1980). Seen in terms of Hanninen’s interpretation of politics, the main-tenance of minor politics or a surfeit of ambiguity is the best check ondepoliticizing movements that produce the insecurities associated not onlywith predatory state crimes, but also the crises that attend nationalsecurity- and garrison-state formations (see Tapia-Valdes, 1982). Put sim-ply, ambiguity is an antidote to insecurity.

Theoretical Criminology 8(4)476

Page 13: Security in Ambiguity

We begin to see the outlines of a firmer position consistent with the anti-authoritarianism quoted earlier. We have highlighted the dominant con-structions and suggested where reversal is fruitful. This is largely a defenceof process that still leaves the substantive content of a widened politics inlimbo. But therein lies the rub. To advance a substantive agenda—to saywhat normatively merits inclusion in a radical security politics—is toundercut ambiguity as a good in itself. Yet, not to advance a normative goalis to fall back into the quagmire identified with post-Foucauldian malaise:to undercut any reason for making the argument in the first place. Thedifficulty is deepened because criminology and international relations areexpected to have policy utilities.

The problem, but perhaps also the solution, is telegraphed earlier inFoucault’s advice ‘not to become enamoured of power’. In his discussionwith Maoists, Foucault (1980) discredits the ‘people’s court’ as a reinvest-ment in power relations (the court) from which relief ought to be sought.Holloway (2002) similarly urges changing the world ‘without takingpower’. He suggests that the only way in which revolution can now beimagined is not as the conquest of power but as its dissolution. Refusal toaccept oppression, exploitation and dehumanization implies a non-instrumental concept of revolution, one without the object of domination.Thus refusal and anti-power, rather than counter-power, because asHolloway argues ‘once the logic of power is adopted, the struggle againstpower is already lost’ (2002: 17). All of which is to suggest that offering tosubstitute power-knowledge for what has been discredited gets us nowhere.On the contrary, after offering deconstructive reversals of the dominantsecurity position, it is necessary to step away from the urge for a newsynthesis or hegemony.

But this also suggests a way out which is consistent with radical securitypolitics. There is, in fact, a substantive agenda contained even in the call forde-normalization earlier. First, it calls for opening a space in which‘political practice may be an “intensifier of thought”’. The productive hereis ‘the nomadic’. This is a positive beseeching to make a project of openingup the space of ambiguity. Second, the backdrop or frame of this call toaction is already the violence of tyranny. This is harm not only to thepolitical or spaces of the political but also to persons occupying thosespaces. Harm reduction, it logically follows, may serve as a substantiverationale for this defence of space. A positive yet critical agenda might takea long view of harm reduction at the same time that it watches closely theprocesses of knowledge production. Consequently, while there can be nocompletely satisfactory resolution to the conundrum of power-knowledge,zemiology,23 or harm reduction, may guide the minimization of power‘deployment’ urged by Foucault. Security knowledge and security policy,like drug policy and crime policy more generally, can and has done muchharm, and this is why it is a reasonable object of deconstruction, inquiryand praxis.

De Lint & Virta—Security in ambiguity 477

Page 14: Security in Ambiguity

To restate: a radical security politics must serve to make the spaces ofpolitics from which security might emerge. It must then celebrate thedynamism of those spaces. Even doing only this still requires offering someminimal defence of such a project. We believe that since this is alreadyimplicitly consistent with the objective of harm minimization, particularlythe reduction of harm that derives from the defence of ambiguity, thesubstantive objective and even a kind of normativity may be reconciledwith the urgings to de-normalize and de-individualize. It may be possible toargue that both the broadening of the political and the vetting of securitypolicy ought to be undertaken with the aim of harm reduction.

Security in ambiguity

In his work on ‘superliberalism’, Roberto Unger (1994) argued that thestructure of political organization must be continually adaptive to minorpolitics. Political movements, to this way of thinking, represent the heart ofthe political. Holloway goes further than this and sees a shift from the‘politics of organization to a politics of events’ (2002: 214). Recentdemonstrations against neoliberal globalization are cited to exemplify this.These events are a literal and symbolic taking of ground for minorpolitics.

What might ensure that there is adequate politics in and for security? Atthe level of ‘high security’, for instance, many analysts (e.g. Herman, 2000)advocate the increased production and mobilization of what is called all-source intelligence by the usual security purveyors. These are encouraged tolink up with other CIA-modelled agencies in building elite knowledgenetworks. From our point of view, this will merely generate more knowl-edge and policy from the same institutional standpoint. More spies meansmore spying. Security in ambiguity, on the contrary, structures the processof security discovery to afford a multiplicity of standpoints and conduits,maximizing the chances of chance.24 Built on the politics of events ratherthan organization, it prioritizes the creation of contingent, open spaces andmakes institutions continuously accountable for harm reductions, or theharm that may come from or be prevented by the large array of institutionsserving or abusing the need for security. Security in ambiguity and for harmreduction means inserting security as a reason for opening up the politicalin the long-term aim of reducing catastrophic dangers. Practically, this maybe accomplished by subjecting institutions to unpredictability and to minor,particular, yet common interests. Ultimately, interdependency dictates notthe balkanization or privatization of benefits and risks in the protection ofenclaves, but rather security risk and benefit socialization and redistribu-tion in the re-stimulation of the social.

What concrete forms might this take? For example, security in ambiguitymight be exercised in a security lottery audit. Audit teams drawn by lotteryfrom a pool consisting of local citizens, political activists, extra-local

Theoretical Criminology 8(4)478

Page 15: Security in Ambiguity

security professionals and academic experts might be struck at chanceintervals or on demand from plebiscites. These would have access to thefiles of agencies and investigate according to an interpretation of plebiscitedemand or on their own initiative. The onus would not be on individualwrongdoing but on assuring compliance with the equitable distribution ofsecurity resources for sustainable harm reduction. The teams might alsoevaluate agencies’ compliance with the minimization of expenditures con-tributing to security objectification, commodification and privatization.

Such an expansion of minor politics requires meeting head-on theoverriding defensive impulse of security agencies towards harmonization,consolidation and regularity.25 Yet it also reaffirms a long tradition ofrepublican governance that holds that nurturance of multiple orders, not tomention a more certain hegemony, requires vigorous intake from belowand across the polity. Harm minimization consistent with republicanpolitics might involve the piecemeal re-dispersion of public and localcapacity (see Loader and Walker, 2001; Johnston and Shearing, 2003)across infrastructures from transportation to communication to voluntary,public initiatives. (Public safety is enhanced with more people using publictransportation.) It might also strengthen the subordinated version ofsecurity by continually exposing the vulnerabilities of single-order systemsand their suppressed or trivialized harms. Improvement of substantive andcritical knowledge and participatory equality is a pivotal criterion for thedelivery of security services for the common good of expanded harmreduction.

Security in ambiguity reverses the postulates of the dominant securitydiscourse. Certainty is not identified with order; knowledge about securityis not reduced in the discovery of and closure of gaps; vertical asymmetriesin power flows do not stave off uncertainty. Contrary to the practice ofscaling up comprehensive asymmetries between established power andpolitical marginality and thus inviting paradigmatic tensions and vulner-abilities (like 11 September), radical security policy begins with the pre-sumptive dependence of security politics on substantive democraticpractice. In security in ambiguity the dependency and conditionality ofexistence is the acceptable source of human aspirations. In this we mayfollow Arendt’s observation that political action by nature ‘always estab-lishes relationships and therefore has an inherent tendency to force open alllimitations and cut across all boundaries’ (1958: 190).

Where politics is understood not as denying but as living with ambiguity,it is the balance of ambiguity and control that becomes the preferredstandpoint. Security in ambiguity is shorthand for the resultant agenda.This follows constructivist thinking in the human security school ofinternational relations and some features of post-critical criminology con-sistent with a normative and democratizing purpose, particularly zemiol-ogy. Ambiguity is promoted with the hope of political process, and harmreduction is offered by way of normative ballast.

De Lint & Virta—Security in ambiguity 479

Page 16: Security in Ambiguity

Conclusion: security beyond gaps and limits

Security knowledge is regularly deployed to stay the political. The domin-ant security discourse characterized by positivism, elitism and dualism isvaunted to break the uncertainty of multiple orders. Against the anarchy ofthe international system and a pessimistic essentialization of the ‘natural’citizen-subject, commanding authority fixes otherwise perpetual doubt andindecision. Knowledge about security depends on the standpoint of eliteordering. Into the breach of this epistemic and institutional cavity, then, haspoured the weight of monopolistic capital production. Security knowledgeis a specialized enterprise that produces the very security scarcities whichonly it can properly serve. Instead of being perceived as process, security inthis and other ways comes to be reified and commodified as product.Security absences are meaningful as security gaps to be discovered andfilled—or depoliticized. The society of control is the juggernaut thatresults.

As criminologists turn from the ‘problem of order’ and ‘social control’ tothe problem of security as an object of inquiry, there is a danger. Just ascrime inquiry recursively fashioned criminology as a discipline which onlybelatedly noticed the multiplicity of the political (whose order?), so too isthe political too frequently an assumption or afterthought in criminologicalinquiries into security. In the most familiar of these, politics is dismissed inits negative construction as always already for power. Alternatively, it isassociated with popular justice as a space too dangerous to be left for ‘themany’ to occupy.

For us, the problem of security, like the problem of order, demandsimmediate reference to the political as a source of positive power. A politicsof marginality depends on ever-changing action against the terror of theunambiguous order. It requires bringing the genuine idea of the political andpolitics into the discourse at the outset. We believe that criminology cancontinue to benefit from political theory in assisting needed replenishment.We have thus followed, and then reversed, the familiar line of thinking thatjustifies security exceptions in the protection of the political.

At the same time, we also believe that there must be a substantivecounterweight that justifies the continual disclosure of democratic space. Ifcriminology very often has ignored or discredited the question ‘for whom?’it has also, and most recently, been dismissive of the question ‘for what?’ Inpost-critical work especially, discursive description for the most part is seenas sufficient and affirmative politics shunned. In this article, we have soughtto approach the problem of security both critically and normatively. Byway of providing a backstop to endless critique, we follow those who haveargued that harm reduction is the most reasonable limitation to otherwiseendless ambiguity.

It is our hope that we might stimulate further thinking and action thatwill undercut the persuasiveness of the dominant security discourse. Per-haps in no time in recent memory has it been clearer just how useful the

Theoretical Criminology 8(4)480

Page 17: Security in Ambiguity

production of danger is as an antidote to political participation. Theseattempts to freeze the political are beginning to engender widespreadresistances. We look forward to these resistances for the next lesson on howsecurity and the political might again be reframed.

Notes

1. Some literature touches on various aspects of the relation between securityand politics. This includes but is not limited to: Lustgarten and Leigh(1996); O’Malley and Palmer (1996); Young (1999); Loader (2000);Crawford (2002); Garland (2002); Hughes and Edwards (2002); Brodeuret al. (2003); Johnston and Shearing (2003); Shearing and Wood (2003).

2. According to the leading journal, International Security (‘Foreword’, Inter-national Security (1976) 1(1): 2), in security studies ‘embrace all of thosefactors that have a direct bearing on the structure of the nation state systemand the sovereignty of its members, with particular emphasis on the use,threat, and control of force’ (in Miller, 2001).

3. In criminology, the concept of security has lately benefited from govern-mentality studies. Building on Foucault’s ‘On Governmentality’ (1991) butalso on his sexuality and ethics genealogies, work examines governmentalrationalities that deploy a constellation of power practices to performdiscipline and regulation. For Foucault, security is a specific principle ofpolitical method and practice, which may combine with law, sovereigntyand discipline within various government structures. It is aimed at the‘ensemble of the population’ and becomes the dominant component ofmodern government from the 18th century onwards (Foucault, 1991).

4. It offers a rich toolkit of concepts to probe the site of security work, butthere is a normative non-disclosure underpinning Foucault and non-prescriptive approaches (see Taylor, 1986; Fraser, 1989). Foucauldianpower differentiates itself from radical power by suggesting that truthbelongs no more with the oppressed than the oppressor (see Digeser,1992).

5. To put it more mildly, if the approach does not contribute to the develop-ment of an alternative praxis (O’Malley et al., 1997), it may indirectlyendorse the status quo, even providing supporting legitimation. But theharder point is made by Fraser (1989) who argues that Foucault offerslittle rationale for the resistance to disciplinary power given the absorptionof the individual into it. Work has just begun to conceptualize theinterdependencies between governmentality, social liberal and Marxistresearch (Kerr, 1999; MacKinnon, 2000; Neocleous, 2000a; Rigakos,2002).

6. As Spierenburg (1984) and Raz (1990) have also shown, a crisis ofauthority cannot be resolved simply through greater reliance on coercionor control. Hegemony is unachievable where authorities do not possess thecapacity to claim authority with credibility.

De Lint & Virta—Security in ambiguity 481

Page 18: Security in Ambiguity

7. To recall the earlier Nietzschean Foucault (1972), a discourse has a will-to-truth, prohibitions and exclusions. It is argued by some political scientiststhat realism has become largely irrelevant or counterproductive to policyanalysts (e.g. Brown, 1998: 3). But post-11 September conduct by theUnited States would appear to confirm that American foreign policy hasmuch in common with Thucydides’ description of Athenian thoughtregarding Melos.

8. This thinking is lampooned by the American essayist Gore Vidal in hisbook entitled Perpetual War for Perpetual Peace (2002).

9. In March 2002, Homeland Security Chief Tom Ridge unveiled a new color-coded threat advisory system for the United States to convey the risk ofterrorist attacks to federal, state, local authorities and the Americanpeople. The coded warning system has five levels that are associated witha suggested protective measure and will trigger specific actions by federalagencies and local law enforcement.

10. As reported by Sam Vaknin (Insight Magazine, 5 August 2002), big moneyis involved. Before 11 September, it was estimated that the internationalsecurity market would be at $220 billion in 2010. This is up from $56billion in 1990 and a radical underestimation.

11. The list is long and growing, but includes Military Professional Resources,Sandline International, the now defunct Executive Operations, Haliburtanand Pacific Architects and Engineering, Control Risk Group and GraySecurity.

12. A phenomenon described by Scheureman (1994), among others.13. As work continues to frame more democratic security discourse it will

continue to be necessary to face squarely the particular assumption thatdemocratic debate and security knowledge are antithetical to the mobiliza-tion of order.

14. In, for example, the political science of Karl Schmitt, Leo Strauss andAlbert Wohlstetter and the sociology of elite theorists Robert Michels,Alfredo Pareto and Gaetano Mosca.

15. The Bush administration has trumpeted the dominant security narrative toreverse calls for more governmental openness under Clinton. In just twoexamples of governmental closure, it has privatized critical health andsafety information including data on the quality and vulnerability ofdrinking-water supplies, potential chemical hazards in communities andthe safety of airline travel and others forms of transportation. The USConsumer Product Safety Commission frequently withholds informationthat would allow public scrutiny of its product safety findings and productrecall actions (NOW, 14 December 2003).

16. For instance, there is a ‘public security gap’ or gulf between the securityknowledge and interests of the lay public and that of security specialists. At‘high policing’ (Brodeur, 1983) registers, we also see a normalization of an‘intelligence gap’ between security cleared officials and politicians andnational security procedures and claims across vast sectors of state ser-vices, not to mention geopolitical regions. Such fencing and fixing (of

Theoretical Criminology 8(4)482

Page 19: Security in Ambiguity

subjects from objects) calls for increasingly preventive and pre-emptivemeasures (once it is understood that dangers may be teased out of codarather than built structures).

17. A closed world approach to security policy depends upon the meaningful-ness of the green world and its dangerous latencies. So close is theinterdependency of security and insecurity that forward thinking securitymeasures depend on the simulation and regular production of insecurity(see Bogard, 1996). There is a constant appetite for further indeterminaciesor gaps.

18. As Paris reports, the ‘first major statement concerning human securityappeared in the 1994 Human Development Report’ (2001: 89) of theUnited Nations Development Programme (UNDP). This Report arguedthat human security means safety and protection from a wide range ofchronic threats and hurtful disruptions. Canada, one of the countries thathas established a ‘human security network’ with Norway, Austria, theNetherlands and several other countries, defines human security as ‘free-dom from pervasive threats to people’s rights, safety or lives’ (in Paris,2001: 90).

19. The human security school stresses a fact well known from biology tochaos theory: the interdependence of life and respect for diversity as adeterrent to catastrophic system failures, including extinction. The Internetis a result, in part, of American military thought that command andcontrol for the Cold War (and information wars) would be less vulnerableif decentralized or spread across physical and virtual space.

20. Despite their useful corrections these efforts still maintain security as thenearest object of social policy. It is still a container into which is poured aliquid concoction consisting of everything including security realism. Thisis because this deconstruction preserves the distinction between critical andmainstream. As Fuchs and Ward (1994: 506–7) argue:

Minds can process limited complexities and deal with limited uncertainty.Eventually, all organizations have to decide on and assume something, thenconceal these assumptions as blind spots and get on with their work . . . . Evenif they are critical and deconstructionist, organizations must, for example,assume that the distinction critical/mainstream is a good and productive one andbury this assumption in self-evident latencies.

21. Displacement is a term that refers rather to different literary genres andtexts than to politics and political theory. However, it has been used as astrategy (for instance by Derrida in gaming, with both Nietzsche’s ‘destruc-tion’ and Freud’s ‘distortion’). This seeks to shake up the dominant textualstructure and ‘make it tremble’. Displacement of politics can be charac-terized by certain specific features or problematizations. First, it inter-rogates spatial configurations which are heuristically constitutive ofpolitics to imagine politics no longer taking place in a definite territorial,public, bounded space, but rather in a global space of flows or points-circuits of all kinds (Hanninen, 2000). Additionally, displacement strategynot only addresses political action, but also the political, the substance of

De Lint & Virta—Security in ambiguity 483

Page 20: Security in Ambiguity

political events. It opens up political opportunities. In the domain of thepolitics of politics, or politics of knowledge, displacements of politics mayrefer to conceptual, narrative or epistemic transformations in how politicsis being conceived in a political action. And since conceptions of politicscondition the conduct of politics, conceptual, narrative and epistemic shiftsare situationally effective. Modifications and transformations within thedisplacement of politics address chance rather than change.

22. Such was what happened in the establishment of the Office of SpecialPlans, a secretive Pentagon war planning unit set up to provide intelligenceto support the 2003 Iraqi invasion on weapons of mass destruction(WMD) evidence. In the meantime, the USA insisted that it could actagainst Iraq on the strength of its own undisclosed findings of Iraqi WMDholdings, undermining the multilateral fact-finding mission. Despite the‘whitewash’ of Lord Dutton’s report on the ‘sexing up’ of the intelligencedocument, ‘Iraqi Weapons of Mass Destruction’, Prime Ministerial inter-ference with the British intelligence community’s assessment of Iraqi threatis also widely accepted as having occurred prior to the onset of thecoalition invasion in March of 2003 (see R. Liddle, The Spectactor, 31January 2004).

23. Zemiology is a branch of study whose adherents contend that the reduc-tion of social harm ought to be the larger aim of critical social policy.Attempts to create a new discipline on this orientation have come from theCentre for the Study of Poverty and Social Justice at the University ofBristol, England, among other places. The range of social harms includesbut is not limited to war, state violence and terrorism as well as poverty,malnutrition, pollution and disease (Hillyard et al., forthcoming).

24. The dominant view finds this dangerous to the conditions of democracy,but that view makes democracy only always a distant end—and never ameans (as Lustgarten and Leigh, 1996 demonstrate).

25. But when the UN Weapons Inspectors arrived in Iraq, they were to have noset programme of visits and unfettered access to any and all sites, docu-ments and people they deemed relevant. We can see that when thepowerful themselves demand accountability, anxiety about destabilizingdisorder and chaos is nowhere to be seen.

References

Arendt, Hannah (1958) The Human Condition. Chicago, IL: Chicago Uni-versity Press.

Bajpai, Kanti (2000) Human Security: Concept and Measurement. Kroc In-stitute Occasional Paper No. 19: OP:1. Notre Dame, IN: University of NotreDame.

Barry, Andrew, T. Osborne and N. Rose (1996) Foucault and Political Reason:

Theoretical Criminology 8(4)484

Page 21: Security in Ambiguity

Liberalism, Neo-Liberalism and Rationalities of Government. Chicago, IL:University of Chicago Press.

Bauman, Zygmaunt (1997) Postmodernity and Its Discontents. Cambridge:Polity.

Bayley, D. and C. Shearing (1996) ‘The Future of Policing’, Law and SocietyReview 30(3): 585–606.

Beck, Ulrich (1997) The Reinvention of Politics: Rethinking Modernity in theGlobal Social Order. Trans. Paul Ritter and Mark Ritter. Cambridge: PolityPress.

Black, Donald and M.P. Baumgartner (1980) ‘On Self-Help in Modern Society’in Donald Black (ed.) The Manners and Customs of the Police, pp. 193–208.New York: Academic Press.

Blumenthal, M. (2003) ‘Data Debase: The Powerful Technology Known asData Mining—and How, in the Government’s Hands, It Could Become aCivil Libertarian’s Nightmare’, The American Prospect Online, 19 De-cember.

Bogard, William (1996) The Simulation of Surveillance: Hypercontrol inTelematic Societies. Cambridge: Cambridge University Press.

Bourdieu, Pierre (1977) Outline of a Theory of Practice. Cambridge: Cam-bridge University Press.

Braithwaite, John (1997) ‘Charles Tittle’s ‘Control Balance’ and CriminologicalTheory’, Theoretical Criminology 1(1): 77–97.

Brodeur, Jean-Paul (1983) ‘High Policing and Low Policing: Remarks about thePolicing of Political Activities’, Social Problems 30(5): 507–20.

Brodeur, Jean-Paul, P. Gill and D. Tollborg (2003) Democracy, Law andSecurity. Aldershot: Ashgate.

Brown, Seymour (1998) ‘World Interests and the Changing Dimensions ofSecurity’, in M. Klare and Y. Chandrani (eds) World Security, pp. 1–17. NewYork: St Martins.

Buzan, Barry (1983) People, States and Fear: The National Security Problem inInternational Relation. Boulder, CO: Lynne Rienner Co.

Buzan, Barry (1991) People, States and Fear: An Agenda for InternationalSecurity Studies in the Post-Cold War Era. Boulder, CO: Lynne RiennerCo.

Buzan, Barry, O. Weaver and J. de Wilde (1998) Security: A New Frameworkfor Analysis. Boulder, CO: Lynne Rienner Co.

Carter, Ashton (2001) ‘The Architecture of Government in the Face of Terror-ism’, International Security 26(3): 5–23.

Corrigan Peter and D. Sayer (1985) The Great Arch: English State Formationas Cultural Revolution. New York: Blackwell.

Crawford, Adam (ed.) (2002) Crime and Insecurity: The Governance of Safetyin Europe. Devon, UK: Willan Publishing.

Deleuze, Gilles (1990) Logic of Sense. New York: Columbia University Press.Deleuze, Gilles and F. Guattari (1983) Anti-Oedipus: Schizophrenia and Capi-

talism. Minneapolis, MN: University of Minnesota Press.

De Lint & Virta—Security in ambiguity 485

Page 22: Security in Ambiguity

Digeser, P. (1992) ‘The Fourth Face of Power’, Journal of Politics 54(4):977–1007.

Edwards, Paul (1997) The Closed World: Computers and the Politics ofDiscourse in the Cold World Era. Cambridge: MIT Press.

Foucault, Michel (1972) ‘The Discourse on Language’, in The Archaeology ofKnowledge and the Discourse on Language, pp. 215–37. New York: Pan-theon.

Foucault, Michel (1980) ‘On Popular Justice: A Discussion with Maoists’, inColin Gordon (ed.) Power/Knowledge: Selected Interviews and Other Writ-ings: 1972–1977, pp. 1–36. New York: Pantheon.

Foucault, Michel (1991) ‘On Governmentality’, in Graham Burchell, C. Gor-don and P. Miller (eds) The Foucault Effect, pp. 87–104. Chicago, IL:University of Chicago Press.

Fraser, Nancy (1989) Unruly Practices: Power, Discourse and Gender inContemporary Social Theory. Minneapolis, MN: University of MinnesotaPress.

Frum, David and Richard Perle (2003) An End to Evil: How to Win the Waron Terror. Random House.

Fuchs, Stephan and S. Ward (1994) ‘The Sociology and Paradoxes of Decon-struction: A reply to Agger’, American Sociological Review 59(4): 506–10.

Garland, David (1996) ‘The Limits of the Sovereign State: Strategies of CrimeControl in Contemporary Society’, British Journal of Criminology 36(4):445–71.

Garland, David (2002) The Culture of Control: Crime and Disorder inContemporary Society. Oxford: Oxford University Press.

Gill, Stephen (2003) Power and Resistance in the New World Order. Hounds-mills: Palgrave Macmillan.

Halsey, Mark J. (2001) ‘An Aesthetic of Prevention’, Criminal Justice 4(4):385–420.

Hanninen, Sakari (2000) ‘The Ghost of Politics in the Soft Machine’, in S.Hanninen and Vahamaki (eds) Displacement of Politics. SoPhi: University ofJyvaskyla.

Haraway, Donna (1985) ‘A Manifesto for Cyborgs: Science, Technology andSocialist Feminism in the Late 1980s’, Socialist Review 15(2): 56–107.

Herman, Michael (2000) Intelligence Services in the Information Age. London:Cass.

Hillyard, Paddy, C. Pantazis, D. Gordon and S. Tombs (forthcoming) SocialHarm: Beyond Criminology? London: Pluto Press.

Holloway, John (2002) Change the World without Taking Power: The Mean-ing of Revolution Today. London: Pluto Press.

Holquist, Peter (1997) ‘Information Is the Alpha and Omega of Our Work’:Bolshevik Surveillance in Its Pan-European Context’, Journal of ModernHistory 69(3): 415–50.

Hughes, Gordon and A. Edwards (2002) Crime Control and Community: TheNew Politics of Public Safety. Devon, UK: Willan Publishing.

Innes, Martin (2001) ‘Control Creep’, Sociological Research Online 6(3).

Theoretical Criminology 8(4)486

Page 23: Security in Ambiguity

Johnston, Les and C. Shearing (2003) Governing Security. London: Rout-ledge.

Kerr, D. (1999) ‘Beheading the King and Enthroning the Market: A Critique ofFoucauldian Governmentality’, Science and Society 63(2): 173–202.

Krause, Keith (1997) Critical Security Studies: Concepts and Cases. Minnea-polis, MN: University of Minnesota Press.

Loader, Ian (2000) ‘Plural Policing and Democratic Governance’, Social andLegal Studies 9(3): 323–45.

Loader, Ian and N. Walker (2001) ‘Policing as Public Good: Reconstituting theConnection between Policing and the State’, Theoretical Criminology 5(1):9–35.

Lustgarten, Laurence and I. Leigh (1996) In from the Cold: National Securityand Parliamentary Democracy. London: Oxford University Press.

MacKinnon, D. (2000) ‘Managerialism, Governmentality and the State: ANeo-Foucauldian Approach to Local Economic Governance’, Political Geog-raphy 19(3): 293–314.

McLaughlin, Eugene, J. Muncie and G. Hughes (2001) ‘The PermanentRevolution: New Labour, New Public Management and the Modernizationof Criminal Justice’, Criminal Justice 1(3): 301–18.

McSweeney, William (1999) Security, Identity and Interests: A Sociology ofInternational Relations. New York: Cambridge.

Melossi, Dario (1997) ‘State and Social Control: From the New World to theConstitution of the New Europe’, in R. Bergalli and C. Sumner (eds) SocialControl and Political Order, pp. 1–18. London: Sage Publications.

Miller, Peter and N. Rose (1990) ‘Political Rationalities and Technologies ofGovernment’, in S. Palonen and K. Hanninen (eds) Texts, Contexts, Con-cepts: Studies in Power in Language. Helsinki: The Finnish Political ScienceAssociation.

Miller, Steven E. (2001) ‘International Security at Twenty-Five: From OneWorld to Another’, International Security 26(1): 5–39.

Morgenthau, Hans (1954) Politics among Nations: The Struggle for Power andPeace. New York: Alfred Knopf.

Mouffe, Chantal (1993) The Return of the Political. London: Verso.Neocleous, Mark (2000a) The Fabrication of Social Order: A Critical Theory

of Police Power. London: Pluto Press.Neocleous, Mark (2000b) ‘Against Security’, Radical Philosophy March–April:

7–15.O’Malley, Pat and D. Palmer (1996) ‘Post-Keynesian Policing’, Economy and

Society 25(2): 137–55.O’Malley, Pat, L. Weir and C. Shearing (1997) ‘Governmentality, Criticism,

Politics’, Economy and Society 26(3): 501–17.Paris, Roland (2001) ‘Human Security: Paradigm Shift or Hot Air?’, Inter-

national Security 26(2): 87–102.Raz, J. (1990) Authority. Oxford: Basil Blackwell.Rigakos, George (2002) The New Parapolice: Risk Markets and Commodified

Social Control. Toronto: University of Toronto Press.

De Lint & Virta—Security in ambiguity 487

Page 24: Security in Ambiguity

Rigakos, George and D. Greener (2000) ‘Bubbles of Governance: PrivatePolicing and the Law in Canada’, Canadian Journal of Law and Society15(1): 145–85.

Rose, Nikolas (1999) Powers of Freedom. Reframing Political Thought. Cam-bridge: Cambridge University Press.

Scheureman, William (1994) Between the Norm and the Exception. Cam-bridge: MIT Press.

Shearing, C. and J. Wood (2003) ‘Nodal Governance, Democracy and the NewDenizens’, Journal of Law and Society 30(3): 400–19.

Simon, Jonathon (1997) ‘Governing through Crime’, in L. Friedman and G.Fisher (eds) The Crime Conundrum, pp. 171–90. New York: WestviewPress.

Smandych, Russell (1999) Governable Places: Reading in Governmentality andCrime Control. Aldershot: Ashgate.

Spierenburg, Peiter (1984) The Spectacle of Suffering: Executions and theEvolution of Repression. Cambridge: Cambridge University Press.

Tapia-Valdes, J.A. (1982) ‘A Typology of National Security Policies’, YaleJournal of World Public Order 9(10): 15–30.

Taylor, Charles (1986) ‘Foucault on Freedom and Truth’, in Foucault: ACritical Reader, pp. 152–82. Oxford: Basil Blackwell.

Tilly, Charles (1985) ‘War Making and State Making as Organized Crime’, inP. Evans, D. Rueschemeyer and T. Skocpol (eds) Bringing the State Back In,pp. 170–86. Cambridge: Cambridge University Press.

Tittle, Charles (1995) Control Balance: Toward a General Theory of Deviance.Boulder, CO: Westview.

Tittle, Charles (1997) ‘Thoughts Stimulated by Braithwaite’s Analysis of Con-trol Balance Theory’, Theoretical Criminology 1(1): 99–110.

Unger, Roberto (1994) ‘On Liberalism and Superliberalism’, in ChristopherWolfe and J.P. Hittinger (eds) Liberalism at the Crossroads. New Jersey:Roman & Littlefield.

Vidal, Gore (2002) Perpetual War for Perpetual Peace: How We Got to Be SoHated. New York: Thunder’s Mouth Press.

Virta, Sirpa (2003) ‘Politics Denied? The Problem of Participation in Policingand Security’, paper presented in the European Group of the Study ofDeviance and Social Control Conference, Helsinki, 1 September.

Wæver, Ole (1995) ‘Securitization and Desecuritization’, in R. Lipschutz (ed.)On Security, pp. 46–86. New York: Columbia University Press.

Walzer, Michael (1977) Just and Unjust Wars: A Moral Argument withHistorical Illustrations. New York: Basic Books.

Woodward, Bob (2002) ‘“Bush at War”: An Expansive World View—a Courseof “Confident Action”’, Washington Post, 19 November, A1.

Young, Jock (1999) The Exclusive Society. London: Sage Publications.

Theoretical Criminology 8(4)488

Page 25: Security in Ambiguity

WILLEM DE LINT is Associate Professor in Criminology, University ofWindsor, Canada. His recent research is on the interrelationships betweensecurity, policing and politics.

SIRPA VIRTA is Associate Professor in Security Management, Department ofManagement Studies, University of Tampere, Finland. Her recent researchis on police accountability and the political effects of harmonization inEuropean policing.

De Lint & Virta—Security in ambiguity 489