Skip to main content
Log in

Performative securitization: from conditions of success to conditions of possibility

  • Original Article
  • Published:
Journal of International Relations and Development Aims and scope Submit manuscript

Abstract

This piece develops a performative take on securitization theory. It argues that rather than seeing authority as a prerequisite for speaking security, we need to zoom in on how speaking security can be used to claim authority. Such acts of claiming authority are crucial to understand the current political struggles to redefine security. In order to do so, I make two claims taking securitization theory further, an iterative claim and a performative claim. One, following Derrida, we must open up what can be said about security, enabling an analysis of how the security logic is not only used, but also challenged and changed. Two, following Butler, we must open up who can speak security, seeing how speaking security can be used to take authority, rather than seeing authority as a precondition for speaking security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. The idea of securitization was developed by Ole Wæver. In its best-known form, it has been made part of a larger framework also including sectors and regional security complex theory. The larger combined theory, now invariably termed the Copenhagen School, was developed by Barry Buzan, Ole Wæver and Jaap de Wilde and laid out in the book Security: A New Framework for Analysis in 1998. Here, I engage only with securitization theory seen as distinct from the broader theoretical framework of the Copenhagen School.

  2. I use the terminology of two centres of gravity, ‘internalist’ and ‘externalist’, as helpfully identified by Holger Stritzel to distinguish the poststructuralist and the sociological aspects of the theory and their further development in second generation securitization analyses. See Stritzel (2007: 359) and Buzan et al. (1998: 31, 46–47).

  3. Derrida’s critique in Signature Event Context was followed by a fierce controversy with Searle’s more stringent interpretation of Austin (Derrida 1977/1988b). A more direct route from Austin to Searle in securitization analysis can also be taken and has been, quite successfully, e.g. Vuori, (2008) and Balzacq (2005). In these analyses, securitization is analysed as dependent on the conventionality of the speech act for its success.

  4. See, for instance, the recent volume by Balzacq (2015). For notable exceptions see Hansen (2011b) and Oren and Solomon (2015).

  5. For a contextual explanation of the importance of governance in shaping the security field see Hameiri and Jones (2013).

  6. This point resembles Wæver's elaboration of the theory’s quality as a ‘model that can be held against empirical instances to assess structural similarity’, arguing that ‘It is the very attempt at analysis through the concept of securitization that establishes what is distinct in new practices that do not immediately conform to normal patterns’ (Wæver 2011: 470).

  7. The external aspect of a speech act has two main conditions. One is the social capital of the enunciator, the securitizing actor, who must be in a position of authority’ (Buzan et al. 1998: 33).

  8. See Saugmann Andersen (2017) for a convincing middle ground.

  9. For a discussion about whether recourse to extraordinary emergency measures is, or should be, decisive of ‘successful’ securitization, see Huysmans (2011), Salter (2011), Williams (2011), Roe (2012), Trombetta (2008), Balzacq (2015), Floyd (2016: 677).

  10. Here, I follow the first underdeveloped centre of gravity that Holger Stritzel (2007) identifies in his identification of two centres of gravity in the theory.

  11. This reading lies close to the claim that ‘a speech act is interesting exactly because it holds the insurrecting potential to break the ordinary, to establish meaning that is not already in the context – it reworks or produces a context by the performative success of the act’ (Buzan et al. 1998: 46), but is at odds with the Bourdieusian understanding of field in the theory (ibid.: 25, 31–33, 46–47).

  12. See also Lupovici (2014), Balzacq (2011).

  13. Lene Hansen (2011b) has developed an account of the theory that highlights the structuring power of discourse and how securitizations are embedded in larger discursive structures. Here I wish to highlight the political power embedded in the act of security and how the security speech acts can work to challenge or sustain current power patterns, but the present approach is not methodologically incompatible with Hansen’s approach. Something similar is developed in Howell’s (2014) analysis of medicine as a strategy of security.

  14. The case of the 2011 Libya intervention and its aftermath is quite telling in this regard (Adler-Nissen and Pouliot 2014).

  15. As Weber (1998: 82) notes, there is a difference between performance as ‘a singular or deliberate “act” with a definite beginning and end’, and performativity ‘as the reiterative and citational practice by which discourse produces the effects that it names’. This difference, though, should not be overemphasized as the recent edition on International Relations and Performance by Edkins and Kear (2013) demonstrates. Weber’s authorship also demonstrates that she is in no way guilty of this.

  16. As Debrix (2002: 204) notes some analytical strategies point to normative principles and want to re-erect the salience of rules and norms of social activity, while others are performative in character.

  17. Hansen (2011a: 279) provides a convincing performative take on practices revealing how ‘routine’ practices are in fact taking place on a terrain that is much more contested and unstable than it appears.

  18. According to Huysmans, securitization's conception of the act implies an elitist vision of politics, because in the original conceptualization of the theory the rupture that a securitization brings about as a move into the unexpected and the unknown is embedded within the authority of the sovereign: ‘Exceptionalist acts are not ephemeral disruptions but key events that put the existing order in the balance; they posit politics as moments with decisional gravity – sovereign moments.’ (Huysmans 2011: 375) See also Saugmann Andersen (2017). Huysmans criticizes Butler for ‘devolving the sovereign power to decide arbitrarily to the many professionals who implement policies, including immigration officials, border guards and private security personnel’ (Huysmans 2011: 380). Yet, the point of Butler's ‘petty sovereigns’ who enact the sovereign power to decide arbitrarily is not to place a decisionist epistemology in the hands of these people, but to analyse how they embody sovereignty by acting security in an iterative and performative manner (Butler 2004: 56).

References

  • Abrahamsen, Rita, and Michael C. Williams. 2009. Security beyond the state: Global security assemblages in international politics. International Political Sociology 3 (1): 1–17.

    Google Scholar 

  • Adler-Nissen, Rebecca, and Vincent Pouliot. 2014. Power in practice: Negotiating the international intervention in Libya. European Journal of International Relations 20 (4): 889–911.

    Google Scholar 

  • Adler, Emanuel, and Vincent Pouliot. 2011. International practices. In Emanuel Adler and Vincent Pouliot, ed. Emanuel Adler, and Vincent Pouliot, 3–35. Cambridge: Cambridge Studies in International Relations, Cambridge University Press.

    Google Scholar 

  • Aradau, Claudia. 2012. Security, war, violence—the politics of critique: A reply to Barkawi. Millennium 41 (1): 112–123.

    Google Scholar 

  • Austin, John L. 1978. How to do Things with Words. Oxford: Oxford University Press.

    Google Scholar 

  • Balzacq, Thierry. 2005. The three faces of securitization: political agency, audience and context. European Journal of International Relations 11 (2): 171–201.

    Google Scholar 

  • Balzacq, Thierry. 2011. A theory of securitization: origins, core assumptions, and variants. In Securitization Theory: How security problems emerge and dissolve, ed. Thierry Balzacq, 1–30. London: Routledge.

    Google Scholar 

  • Balzacq, Thierry (ed.). 2015. Contesting Security, Strategies and Logics. Abingdon, Oxon: Routledge.

    Google Scholar 

  • Barnes, Barry. 2001. Practice as Collective Action. In The Practice Turn in Contemporary Theory, ed. Karin Knorr Cetina, Theodore R. Schatzki, and Eike von Savigny, 17–28. New York: Routledge.

    Google Scholar 

  • Bialasiewicz, Luiza, David Campbell, Stuart Elden, Stephen Graham, Alex Jeffrey, and Alison J. Williams. 2007. Performing security: The imaginative geographies of current US strategy. Political Geography 26 (4): 405–422.

    Google Scholar 

  • Biba, Sebastian. 2016. From securitization moves to positive outcomes: The case of the spring 2010 Mekong crisis. Security Dialogue 47 (5): 420–439.

    Google Scholar 

  • Bigo, Didier. 2002. Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global Local, Political 27 (1): 63–92.

    Google Scholar 

  • Bourbeau, P. 2014. Moving forward together: Logics of the securitisation process. Millennium—Journal of International Studies 43 (1): 187–206.

    Google Scholar 

  • Bright, Jonathan. 2012. Securitisation, terror, and control: Towards a theory of the breaking point. Review of International Studies 38 (4): 861–879.

    Google Scholar 

  • Bueger, Christian, and Frank Gadinger. 2014. International Practice Theory, New Perspectives. Houndsmill, Basingstoke, Hampshire: Palgrave Pivot.

    Google Scholar 

  • Butler, Judith. 1992. Contingent Foundations: Feminism and the Question of Postmodernism. In The Postmodern Turn: New Perspectives on Social Theory, ed. Steven Seidman, 3–21. London and New York: Routledge.

    Google Scholar 

  • Butler, Judith. 1993. Bodies That Matter. London: Routledge.

    Google Scholar 

  • Butler, Judith. 1997. Excitable Speech: A Politics of the Performative. London and New York: Routledge.

    Google Scholar 

  • Butler, Judith. 2004. Precarious Life, the Powers of Mourning and Violence. London: Verso.

    Google Scholar 

  • Butler, Judith. 2010. Frames of War: When is Life Grievable. London: Verso.

    Google Scholar 

  • Butler, Judith. 1990. Gender trouble: Feminism and the subversion of identity. London: Routledge.

    Google Scholar 

  • Buzan, Barry, and Ole Wæver. 1997. Slippery? contradictory? sociologically unstable? The Copenhagen school replies. Review of International Studies 23 (2): 143–152.

    Google Scholar 

  • Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.

    Google Scholar 

  • Ciuta, Felix. 2009. Security and the problem of context: A hermeneutical critique of securitisation theory. Review of International Studies 35 (2): 301–326.

    Google Scholar 

  • Corry, Olaf. 2012. Securitisation and “riskification”: Second-order security and the politics of climate change. Millennium 40 (2): 235–258.

    Google Scholar 

  • Côté, Adam. 2016. Agents without agency: Assessing he role of the audience in securitization theory. Security Dialogue 47 (6): 541–558.

    Google Scholar 

  • Debrix, Francois. 2002. Language as criticism: Assessing the merits of speech acts and discursive formations in international relations. New Political Science 24 (2): 201–219.

    Google Scholar 

  • Der Derian, James. 1995. The Value of Security: Hobbes, Marx, Nietzsche and Baudrillard. In On Security, ed. Ronnie D. Lipschutz, 24–45. New York: Columbia University Press.

    Google Scholar 

  • Derrida, Jacques (1977/1988a) Signature Event Context, in Jacques Derrida, Limited Inc., 1–21, Evanston: Northwestern University Press.

  • Derrida, Jacques (1977/1988b) Limited Inc a b c, in Jacques Derrida, Limited Inc., 29–110, Evanston: Northwestern University Press.

  • Derrida, Jacques (1982) Dissemination, trans. Barbara Johnson, Chicago: University of Chicago Press.

  • Deudney, Daniel. 1990. The case against linking environmental degradation and national security. Millennium 19 (3): 461–476.

    Google Scholar 

  • Edkins, Jenny. 2002. Forget trauma? Responses to September 11. International Relations 16 (2): 243–256.

    Google Scholar 

  • Edkins, Jenny, and Adrian Kear (eds.). 2013. International Politics and Performance, Critical Aesthetics and Creative Practice. New York: Routledge.

    Google Scholar 

  • Elbe, Stefan. 2006. Should HIV/AIDS be securitized? The ethical dilemmas linking HIV/AIDS and security. International Studies Quarterly 50 (1): 119–144.

    Google Scholar 

  • Fisher, Jonathan, and David M. Anderson. 2015. Authoritarianism and the securitization of development in Africa. International Affairs 91 (1): 131–151.

    Google Scholar 

  • Floyd, Rita. 2007a. Human security and the Copenhagen School’s securitization approach: Conceptualizing human security as a securitizing move. Human Security Journal 5 (Winter): 38–49.

    Google Scholar 

  • Floyd, Rita. 2007b. Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh Schools of security studies. Review of International Studies 33: 327–350.

    Google Scholar 

  • Floyd, Rita. 2011. Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue 42 (4–5): 427–439.

    Google Scholar 

  • Floyd, Rita. 2016. Extraordinary or ordinary emergency measures: what, and who, defines the “success” of securitization? Cambridge Review of International Affairs 29 (2): 677–694.

    Google Scholar 

  • Grayson, Kyle. 2008. Human security as power/knowledge: The biopolitics of a definitional debate. Cambridge Review of International Affairs 21 (3): 383–401.

    Google Scholar 

  • Hameiri, Shahar, and L.E.E. Jones. 2013. The politics and governance of non-traditional security. International Studies Quarterly 57 (3): 462–473.

    Google Scholar 

  • Hansen, Lene. 2000. The little Mermaid’s silent security dilemma and the absence of gender in the Copenhagen School. Millennium 29 (2): 285–306.

    Google Scholar 

  • Hansen, Lene. 2011a. Performing practices. In International Practices, ed. Emanuel Adler, and Vincent Pouliot, 280–309. Cambridge: Cambridge Studies in International Relations, Cambridge University Press.

    Google Scholar 

  • Hansen, Lene. 2011b. The politics of securitization and the Muhammad cartoon crisis: A post-structuralist perspective. Security Dialogue 42 (4–5): 357–369.

    Google Scholar 

  • Hansen, Lene. 2012. Reconstructing desecuritisation: The normative-political in the Copenhagen School and directions for how to apply it. Review of International Studies 38 (3): 525–546.

    Google Scholar 

  • Howell, Alison. 2014. The global politics of medicine: Beyond global health, against securitisation theory. Review of International Studies 40 (5): 961–987.

    Google Scholar 

  • Huysmans, Jef. 2011. What’s in an act? On security speech acts and little security nothings. Security Dialogue 42 (4–5): 371–383.

    Google Scholar 

  • Huysmans, Jef. 2006. The Politics of Insecurity. Fear, migration and asylum in the EU. London and New York: Routledge.

    Google Scholar 

  • Haacke, Jürgen, and Paul D. Williams. 2008. Regional arrangements, securitization, and transnational security challenges: The African Union and the Association of Southeast Asian Nations Compared. Security Studies 17 (4): 775–809.

    Google Scholar 

  • Jef, Huysmans. 1998. Revisiting Copenhagen: Or, on the creative development of a security studies Agenda in Europe. European Journal of International Relations 4 (4): 479–506.

    Google Scholar 

  • Klüfers, Philipp. 2014. Security repertoires: Towards a sociopragmatist framing of securitization processes. Critical Studies on Security 2 (3): 278–292.

    Google Scholar 

  • Krause, Keith. 2008. Building the agenda of human security: policy and practice within the Human Security Network. International Social Science Journal 59 (193): 65–79.

    Google Scholar 

  • Laffey, Mark. 2000. Locating identity: performativity, foreign policy and state action. Review of International Studies 26 (3): 429–444.

    Google Scholar 

  • Lupovici, Amir. 2014. The limits of securitization theory: Observational criticism and the curious absence of Israel. International Studies Review 16 (3): 390–410.

    Google Scholar 

  • MacKenzie, Megan. 2009. Securitization and desecuritization: Female soldiers and the reconstruction of women in post-conflict Sierra Leone. Security Studies 18 (2): 241–261.

    Google Scholar 

  • Macmillan, Lorraine. 2015. Children, civilianhood, and humanitarian securitization. Critical Studies on Security 3 (1): 62–76.

    Google Scholar 

  • McDonald, Matt. 2008. Securitization and the construction of security. European Journal of International Relations 14 (4): 563–587.

    Google Scholar 

  • McInnes, Colin, and Simon Rushton. 2013. HIV/AIDS and securitization theory 1. European Journal of International Relations 19 (1): 115–138.

    Google Scholar 

  • Neumann Iver, Iver B. 2002. Returning practice to the linguistic turn: The case of diplomacy. Millennium: Journal of International Studies 31 (3): 627–653.

    Google Scholar 

  • Newman, Edward. 2010. Critical human security studies. Review of International Studies 36 (1): 77–94.

    Google Scholar 

  • Oels, Angela. 2012. From “Securitization” of Climate Change to “Climatization” of the Security Field: Comparing Three Theoretical Perspectives. In Climate Change, Human Security and Violent Conflict, 185–205, Hexagon Series on Human and Environmental Security and Peace 8, ed. Jürgen Scheffran, et al. Berlin and Heidelberg: Springer.

    Google Scholar 

  • Oren, Ido, and Ty Solomon. 2015. WMD, WMD, WMD: Securitization through ritualised incantation of ambiguous phrases. Review of International Studies 41: 313–336.

    Google Scholar 

  • Pouliot, Vincent. 2008. The logic of practicality: A theory of practice of security communities. International Organization 62 (2): 257–288.

    Google Scholar 

  • Pouliot, Vincent, and Jérémie Cornut. 2015. Practice theory and the study of diplomacy: A research agenda. Cooperation and Conflict 50 (3): 297–315.

    Google Scholar 

  • Pram Gad, Ulrik, and Karen Lund Petersen. 2011. Concepts of politics in securitization studies. Security Dialogue 42 (4–5): 315–328.

    Google Scholar 

  • Rasmussen, Joel. 2015. Should each of us take over the role as watcher?” Attitudes on Twitter towards the 2014 Norwegian terror alert. Journal of Multicultural Discourses 10 (2): 197–213.

    Google Scholar 

  • Rasmussen, Mikkel Vedby. 2001. Reflective security: NATO and international risk society. Millennium 30 (2): 285–309.

    Google Scholar 

  • Roe, Paul. 2012. Is securitization a “negative” concept? Revisiting the normative debate over normal versus extraordinary politics. Security Dialogue 43 (3): 249–266.

    Google Scholar 

  • Salter, Mark B. 2011. When securitization fails: the hard case of counter-terrorism programs. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 116–132. London: Routledge.

    Google Scholar 

  • Salter, Mark B., and Can E. Mutlu. 2013. Securitisation and Diego Garcia. Review of International Studies 39 (4): 815–834.

    Google Scholar 

  • Saugmann Andersen, Rune. 2017. Video, algorithms and security: How digital video platforms produce post-sovereign security articulations. Security Dialogue 48 (4): 354–372.

    Google Scholar 

  • Schatzki, Theodore R., Karin Knorr Cetina, and Eike Von Savigny (eds.). 2001. The Practice Turn in Contemporary Theory. London and New York: Routledge.

    Google Scholar 

  • Snowden, Edward (2014) ‘Statement from Edward Snowden in Moscow’, 28 February. https://wikileaks.org/Statement-from-Edward-Snowden-in.html.

  • Stritzel, Holger. 2007. Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations 13 (3): 357–383.

    Google Scholar 

  • Stritzel, Holger. 2011. Security, the translation. Security Dialogue 42 (4–5): 343–355.

    Google Scholar 

  • Stritzel, Holger. 2012. Securitization, power, intertextuality: Discourse theory and the translations of organized crime. Security Dialogue 43 (6): 549–567.

    Google Scholar 

  • Stritzel, Holger. 2014. Security in Translation: Securitization Theory and the Localization of Threat. In New Security Challenges, ed. S. Croft. Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • Stritzel, Holger, and Sean C. Chang. 2015. Securitization and counter-securitization in Afghanistan. Security Dialogue 46 (6): 548–567.

    Google Scholar 

  • Trombetta, Maria Julia. 2014. Linking climate-induced migration and security within the EU: insights from the securitization debate. Critical Studies on Security 2 (2): 131–147.

    Google Scholar 

  • Trombetta, Maria Julia. 2008. Environmental security and climate change: analysing the discourse. Cambridge Review of International Affairs 21 (4): 585–602.

    Google Scholar 

  • Tromble, Rebekah. 2014. Securitising Islam, securitising ethnicity: the discourse of Uzbek radicalism in Kyrgyzstan. East European Politics 30 (4): 526–547.

    Google Scholar 

  • Vaughn, Jocelyn. 2009. The unlikely securitizer: Humanitarian organizations and the securitization of indistinctiveness. Security Dialogue 40 (3): 263–285.

    Google Scholar 

  • Vuori, Juha A. 2008. Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders. European Journal of International Relations 14 (1): 65–99.

    Google Scholar 

  • Wæver, Ole. 1995. Securitization and Desecuritization. In On Security, ed. Ronnie D. Lipschutz, 46–86. New York: Columbia University Press.

    Google Scholar 

  • Wæver, Ole. 1999. Securitizing sectors? Reply to Eriksson. Cooperation and Conflict 34 (3): 334–340.

    Google Scholar 

  • Wæver, Ole. 2003. Securitization: Taking Stock of a Research Programme. Chicago: PIPES (University of Chicago).

    Google Scholar 

  • Wæver, Ole. 2004. ‘Ole Wæver’s 10’, Tidsskriftet Politik. http://www.tidsskriftetpolitik.dk/index.php?id=125. Accessed 21 December, 2017.

  • Wæver, Ole. 2009. ‘Theorizing Security Politically: Speech Act Theories of Securitization between Socio-Linguistic Pragmatics and Prescriptive Philosophy’, unpublished manuscript.

  • Wæver, Ole. 2011. Politics, security, theory. Security Dialogue 42 (4–5): 465–480.

    Google Scholar 

  • Wæver, Ole. 2015. The theory act: Responsibility and exactitude as seen from securitization. International Relations 29 (1): 121–127.

    Google Scholar 

  • Watson, Scott. 2011. The “human” as referent object? Security Dialogue 42 (1): 3–20.

    Google Scholar 

  • Weber, Cynthia. 1998. Performative states. Millennium—Journal of International Studies 27 (1): 77–95.

    Google Scholar 

  • Wibben, Annick T.R. 2016. Opening security: recovering critical scholarship as political. Critical Studies on Security 4 (2): 137–153.

    Google Scholar 

  • Williams, Michael C. 2003. Words, images, enemies: securitization and international politics. International Studies Quarterly 47 (4): 511–531.

    Google Scholar 

  • Williams, Michael C. 2015. Securitization as political theory: The politics of the extraordinary. International Relations 29 (1): 114–120.

    Google Scholar 

Download references

Acknowledgements

I would like to thank my colleagues at the Centre for Advanced Security Studies (CAST), University of Copenhagen, for their support and advice through the process. Most particularly Ole Wæver for being a huge inspiration for my work and for his generous comments on this piece at various stages. Ulrik Pram Gad, Martin Holbraad, Trine Villumsen Berling and Karen Lund Petersen deserve special thanks for their contributions to and engagement with the arguments of the article. Lene Hansen deserves much praise for providing plenty and timely advice in the process of publication. I would also like to thank the reviewers for their precise, thorough and useful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lise Philipsen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Philipsen, L. Performative securitization: from conditions of success to conditions of possibility. J Int Relat Dev 23, 139–163 (2020). https://doi.org/10.1057/s41268-018-0130-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1057/s41268-018-0130-8

Keywords

Navigation