Critical Security Studies and World Politics

Similar documents
International Security: An Analytical Survey

Confronting Power: The Practice of Policy Advocacy

US Policy in Afghanistan and Iraq: Lessons and Legacies

The Police in War: Fighting Insurgency, Terrorism, and Violent Crime

CONTEMPORARY SECURITY AND STRATEGY

Recovering Democracy in South Africa

Law and Election Politics: The Rules of the Game

BRITISH DEFENCE POLICY

Freedom from Want: The Remarkable Success Story of BRAC, the Global Grassroots Organization That s Winning the Fight Against Poverty

Cambridge University Press Victory in War: Foundations of Modern Strategy William C. Martel Frontmatter More information

CIVIL LIBERTIES, NATIONAL SECURITY AND PROSPECTS FOR CONSENSUS

SpringerBriefs in Political Science

PARLIAMENTARY ACCOUNTABILITY

SECTION 10: POLITICS, PUBLIC POLICY AND POLLS

DEVELOPMENT AND UNDERDEVELOPMENT A MARXIST ANALYSIS

Today, the question is not Schmitt s thought, but what exceeds that thought. After all, even a Janus gaze can t see beyond the end (p.xlviii).

INTERNATIONAL SANCTIONS IN CONTEMPORARY PERSPECTIVE

in this web service Cambridge University Press THE AMERICAN CONGRESS Ninth Edition

International Organizations and Democracy: Accountability, Politics, and Power

Critical Acclaim for this Book. About the Author

HOW ENGLISH BECAME THE GLOBAL LANGUAGE

International Academy for the Study of the Jurisprudence of the Family By-Laws of the Academy (26 June 2012)

Corporate Social Responsibility and the Shaping of Global Public Policy

Marxism and the State

Issues in World Politics

International Law and International Relations

HUMAN RIGHTS AND FOREIGN POLICY

INTERNATIONAL ASSOCIATION OF UNIVERSITY PRESIDENTS. Byelaws

THE KEYNESIAN REVOLUTION

China s Foreign Policy Challenges and Prospects

CODE OF ETHICS OF ALBANIAN MEDIA

Introduction to International Politics

Florida Family Law. Text and Commentary Statutes. Phyllis Coleman CAROLINA ACADEMIC PRESS PROFESSOR OF LAW NOVA SOUTHEASTERN UNIVERSITY

Work rich, work poor. Inequality and ecomomic change in Australia

Private Property and the Constitution

The Credibility of Transnational NGOs

Understanding Election Law and Voting Rights

PEOPLE AND POLITICS IN FRANCE,

Global empires and revolution,

University of Montana Department of Political Science

CROSSLINK PUBLISHING CONTRACT

THE RISE OF INTERACTIVE GOVERNANCE AND QUASI-MARKETS

Rethinking Fascism and Dictatorship in Europe

RULE 17 FACSIMILE FILING APPLICABILITY These rules apply to civil and criminal proceedings in the Court of Common Pleas, Clermont County, Ohio.

Migration, Diasporas and Citizenship

Also by Lawrence Quill. LIBERTY AFTER LIBERALISM Civic Republicanism in a Global Age

Not Yet Democracy. West Africa s Slow Farewell to Authoritarianism. Boubacar N Diaye Abdoulaye Saine Mathurin Houngnikpo

Liberating Economics

GUIDELINES FOR THE ASA PUBLICATIONS PORTFOLIO

Contemporary Security and Strategy

Phases of Terrorism in the Age of Globalization

He Doth Opine: A Review of Making Sense of The Alt-Right by George Hawley (Columbia University Press, 2017) 218 pp.

Published by Palgrave Macmillan

The Social Costs of Underemployment Inadequate Employment as Disguised Unemployment

Public Administration and Information Technology

Recovering 9/11 in New York edited by Robert Fanuzzi and Michael Wolfe

Chapter 24: Publications Committee

Designing US Economic Policy

Theorizing and Teaching Global Environmental Politics

The Iraq War. A Philosophical Analysis. Bassam Romaya

paoline terrill 00 fmt auto 10/15/13 6:35 AM Page i Police Culture

Why Elections Fail. Cambridge University Press Why Elections Fail Pippa Norris Frontmatter More information

British Political Culture and the Idea of Public Opinion,

STATUTORY SUPPLEMENT ADMIRALTY AND MARITIME LAW IN THE UNITED STATES

Shaun Narine th Street, Suite 314 Boulder, CO USA telephone fax

Copyright 2013 Carolina Academic Press, LLC. All rights reserved. LOST IN TRANSLATION: EFFECTIVE LEGAL WRITING FOR THE INTERNATIONAL LEGAL COMMUNITY

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

North American Regional Security: A Trilateral Framework?

ENTRENCHMENT. Wealth, Power, and the Constitution of Democratic Societies PAUL STARR. New Haven and London

Exam Questions By Year IR 214. How important was soft power in ending the Cold War?

Youth, Multiculturalism and Community Cohesion

OPEN ACCESS AGREEMENT (CC-BY-NC-ND)

Political Terrorism PAUL WILKINSON. Macmillan Education. Lecturer in Politics, University College, Cardiff

the state of economic and social human rights

UNOFFICIAL TRANSLATION INDONESIAN COUNTERTERRORISM BILL

The Political Economy of Globalization

International Encyclopedia of Public Policy - Governance in a Global Age: Objectives, Themes, Areas and Content

BRITAIN WITHIN THE EUROPEAN COMMUNITY

The Geological Society of London REGULATIONS CODES OF CONDUCT

The Political Economy of China s Systemic Transformation

INTERNATIONAL RELATIONS

THE LEGITIMACY OF INTERNATIONAL HUMAN RIGHTS REGIMES

FULL EMPLOYMENT: A PLEDGE BETRAYED

The Politics of Collective Violence

SUBSCRIBE NOW AND RECEIVE CRISIS AND LEVIATHAN* FREE!

Downloadable Reproducible ebooks Sample Pages

Studies in Social Policy

THE RIGHT HON. THE LORD BURNETT OF MALDON

Morality Politics in Western Europe

CURRICULUM VITAE National Council for East European and Eurasian Research (NCEEER) Research Grant ($20,000). Declined.

Language, Hegemony and the European Union

,,,,,, ,,,, ,,, Brian Frederking, Resolving Security Dilemmas : A Constructivist

Litigating in Federal Court

Introduction. Mapping critical security studies, and travelling without maps. Abstract

Religious Practice and Democracy in India

The Great Divergence Reconsidered

PROBLEMATIZING RELIGIOUS FREEDOM

Morality at the Ballot

Democracy: The Never-Ending Battle A Conversation with Lech Walesa

China s Regional Relations: Evolving Foreign Policy Dynamics

Transcription:

EXCERPTED FROM Critical Security Studies and World Politics edited by Ken Booth Copyright 2005 ISBNs: 1-55587-825-3 hc 1-55587-826-1 pb 1800 30th Street, Ste. 314 Boulder, CO 80301 USA telephone 303.444.6684 fax 303.444.0824 This excerpt was downloaded from the Lynne Rienner Publishers website www.rienner.com i

Preface The search for security is primordial, and never before in history has human society faced the multidirectional challenges that will predictably develop in the coming decades. Our times demand the very best efforts from those who study security, for world politics today is hounded not only by traditional interstate conflicts but also by nuclear-armed regional threats, ever more innovative and dangerous terrorist strategies, new problems arising from the dynamics of globalization, the challenges of inflamed religious and ideological extremism, the politics of rage provoked by obscene disparities of wealth and opportunity, and all the complexities caused by the momentum of global environmental change. Intense and multilevel insecurity will be in season for the foreseeable future, and so the search for security will be at the top of the agenda in public policy making as well as dominating countless private lives. Can academic security studies respond to this predictably dangerous future? How should we think about security in this fractious world? What is real? How reliable is our knowledge? What can we do? We live in an era of question marks about world security, and this volume cannot attempt to give all the answers. Instead, it seeks to offer a more complex picture of the situation as a result of shifting the way security has been conceived in mainstream security studies as the subject area developed in the period since World War II. This alternative approach has been labeled critical security studies (CSS). Although self-consciously new as an academic subject area, CSS has a long and complex ancestry in terms of its social and political ideas. Its impact on the intellectual fortresses of orthodox security studies has so far been limited, but its influence is evident elsewhere, and its key ideas have to be reckoned with by anyone seriously engaging with the theory and practice of security. CSS has established an institutionalized life of its own, with courses and programs in a number of universities, as well as a steadily growing body of research. It has achieved vii

viii Preface an academic presence that exceeds what has been written in its name, being for the moment a subject without much explicit literature. This volume is one attempt to help to fill that gap. By critically reconsidering complex global insecurities, readers will be better able to pursue their own explorations of how we the global we might learn to live together, collectively, with more success than in the past. My hope is that the book will help today s students so many of whom feel both angry and helpless about the world they have inherited by explaining that there are different (and more complex) ways of thinking about security than the dismal ideology of political realism. CSS is not, of course, the answer in itself; it is only a field of study, a starting point. It is necessary, at the least, to go beyond academic critical explorations with a more policy-focused eye, and in the concluding chapter I outline a critical theory of security that seeks to turn helplessness into a specific theoretical commitment, anger into a political orientation. * * * In completing this volume, I want to acknowledge the support of Lynne Rienner Publishers. This volume would not have been part of the Critical Security Studies Series without the backing of Lynne Rienner herself. She declined my idea of establishing a journal to promote thinking about critical approaches to security and instead suggested a book series. She had faith and in the most concrete way. If, in years to come, CSS ceases to be seen merely as an alternative to the political realist orthodoxy of security studies, then the production of relevant literature will have been vital. Good ideas do not spread without people who will back them with material support. Others at Lynne Rienner Publishers include Sally Glover in Boulder, Colorado, and Richard Purslow, LRP s former UK editor. I want to thank them for their professionalism and patience. I wish also to thank two anonymous referees who have helped make this a better book. The version of CSS that will be elaborated in the introductory and concluding chapters had its origins in the late 1980s in the Department of International Politics at the University of Wales, Aberystwyth. The first master s course entitled Critical Security Studies was taught there in 1995, and I want to thank colleagues and students not only for making such a development possible but also for contributing to the intellectual buzz that has always accompanied it. Crucial to this development, including the teaching of the first course, has been Richard Wyn Jones, whose book Security, Strategy, and Critical Theory was published earlier in this series; he is also a contributor to this volume. Although some of the contributors will not see themselves fully in the embrace of this Welsh School, I believe that there is an important degree of coherence throughout; this is testimony

Preface ix to the seriousness with which the contributors undertook their task and wrote to their brief. For bringing the manuscript together, I want to thank Elaine Lowe once more for her technical skills and Eurwen Booth for a variety of editorial help. Don Henderson deserves thanks for helping with the bibliography. I could not have finished this volume, as departmental chair, without the best support staff in the business; our administrators and secretaries all help to make the Aber International Politics Department the unique place it is. Ken Booth