Abstract
This piece develops a performative take on securitization theory. It argues that rather than seeing authority as a prerequisite for speaking security, we need to zoom in on how speaking security can be used to claim authority. Such acts of claiming authority are crucial to understand the current political struggles to redefine security. In order to do so, I make two claims taking securitization theory further, an iterative claim and a performative claim. One, following Derrida, we must open up what can be said about security, enabling an analysis of how the security logic is not only used, but also challenged and changed. Two, following Butler, we must open up who can speak security, seeing how speaking security can be used to take authority, rather than seeing authority as a precondition for speaking security.
Similar content being viewed by others
Notes
The idea of securitization was developed by Ole Wæver. In its best-known form, it has been made part of a larger framework also including sectors and regional security complex theory. The larger combined theory, now invariably termed the Copenhagen School, was developed by Barry Buzan, Ole Wæver and Jaap de Wilde and laid out in the book Security: A New Framework for Analysis in 1998. Here, I engage only with securitization theory seen as distinct from the broader theoretical framework of the Copenhagen School.
I use the terminology of two centres of gravity, ‘internalist’ and ‘externalist’, as helpfully identified by Holger Stritzel to distinguish the poststructuralist and the sociological aspects of the theory and their further development in second generation securitization analyses. See Stritzel (2007: 359) and Buzan et al. (1998: 31, 46–47).
Derrida’s critique in Signature Event Context was followed by a fierce controversy with Searle’s more stringent interpretation of Austin (Derrida 1977/1988b). A more direct route from Austin to Searle in securitization analysis can also be taken and has been, quite successfully, e.g. Vuori, (2008) and Balzacq (2005). In these analyses, securitization is analysed as dependent on the conventionality of the speech act for its success.
For a contextual explanation of the importance of governance in shaping the security field see Hameiri and Jones (2013).
This point resembles Wæver's elaboration of the theory’s quality as a ‘model that can be held against empirical instances to assess structural similarity’, arguing that ‘It is the very attempt at analysis through the concept of securitization that establishes what is distinct in new practices that do not immediately conform to normal patterns’ (Wæver 2011: 470).
‘The external aspect of a speech act has two main conditions. One is the social capital of the enunciator, the securitizing actor, who must be in a position of authority’ (Buzan et al. 1998: 33).
See Saugmann Andersen (2017) for a convincing middle ground.
Here, I follow the first underdeveloped centre of gravity that Holger Stritzel (2007) identifies in his identification of two centres of gravity in the theory.
This reading lies close to the claim that ‘a speech act is interesting exactly because it holds the insurrecting potential to break the ordinary, to establish meaning that is not already in the context – it reworks or produces a context by the performative success of the act’ (Buzan et al. 1998: 46), but is at odds with the Bourdieusian understanding of field in the theory (ibid.: 25, 31–33, 46–47).
Lene Hansen (2011b) has developed an account of the theory that highlights the structuring power of discourse and how securitizations are embedded in larger discursive structures. Here I wish to highlight the political power embedded in the act of security and how the security speech acts can work to challenge or sustain current power patterns, but the present approach is not methodologically incompatible with Hansen’s approach. Something similar is developed in Howell’s (2014) analysis of medicine as a strategy of security.
The case of the 2011 Libya intervention and its aftermath is quite telling in this regard (Adler-Nissen and Pouliot 2014).
As Weber (1998: 82) notes, there is a difference between performance as ‘a singular or deliberate “act” with a definite beginning and end’, and performativity ‘as the reiterative and citational practice by which discourse produces the effects that it names’. This difference, though, should not be overemphasized as the recent edition on International Relations and Performance by Edkins and Kear (2013) demonstrates. Weber’s authorship also demonstrates that she is in no way guilty of this.
As Debrix (2002: 204) notes some analytical strategies point to normative principles and want to re-erect the salience of rules and norms of social activity, while others are performative in character.
Hansen (2011a: 279) provides a convincing performative take on practices revealing how ‘routine’ practices are in fact taking place on a terrain that is much more contested and unstable than it appears.
According to Huysmans, securitization's conception of the act implies an elitist vision of politics, because in the original conceptualization of the theory the rupture that a securitization brings about as a move into the unexpected and the unknown is embedded within the authority of the sovereign: ‘Exceptionalist acts are not ephemeral disruptions but key events that put the existing order in the balance; they posit politics as moments with decisional gravity – sovereign moments.’ (Huysmans 2011: 375) See also Saugmann Andersen (2017). Huysmans criticizes Butler for ‘devolving the sovereign power to decide arbitrarily to the many professionals who implement policies, including immigration officials, border guards and private security personnel’ (Huysmans 2011: 380). Yet, the point of Butler's ‘petty sovereigns’ who enact the sovereign power to decide arbitrarily is not to place a decisionist epistemology in the hands of these people, but to analyse how they embody sovereignty by acting security in an iterative and performative manner (Butler 2004: 56).
References
Abrahamsen, Rita, and Michael C. Williams. 2009. Security beyond the state: Global security assemblages in international politics. International Political Sociology 3 (1): 1–17.
Adler-Nissen, Rebecca, and Vincent Pouliot. 2014. Power in practice: Negotiating the international intervention in Libya. European Journal of International Relations 20 (4): 889–911.
Adler, Emanuel, and Vincent Pouliot. 2011. International practices. In Emanuel Adler and Vincent Pouliot, ed. Emanuel Adler, and Vincent Pouliot, 3–35. Cambridge: Cambridge Studies in International Relations, Cambridge University Press.
Aradau, Claudia. 2012. Security, war, violence—the politics of critique: A reply to Barkawi. Millennium 41 (1): 112–123.
Austin, John L. 1978. How to do Things with Words. Oxford: Oxford University Press.
Balzacq, Thierry. 2005. The three faces of securitization: political agency, audience and context. European Journal of International Relations 11 (2): 171–201.
Balzacq, Thierry. 2011. A theory of securitization: origins, core assumptions, and variants. In Securitization Theory: How security problems emerge and dissolve, ed. Thierry Balzacq, 1–30. London: Routledge.
Balzacq, Thierry (ed.). 2015. Contesting Security, Strategies and Logics. Abingdon, Oxon: Routledge.
Barnes, Barry. 2001. Practice as Collective Action. In The Practice Turn in Contemporary Theory, ed. Karin Knorr Cetina, Theodore R. Schatzki, and Eike von Savigny, 17–28. New York: Routledge.
Bialasiewicz, Luiza, David Campbell, Stuart Elden, Stephen Graham, Alex Jeffrey, and Alison J. Williams. 2007. Performing security: The imaginative geographies of current US strategy. Political Geography 26 (4): 405–422.
Biba, Sebastian. 2016. From securitization moves to positive outcomes: The case of the spring 2010 Mekong crisis. Security Dialogue 47 (5): 420–439.
Bigo, Didier. 2002. Security and immigration: Toward a critique of the governmentality of unease. Alternatives: Global Local, Political 27 (1): 63–92.
Bourbeau, P. 2014. Moving forward together: Logics of the securitisation process. Millennium—Journal of International Studies 43 (1): 187–206.
Bright, Jonathan. 2012. Securitisation, terror, and control: Towards a theory of the breaking point. Review of International Studies 38 (4): 861–879.
Bueger, Christian, and Frank Gadinger. 2014. International Practice Theory, New Perspectives. Houndsmill, Basingstoke, Hampshire: Palgrave Pivot.
Butler, Judith. 1992. Contingent Foundations: Feminism and the Question of Postmodernism. In The Postmodern Turn: New Perspectives on Social Theory, ed. Steven Seidman, 3–21. London and New York: Routledge.
Butler, Judith. 1993. Bodies That Matter. London: Routledge.
Butler, Judith. 1997. Excitable Speech: A Politics of the Performative. London and New York: Routledge.
Butler, Judith. 2004. Precarious Life, the Powers of Mourning and Violence. London: Verso.
Butler, Judith. 2010. Frames of War: When is Life Grievable. London: Verso.
Butler, Judith. 1990. Gender trouble: Feminism and the subversion of identity. London: Routledge.
Buzan, Barry, and Ole Wæver. 1997. Slippery? contradictory? sociologically unstable? The Copenhagen school replies. Review of International Studies 23 (2): 143–152.
Buzan, Barry, Ole Wæver, and Jaap de Wilde. 1998. Security: A New Framework for Analysis. Boulder: Lynne Rienner.
Ciuta, Felix. 2009. Security and the problem of context: A hermeneutical critique of securitisation theory. Review of International Studies 35 (2): 301–326.
Corry, Olaf. 2012. Securitisation and “riskification”: Second-order security and the politics of climate change. Millennium 40 (2): 235–258.
Côté, Adam. 2016. Agents without agency: Assessing he role of the audience in securitization theory. Security Dialogue 47 (6): 541–558.
Debrix, Francois. 2002. Language as criticism: Assessing the merits of speech acts and discursive formations in international relations. New Political Science 24 (2): 201–219.
Der Derian, James. 1995. The Value of Security: Hobbes, Marx, Nietzsche and Baudrillard. In On Security, ed. Ronnie D. Lipschutz, 24–45. New York: Columbia University Press.
Derrida, Jacques (1977/1988a) Signature Event Context, in Jacques Derrida, Limited Inc., 1–21, Evanston: Northwestern University Press.
Derrida, Jacques (1977/1988b) Limited Inc a b c, in Jacques Derrida, Limited Inc., 29–110, Evanston: Northwestern University Press.
Derrida, Jacques (1982) Dissemination, trans. Barbara Johnson, Chicago: University of Chicago Press.
Deudney, Daniel. 1990. The case against linking environmental degradation and national security. Millennium 19 (3): 461–476.
Edkins, Jenny. 2002. Forget trauma? Responses to September 11. International Relations 16 (2): 243–256.
Edkins, Jenny, and Adrian Kear (eds.). 2013. International Politics and Performance, Critical Aesthetics and Creative Practice. New York: Routledge.
Elbe, Stefan. 2006. Should HIV/AIDS be securitized? The ethical dilemmas linking HIV/AIDS and security. International Studies Quarterly 50 (1): 119–144.
Fisher, Jonathan, and David M. Anderson. 2015. Authoritarianism and the securitization of development in Africa. International Affairs 91 (1): 131–151.
Floyd, Rita. 2007a. Human security and the Copenhagen School’s securitization approach: Conceptualizing human security as a securitizing move. Human Security Journal 5 (Winter): 38–49.
Floyd, Rita. 2007b. Towards a consequentialist evaluation of security: Bringing together the Copenhagen and the Welsh Schools of security studies. Review of International Studies 33: 327–350.
Floyd, Rita. 2011. Can securitization theory be used in normative analysis? Towards a just securitization theory. Security Dialogue 42 (4–5): 427–439.
Floyd, Rita. 2016. Extraordinary or ordinary emergency measures: what, and who, defines the “success” of securitization? Cambridge Review of International Affairs 29 (2): 677–694.
Grayson, Kyle. 2008. Human security as power/knowledge: The biopolitics of a definitional debate. Cambridge Review of International Affairs 21 (3): 383–401.
Hameiri, Shahar, and L.E.E. Jones. 2013. The politics and governance of non-traditional security. International Studies Quarterly 57 (3): 462–473.
Hansen, Lene. 2000. The little Mermaid’s silent security dilemma and the absence of gender in the Copenhagen School. Millennium 29 (2): 285–306.
Hansen, Lene. 2011a. Performing practices. In International Practices, ed. Emanuel Adler, and Vincent Pouliot, 280–309. Cambridge: Cambridge Studies in International Relations, Cambridge University Press.
Hansen, Lene. 2011b. The politics of securitization and the Muhammad cartoon crisis: A post-structuralist perspective. Security Dialogue 42 (4–5): 357–369.
Hansen, Lene. 2012. Reconstructing desecuritisation: The normative-political in the Copenhagen School and directions for how to apply it. Review of International Studies 38 (3): 525–546.
Howell, Alison. 2014. The global politics of medicine: Beyond global health, against securitisation theory. Review of International Studies 40 (5): 961–987.
Huysmans, Jef. 2011. What’s in an act? On security speech acts and little security nothings. Security Dialogue 42 (4–5): 371–383.
Huysmans, Jef. 2006. The Politics of Insecurity. Fear, migration and asylum in the EU. London and New York: Routledge.
Haacke, Jürgen, and Paul D. Williams. 2008. Regional arrangements, securitization, and transnational security challenges: The African Union and the Association of Southeast Asian Nations Compared. Security Studies 17 (4): 775–809.
Jef, Huysmans. 1998. Revisiting Copenhagen: Or, on the creative development of a security studies Agenda in Europe. European Journal of International Relations 4 (4): 479–506.
Klüfers, Philipp. 2014. Security repertoires: Towards a sociopragmatist framing of securitization processes. Critical Studies on Security 2 (3): 278–292.
Krause, Keith. 2008. Building the agenda of human security: policy and practice within the Human Security Network. International Social Science Journal 59 (193): 65–79.
Laffey, Mark. 2000. Locating identity: performativity, foreign policy and state action. Review of International Studies 26 (3): 429–444.
Lupovici, Amir. 2014. The limits of securitization theory: Observational criticism and the curious absence of Israel. International Studies Review 16 (3): 390–410.
MacKenzie, Megan. 2009. Securitization and desecuritization: Female soldiers and the reconstruction of women in post-conflict Sierra Leone. Security Studies 18 (2): 241–261.
Macmillan, Lorraine. 2015. Children, civilianhood, and humanitarian securitization. Critical Studies on Security 3 (1): 62–76.
McDonald, Matt. 2008. Securitization and the construction of security. European Journal of International Relations 14 (4): 563–587.
McInnes, Colin, and Simon Rushton. 2013. HIV/AIDS and securitization theory 1. European Journal of International Relations 19 (1): 115–138.
Neumann Iver, Iver B. 2002. Returning practice to the linguistic turn: The case of diplomacy. Millennium: Journal of International Studies 31 (3): 627–653.
Newman, Edward. 2010. Critical human security studies. Review of International Studies 36 (1): 77–94.
Oels, Angela. 2012. From “Securitization” of Climate Change to “Climatization” of the Security Field: Comparing Three Theoretical Perspectives. In Climate Change, Human Security and Violent Conflict, 185–205, Hexagon Series on Human and Environmental Security and Peace 8, ed. Jürgen Scheffran, et al. Berlin and Heidelberg: Springer.
Oren, Ido, and Ty Solomon. 2015. WMD, WMD, WMD: Securitization through ritualised incantation of ambiguous phrases. Review of International Studies 41: 313–336.
Pouliot, Vincent. 2008. The logic of practicality: A theory of practice of security communities. International Organization 62 (2): 257–288.
Pouliot, Vincent, and Jérémie Cornut. 2015. Practice theory and the study of diplomacy: A research agenda. Cooperation and Conflict 50 (3): 297–315.
Pram Gad, Ulrik, and Karen Lund Petersen. 2011. Concepts of politics in securitization studies. Security Dialogue 42 (4–5): 315–328.
Rasmussen, Joel. 2015. Should each of us take over the role as watcher?” Attitudes on Twitter towards the 2014 Norwegian terror alert. Journal of Multicultural Discourses 10 (2): 197–213.
Rasmussen, Mikkel Vedby. 2001. Reflective security: NATO and international risk society. Millennium 30 (2): 285–309.
Roe, Paul. 2012. Is securitization a “negative” concept? Revisiting the normative debate over normal versus extraordinary politics. Security Dialogue 43 (3): 249–266.
Salter, Mark B. 2011. When securitization fails: the hard case of counter-terrorism programs. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 116–132. London: Routledge.
Salter, Mark B., and Can E. Mutlu. 2013. Securitisation and Diego Garcia. Review of International Studies 39 (4): 815–834.
Saugmann Andersen, Rune. 2017. Video, algorithms and security: How digital video platforms produce post-sovereign security articulations. Security Dialogue 48 (4): 354–372.
Schatzki, Theodore R., Karin Knorr Cetina, and Eike Von Savigny (eds.). 2001. The Practice Turn in Contemporary Theory. London and New York: Routledge.
Snowden, Edward (2014) ‘Statement from Edward Snowden in Moscow’, 28 February. https://wikileaks.org/Statement-from-Edward-Snowden-in.html.
Stritzel, Holger. 2007. Towards a theory of securitization: Copenhagen and beyond. European Journal of International Relations 13 (3): 357–383.
Stritzel, Holger. 2011. Security, the translation. Security Dialogue 42 (4–5): 343–355.
Stritzel, Holger. 2012. Securitization, power, intertextuality: Discourse theory and the translations of organized crime. Security Dialogue 43 (6): 549–567.
Stritzel, Holger. 2014. Security in Translation: Securitization Theory and the Localization of Threat. In New Security Challenges, ed. S. Croft. Basingstoke: Palgrave Macmillan.
Stritzel, Holger, and Sean C. Chang. 2015. Securitization and counter-securitization in Afghanistan. Security Dialogue 46 (6): 548–567.
Trombetta, Maria Julia. 2014. Linking climate-induced migration and security within the EU: insights from the securitization debate. Critical Studies on Security 2 (2): 131–147.
Trombetta, Maria Julia. 2008. Environmental security and climate change: analysing the discourse. Cambridge Review of International Affairs 21 (4): 585–602.
Tromble, Rebekah. 2014. Securitising Islam, securitising ethnicity: the discourse of Uzbek radicalism in Kyrgyzstan. East European Politics 30 (4): 526–547.
Vaughn, Jocelyn. 2009. The unlikely securitizer: Humanitarian organizations and the securitization of indistinctiveness. Security Dialogue 40 (3): 263–285.
Vuori, Juha A. 2008. Illocutionary logic and strands of securitization: Applying the theory of securitization to the study of non-democratic political orders. European Journal of International Relations 14 (1): 65–99.
Wæver, Ole. 1995. Securitization and Desecuritization. In On Security, ed. Ronnie D. Lipschutz, 46–86. New York: Columbia University Press.
Wæver, Ole. 1999. Securitizing sectors? Reply to Eriksson. Cooperation and Conflict 34 (3): 334–340.
Wæver, Ole. 2003. Securitization: Taking Stock of a Research Programme. Chicago: PIPES (University of Chicago).
Wæver, Ole. 2004. ‘Ole Wæver’s 10’, Tidsskriftet Politik. http://www.tidsskriftetpolitik.dk/index.php?id=125. Accessed 21 December, 2017.
Wæver, Ole. 2009. ‘Theorizing Security Politically: Speech Act Theories of Securitization between Socio-Linguistic Pragmatics and Prescriptive Philosophy’, unpublished manuscript.
Wæver, Ole. 2011. Politics, security, theory. Security Dialogue 42 (4–5): 465–480.
Wæver, Ole. 2015. The theory act: Responsibility and exactitude as seen from securitization. International Relations 29 (1): 121–127.
Watson, Scott. 2011. The “human” as referent object? Security Dialogue 42 (1): 3–20.
Weber, Cynthia. 1998. Performative states. Millennium—Journal of International Studies 27 (1): 77–95.
Wibben, Annick T.R. 2016. Opening security: recovering critical scholarship as political. Critical Studies on Security 4 (2): 137–153.
Williams, Michael C. 2003. Words, images, enemies: securitization and international politics. International Studies Quarterly 47 (4): 511–531.
Williams, Michael C. 2015. Securitization as political theory: The politics of the extraordinary. International Relations 29 (1): 114–120.
Acknowledgements
I would like to thank my colleagues at the Centre for Advanced Security Studies (CAST), University of Copenhagen, for their support and advice through the process. Most particularly Ole Wæver for being a huge inspiration for my work and for his generous comments on this piece at various stages. Ulrik Pram Gad, Martin Holbraad, Trine Villumsen Berling and Karen Lund Petersen deserve special thanks for their contributions to and engagement with the arguments of the article. Lene Hansen deserves much praise for providing plenty and timely advice in the process of publication. I would also like to thank the reviewers for their precise, thorough and useful comments.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Philipsen, L. Performative securitization: from conditions of success to conditions of possibility. J Int Relat Dev 23, 139–163 (2020). https://doi.org/10.1057/s41268-018-0130-8
Published:
Issue Date:
DOI: https://doi.org/10.1057/s41268-018-0130-8