1,423
Views
14
CrossRef citations to date
0
Altmetric
Articles

A Systemic Approach to Security: Beyond the Tradeoff between Security and Liberty

, &
 

ABSTRACT

The concept of security has shifted from territorial integrity to human security and, after 9/11, to pre-emptive security. Based on the massive implementation of surveillance-oriented security technologies (SOSTs), pre-emptive security emphasizes anticipation of threats and risk management. While liberty and security get framed as standing in a trade-off, SOSTs are massively deployed to increase security. Due to the mutually constitutive relationship between SOSTs and pre-emptive security, security gets framed as a function of surveillance, forcing increasingly monitored citizens to exchange liberty for security. In contrast, a systemic approach to security may enable security policies pursuing liberty and security.

View correction statement:
Corrigendum

Notes

1. David A. Baldwin, “The Concept of Security,” Review of International Studies 23, no. 1 (1997): 5–26. See also Peter H. Liotta, “Through the Looking Glass: Creeping Vulnerabilities and the Reordering of Security,” Security Dialogue 36, no. 1 (2005): 49–70.

2. Hans J. Morgenthau, Politics among Nations. The Struggle for Power and Peace (Brief Edition) (Boston: Revised by Thompson KW McGraw Hill, 1993).

3. Maurice Cusson, “La surveillance et la télésurveillance: sont-elles efficaces?” Revue internationale de Criminologie et de Police technique et scientifique 53 (2012): 131–150.

4. Christopher Coker, “NATO’s Unbearable Lightness of Being,” RUSI Journal 149, no. 3 (2004): 18–23.

5. European Commission, A Secure Europe for a Better World (Brussels: EU Press, 2003a). See also NATO, The Alliance’s Strategic Concept (Washington, DC: NATO, 1999).

6. Ian Manners, European [Security] Union: From Existential Threat to Ontological Security (Copenhagen: Roskilde University Publications, 2002).

7. Felix Sebastian Berenskoetter, “Mapping the Mind Gap: A Comparison of US and European Security Strategies,” Security Dialogue 36, no. 1 (2005): 71–92. See also Vincenzo Pavone and Sara Degli Esposti, “Public Assessment of New Surveillance-oriented Security Technologies: Beyond the Trade-off between Privacy and Security,” Public Understanding of Science 21, no. 5 (2012): 556–572.

8. Pavone and Degli Esposti, “Public Assessment of New Surveillance-oriented Security Technologies: Beyond the Trade-off Between Privacy and Security.”

9. Sheila Jasanoff, States of Knowledge: The Co-Production of Science and Social Order (New York: Routledge, 2004).

10. Stephen M. Walt, “International Relations: One World, Many Theories,” Foreign Policy, vol. 110 (1998): 29–46.

11. Morgenthau, Politics among Nations.

12. Susan Strange, The Retreat of the State: The Diffusion of Power in the World Economy, vol. 49 (Cambridge, UK: Cambridge University Press, 1996).

13. Georg Sørensen, “After the Security Dilemma: The Challenges of Insecurity in Weak States and the Dilemma of Liberal Values,” Security Dialogue 38, no. 3 (2007): 357–378, but also Theodore C. Sorensen, “Rethinking National Security,” Foreign Affairs 69, no. 6 (1990): 1–18.

14. Barry Buzan, “Peace, Power, and Security: Contending Concepts in the Study of International Relations,” Journal of Peace Research 21, no. 2 (1984): 109–125.

15. David A. Baldwin, “The Concept of Security,” Review of International Studies 23, no. 1 (1997): 5–26.

16. Ian Manners, “European [Security] Union: From Existential Threat to Ontological Security.”

17. Inge Kaul, “Human Development Report 1994,” American Journal of Economics and Sociology 54, no. 1 (1995): 56–56. See also Mahbub Ul Haq, Reflections on Human Development (New York, Human Development Report Office (HDRO), United Nations Development Programme (UNDP), 1994).

18. Gary King and Christopher J. L. Murray, “Rethinking Human Security,” Political Science Quarterly 116, no. 4 (2001): 585–610. See also Lloyd Axworthy, “Human Security and Global Governance: Putting People First,” Global Governance 7 (2001): 19.

19. E. M. Cousens, C. Kumar, and K. Wermester, Peacebuilding as Politics: Cultivating Peace in Fragile Societies (Boulder, CO: Lynne Rienner, 2001).

20. Keith Spence, “National, Homeland and Human Security: Conceptual Development, Globalization and Risk,” Homeland Security Organization in Defence against Terrorism 97 (2012): 185.

21. Peter H. Liotta, “Boomerang Effect: The Convergence of National and Human Security.”

22. Christopher Coker, “NATO’s Unbearable Lightness of Being,” RUSI Journal 149, no. 3 (2004): 18–23.

23. Christopher Daase and Oliver Kessler, “Knowns and Unknowns in the War on Terror: Uncertainty and the Political Construction of Danger,” Security Dialogue 38, no. 4 (2007): 411–434.

24. Council, North Atlantic. “The Alliance’s Strategic Concept.” Number NAC-S (99) 65 (1999).

25. European Commission, A Secure Europe for a Better World, (Brussels: EU Institute for security studies, 2003a).

26. Mikkel Vedby Rasmussen, “Reflexive Security: NATO and International Risk Society,” Millennium: Journal of International Studies 30, no. 2 (2001): 285–309. See also Rosalyn Diprose, Niamh Stephenson, Catherine Mills, Kane Race, and Gay Hawkins, “Governing the Future: The Paradigm of Prudence in Political Technologies of Risk Management,” Security Dialogue 39, nos. 2–3 (2008): 267–288.

27. Yee-Kuang Heng, “The ‘Transformation of War’ Debate: Through the Looking Glass of Ulrich Beck’s World Risk Society,” International Relations 20, no. 1 (2006): 69–91. See also Gabe Mythen and Sandra Walklate, “Terrorism, Risk and International Security: The Perils of Asking ‘What If?’” Security Dialogue 39, nos. 2–3 (2008): 221–242.

28. Marieke De Goede, “Beyond Risk: Premediation and the Post-9/11 Security Imagination,” Security Dialogue 39, nos. 2–3 (2008): 155–176.

29. Ulrich Beck and Christoph Lau, “Second Modernity as a Research Agenda: Theoretical and Empirical Explorations in the ‘Meta‐Change’ of Modern Society,” British Journal of Sociology 56, no. 4 (2005): 525–557.

30. Kevin D. Haggerty and Richard V. Ericson, “The Militarization of Policing in the Information Age,” Journal of Political and Military Sociology 27, no. 2 (1999): 233; Kevin D. Haggerty and Richard V. Ericson, “The Surveillant Assemblage,” British Journal of Sociology 51, no. 4 (2000): 605–622.

31. Marijn Hoijtink, “Capitalizing on Emergence: The ‘New’ Civil Security Market in Europe,” Security Dialogue 45, no. 5 (2014): 458–475.

32. Mark B. Salter and Elia Zureik, Global Surveillance and Policing Borders, Security, Identity (Devon, UK: Willan, 2005).

33. Kevin D. Haggerty, Minas Samatas (ed.), Surveillance and Democracy (New York, Routledge: 2010).

34. Louise Amoore and Marieke de Goede, “Risk and the War on Terror,” Security Dialogue 39, nos. 2–3 (2008): 221–242. See also Gabe Mythen and Sandra Walklate, “Terrorism, Risk and International Security: The Perils of Asking ‘What If?,’” 2008.

35. Pavone and Degli Esposti, “Public Assessment of New Surveillance-oriented Security Technologies.”

36. In this article we focus mainly on security policies operated and implemented by public security agencies. However, surveillance practices are also being implemented by private commercial actors, often for the purpose of security and in cooperation with public actors. See, for instance: Sarah Percy, Regulating the Private Security Industry (Abingdon, UK: Routledge, 2013), as well as Adam White, “The New Political Economy of Private Security,” Theoretical Criminology 16 (2012): 85–101.

37. See, for instance, Peter Adey and Ben Anderson, “Anticipating Emergencies: Technologies of Preparedness and the Matter of Security,” Security Dialogue 43, no. 2 (2012): 99–117, but also Charles Weiss, “Science, Technology and International Relations,” Technology in Society 27, no. 3 (2005): 295–313 and Trine Villumsen Berling, “Science and Securitization: Objectivation, the Authority of the Speaker and Mobilization of Scientific Facts,” Security Dialogue 42, nos. 4–5 (2011): 385–397.

38. Johann Eriksson and Giampiero Giacomello, “The Information Revolution, Security, and International Relations: (IR) Relevant Theory?” International Political Science Review 27, no. 3 (2006): 221–244.

39. Sheila Jasanoff, States of Knowledge: The Co-Production of Science and Social Order, 2004, as well as Erik Aarden and Daniel Barben, “Science and Technology Studies,” in Konzepte und Verfahren der Technikfolgenabschätzung (Wiesbaden, Germany: Springer, 2013), 35–49.

40. Sheila Jasanoff, Designs on Nature (Princeton: Princeton University Press, 2005).

41. Ibid., 17.

42. Sheila Jasanoff and Sang-Hiun Kim, “Containing the Atom: Sociotechnical Imaginaries and Nuclear Power in the United States and South Korea,” Minerva 47, no. 2 (2009): 119–146.

43. European Commission, A Secure Europe for a Better World, (Brussels: EU Institute for security studies 2003a), 4–5.

44. Dereck Lutterbeck, “Blurring the Dividing Line: The Convergence of Internal and External Security in Western Europe,” European Security 14, no. 2 (2005): 231–253.

45. Kelstrup, Morten, and Michael Williams (eds.), When two become one - internal and external securitisations in Europe, International relations theory and the politics of European integration: power, security and community. (New York: Routledge, 2006), 171–204.

46. Sven Biscop, The European Security Strategy: A Global Agenda for Positive Power (Aldershot, UK: Ashgate, 2005).

47. European Commission, A Secure Europe for a Better World, (Brussels: EU Institute for security studies, 2003a), 7.

48. European Commission, The Challenges Facing the European Defense-Industry, a Contribution for Action at European Level (Brussels: EU Press, 1996).

49. Burkard Schmitt, Research for a Secure Europe (Brussles: Luxembourg Office for Official Publications of the European Communities, 2004), 7.

50. European Commission, Implementing a European Union Strategy on Defence-related Industry (Brussels: EU Press, 1997).

51. European Commission, Toward an EU Defense Equipment Policy (Brussels: EU Press, 2003), 7.

52. Lisa Rosner, The Technological Fix: How People use Technology to Create and Solve Problems (Routledge, 2013).

53. European Commission, Toward an EU Defense Equipment Policy, (Brussels: European Commission, 2003b), 17.

54. David Wright and Reinhard Kreissl, Surveillance in Europe (New York: Routledge, 2014).

55. Gary T. Marx, “A Tack in the Shoe: Neutralizing and Resisting the New Surveillance,” Journal of Social Issues 59, no. 2 (2003): 369–390.

56. Decision of the German Federal Administrative Court of January 25, 2012 (Az.BVerwG 6C 9.11).

57. Michael McCahill, “Surveillance, Crime and the Media,” in Routledge Handbook of Surveillance Studies, edited by Kevin Haggerty Kirstie Ball and David Lyon (London: Routledge, 2012), 244–251.

59. Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security Model (Brussels: EU Press, 2011).

60. Ibid., 11.

61. Ulrich Beck, “The Terrorist Threat World Risk Society Revisited,” Theory, Culture & Society 19, no. 4 (2002): 39–55. Also, more recently, Marieke de Goede, Stephanie Simon, and Marijn Hoijtink, “Performing Preemption,” Security Dialogue 45, no. 5 (2014): 411–422.

63. The UK’s approach to national security is overseen by the National Security Council and detailed in the National Security Strategy; available at http://www.direct.gov.uk/prod_consum_dg/groups/dg_diitalassets/@dg/@en/documents/digitalasset/dg_191639.pdf?CID=PDF&PLA=furl&CRE=nationalsecuritystrategy.

64. Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security Model, (Brussels: Council of the European Union, 2011), 3.

65. Kevin D. Haggerty and Richard V. Ericson, “The Militarization of Policing in the Information Age,” 1999 and Kevin D. Haggerty and Richard V. Ericson, “The Surveillant Assemblage,” 2000.

66. Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security Model, (Brussels: Council of the European Union, 2011), 17.

67. See, for instance, Ayse Ceyhan and Anastassia Tsoukala, “The Securitization of Migration in Western Societies: Ambivalent Discourses and Policies,” Alternatives: Global, Local, Political 27, no. 1 (2002): S21. See also Ryszard Cholewinski, in Baldaccini, Anneliese, Elspeth Guild, and Helen Toner, The Criminalisation of Migration in EU Law and Policy, “Whose freedom, security and justice?: EU immigration and asylum law and policy”. (Oxford, UK: Hart Publishing, 2007), 301–336 as well as Valsamis Mitsilegas, The Criminalisation of Migration in Europe: Challenges for Human Rights and the Rule of Law (New York: Springer, 2014).

69. Council of the European Union, Draft Internal Security Strategy for the European Union: Towards a European Security Model, (Brussels: Council of the European Union, 2011), 13.

70. Ibid.

71. European Commission, The European Agenda on Security (Brussels: EU Press, 2015), 3.

73. Timothy Mitchener-Nissen, “Failure to Collectively Assess Security Surveillance Technologies Will Inevitably Lead to an Absolute Surveillance Society,” Surveillance & Society 12, no. 1 (2013): 73–88.

74. Didier Bigo, “Security, Surveillance and Democracy,” 2012.

77. William Young and Nancy G. Leveson, “An Integrated Approach to Safety and Security Based on Systems Theory,” Communications of the ACM 57, no. 2 (2014): 31–35.

78. Peter H. Liotta, “Boomerang Effect: The Convergence of National and Human Security,” Security Dialogue 33, no. 4 (2002): 473–488.

79. Francesco Vitali, “Comunicazione e controllo ai tempi del terrore,” LIMES, no. 11 (2015): 141–146.

80. Francesco Gracceva and Peter Zeniewski, “A Systemic Approach to Assessing Energy Security in a Low-carbon EU Energy System,” Applied Energy 123 (2014): 335–348.

81. Arbia Riahi, Yacine Challal, Enrico Natalizio, Zied Chtourou, and Abdelmadjid Bouabdallah, “A Systemic Approach for IoT Security” (2013 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2013).

82. Francesco Vitali, “Comunicazione e controllo ai tempi del terrore,” 2015.

83. Michael Reiterer, “The EU’s Comprehensive Approach to Security in Asia,” European Foreign Affairs Review 19, no. 1 (2014): 1–21.

84. While a thorough critique of this phenomenon would go beyond the scope of this article, critical social epistemology approaches would be better endowed to address this issue and cast light on the epistemic consequences of adopting certain institutional arrangements or systemic relations as opposed to alternatives.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.