B JP I R : 2 0 0 5 V O L 7 , 4 8 5 5 0 7
486
GRAHAM M. SMITH
security?. Turning to the first question, it will be argued that the idea of security
is related to the preservation, maintenance and separation of orders. Specifically,
security is charged with the preservation and realisation of political orders. A political order consists of both a set of core and subsidiary values, and a membership
which acknowledges those values intersubjectively through their socio-political
arrangements. Thus, like the watchdog Cerberus who maintains the integrity of
two orders, security does not appear in our lexicon as an independent being. Security is not a value in itself, but is the reflection of, and an attitude towards other
values, and especially the core values of the order. Therefore, whilst security is also
necessarily and inescapably political, it is not a political value or end in its own
right.
The second question concerns the effects of security. To continue with our motif,
we could ask, how does security bite?. Here we employ security as a relational
term which is connected to the preservation and realisation of the core values of
orders. It is therefore possible to say that security bites in three directions. First,
security is argued to bite the specific members of the order, either individually or
as sub-groups. Second, by declaring both the security threat and the response to
that threat, certain members of the order come to hold privileged positions. Finally,
the third bite is manifest in the acts or measures of security. Those engaged in
decreeing measures which follow from the identification and response to threats
to values begin to redefine the contours and values of that order.6 Thus, the three
bites of security can be seen to seize an order both internally and externally, and
at a variety of levels.
The remainder of this article is divided into four sections and a conclusion. In the
first section an initial account of the idea of security is sketched making the prima
facie case for understanding security in relation to orders as manifestations of political values. The second section considers this sketch in relation to the burgeoning
literature on this topic. Whilst this literature identifies and explores specific
instances of security, it does not engage sufficiently with the idea itself. A closer
analysis of the idea of security can reveal what is common to these literatures, and
will offer a way in which we might negotiate between some of their entrenched
disputes. The third section will refocus on the initial sketch, adding depth to three
related notions: orders, politics and values. Here an alternative framework is outlined which draws on the strengths of the existing literature and approaches and
provides a guiding thread for an understanding of security which is implicit in
these approaches. The final section suggests how security bites by outlining how
the foregoing analysis illuminates the practices of security.
487
the same manner as these concepts, it is also evident that security is not simply an
idea or concept. Security is also an act; security (or its effects) can be located in
our political actions, rhetoric and technologies (Dillon 1996, 16; Buzan, Waever
and de Wilde 1998, 2729; Burke 2001, xxv, xxxiii). Security, then, is equally an
idea and a practice, and must be understood as both (McSweeney 1999, 21).
Having noted this double location, the first question we must answer is, what does
the idea of security mean?. In addressing this I edge towards a prima facie account
of security. Initially we are concerned with the conceptual role of security, a
concern previously pursued by both Richard H. Ullman (1983) and Emma
Rothschild (1995). Their articles locate security in its historical context. This is
useful as the historical roots of the term help to inform our current usage and
understandings. However, for our purposes, more needs to be done to develop a
sufficiently abstract understanding of security. Whilst Ullman and Rothschild
offer a history of the idea, they do not develop what unifies the specific instances.
Thus, our current task is to build on this work and to clarify and locate security
in relation to its logical structural family which will provide a nexus of context
and meaning. In this way it is possible to link security to its logical relations, and
to produce a genealogy of terms which help us to make sense of both the term
itself and how it is used.
So, the term security cannot be understood in isolation, and we must identify it
in a nexus or landscape of related terms and ideas. However, security is not only
a contested concept (Baldwin 1997, 1012; Dalby 1997, 6; Smith 2005); it is also
a term which is used in a variety of circumstances. Thus, its use is not confined to
theoretical discussion alone; it is also a term which has acute resonance in politics,
not to mention a host of non-political uses. Even the most cursory consideration
of the term produces a catalogue of contemporary usage: the state of being secure;
assurance from poverty; a person or a thing that secures; precautions taken to
prevent theft or espionage; an asset that can be claimed by a creditor; something
that is given or pledged to secure the fulfilment of a promise.7 Additionally, security is also related to securing (McSweeney 1999, 14). There are many meanings
of securing, including being free from danger; free from fear; in safe custody; not
likely to become loose or to fail; to become certain; to make safe from attack.
Clearly, if security is to have any analytic utility, we need to establish a tighter
definition which relates to its political meaning (and closes off the everyday, nonpolitical meanings and uses of the term).
If it is true that security concerns itself with securing then we might further our
exploration by asking four related questions about this security and securing (cf.
Baldwin 1997, 1217, where seven such questions are generated). All the questions suggest a range of answers. (1) Who or what is being secured?;8 (2) who or
what is doing the securing?; (3) who or what is the subject being secured from?;
(4) why is the subject being secured? Thus, securing is something which might be
thought of as being done, and security a reflection of the success of that action.
Security is therefore a reflection of a relationship between a subject and an object.
Indeed, the third question (who or what is the referent object of security being
secured from?) is dependent on this meaning. In this sense, security is simply a reflection of the relative success or failure to secure.
488
GRAHAM M. SMITH
In order to develop this idea further it is now necessary to introduce the idea of
an order. At present, no more than a basic conceptual outline will be provided,
as here I am merely attempting to offer a prima facie account of the term and
its relation to our central focus of security. These ideas, and their relationship,
will be developed more fully in section III (after we have examined some of
the conceptual difficulties of the established understandings of security in section
II).
What, then, is an order? An order is a political entity which can be understood to
consist of two related components: (1) values (which shape and define the order);
and (2) a membership (who subscribe to those values). The values that define the
order, although abstract and general, are the result of political judgements. They
are recognised intersubjectively by the members of the order. This is not to imply
that the intersubjective values of the members of an order are necessarily chosen
in a conscious or deliberative manner. It is merely to suggest that these values are
recognised or acknowledged in an intersubjective manner by the members of the
order, and that these values are privileged over other possible values which might
be subscribed to. The members of an order attempt to realise these intersubjective
political values in their institution of particular socio-political relations, bodies,
practices and discourses (in other words, institutions broadly conceived). In any
given order there can be a hierarchy of values, but some values will be agreed by
all members of the order to constitute the core values of the order, and to take priority over lesser values. In summary, an order can be said to exist where we can
identify both a set of related political values, and a constituency who are bound
together in their intersubjective subscription to those values. Thus, when the
members of an order seek security they seek to realise their values (and especially
core values), and to protect the institutions and arrangements which they understand to best preserve and promote those values.
Therefore, as has been claimed, as an idea security is a relational term. Security is
not a value in and of itself; it has meaning only insofar as it presupposes values
which are considered as ends-in-themselves (cf. Rothschild 1995, 63; Graeger
1996, 113). It is in this way that security can be said to be a reflection of the relative
success or failure to secure. What are being secured are orders. As has been suggested,
orders have two components. At the ideational level they are structured by core
values. At the material level they are manifest by the creation of groups who subscribe (intersubjectively) to those values, and seek to realise them in their institutions. Thus, the idea of security can be seen to make sense only in relation to these
previously presupposed values. This is the case whether or not the values are coherent, rational or even explicit.9 Security, then, stands between two conceptions of
order. Security has the potential to appear only when alternative orders are brought
into relation to each other. Thus, the practice of security relates to the specific actions
of political entities (such as individuals, states, nations, religious communities). As
a practice, these groups use security to motivate the defence of particular conceptions of order. In doing so, they attempt to solidify or identify the core values of
their orders.
This understanding of security as a relational term draws from and refocuses the
much cited essay by Arnold Wolfers, National Security as an Ambiguous Symbol
489
490
GRAHAM M. SMITH
to being the referent object of security, no single entity has the monopoly of being
the security threat. Different actors and entities can be aggressor, defender and
defended at different times and in relation to different entities or events.
Finally, if we accept the stress in our formula on the foundational role of political
values to security, then we can understand how there can be a whole range of
security issues. That the identification of the security threat is an intersubjective
decision has long been recognised (Wolfers 1962, 151; Art 1993, 820; cf. also
Waever 1995, 5457). However, by attempting to fix the referent object of security, and the attendant failure to recognise that security relates to values, both analysts and politicians alike have foreclosed some avenues for understanding security.
In doing so they have not defended a conception of security understood as politics, but a particular politics understood as security. The next section will develop
these points, and explore them in relation to existing literatures. In doing so I will
show how the approach outlined here helps to alleviate some of the tensions within
these literatures without negating the contribution that these literatures make to
specific conceptions and practices of security.
491
from the proposed anarchy in which states find themselves (cf. Bull 1977;
Mearsheimer 1990; Jervis 1978; all of which stands in the shadow of Hobbes
Leviathan). However, whilst the state-centric school of thought has been dominant,
there has also been a growing body of literature which attempts to move away
from this approach and to broaden the meaning of security. Under these lights
we have seen the referent object of security being refocused from the state to substate groups and the individual (Rothschild 1995, 61; Havel 1992, 1820). In other
attempts, the referent of security has been broadened to include what has become
known as human security. This has been variously defined, and has occurred both
within academic thought (Thomas and Wilkin 1999; Duffield 2001; Paris 2001)
and the initiatives of policy-makers.10 Others have identified the environment as
a possible referent of security (Mathews 1989; Graeger 1996; Ronnfeldt 1997),11
whilst still others have considered the possibility of economic security (Nye 1974;
Deese 19791980; Mastanduno 1998).
The defence of traditional understandings of security and the emergence of alternative accounts have created what may be considered a rift in security literature.
We can understand the source of this rift as being an outcome of the tension
between the advocates of the security of individuals on the one hand, and the security of the state on the other. Some have argued that the state is the rightful focus
of security, as although there are tensions between the state and its citizens, ultimately only the state is powerful enough to ensure and realise the claims of the
individual. Without the framework afforded by the state, human rights are meaningless, and individuals are powerless to enforce their rights (cf. Arendt 1963,
230231, 290302; Buzan 1991, 362363; Waever 1995, 49 who makes a conceptual link between security and the state). There is some truth to this. There is
a real sense in which individuals are dispossessed of their rights if they are not conscious of them, and do not know to whom to appeal to have them enforced. It is
also true that the failure of states can lead to all kinds of violence, inequity and
humanitarian disasters. Considered as the referent object of security, it has been
noted that states face both external and internal threats (Ayoob 1995, 89).12
However, what these state-centric conceptions of security tend to underplay is the
potential of states to act as security threats to their own citizens. It is clear that the
state-centric account cannot be considered as a general account of security. This is
particularly the case when it is employed to attack the broadening agenda of
others (cf. Ayoob 1995, 812). Whether the strengthening of the state necessarily
brings security or stability to their citizens or their region is a debatable point. It is
also debatable as to whether a strengthening of the state and those who profess
to represent the state territorially and institutionally would worsen or alleviate
this problem (Ayoob 1995, 9; cf. Wheeler 1996; Smith 2005, 45).
From the perspective adopted here, the problem with both the state-centric and
the individual-orientated approach to security is that both of these approaches
suffer from the same category of limitations. They fail to adequately recognise that
security threats can arise at multiple levels for, and from, multiple actors.13 Additionally, these literatures pay insufficient attention to the idea that the security
threat can arise in this way because in concentrating on the defence of one particular conceptual instance of security (the state), they fail to develop a conceptualisation of a generic security. Identifying the de facto referent object of security
492
GRAHAM M. SMITH
493
494
GRAHAM M. SMITH
other constellations of values can emerge than that of the individual and the state.
Thus, from this perspective, neither Ken Booths (1997) notion of emancipation,
nor Thomas and Wilkins (1999) notion of human security, nor Mathews notion
of environmental security (Mathews 1989), nor notions of economic security
can be ruled out a priori. However, what this confrontation does reveal is that whilst
Ayoob has an unnecessarily restrictive notion of politics and security, those who
would seek to broaden the category of security often also fail to successfully link
it to the notion of political value, and thus their accounts suffer from the weakness not of an overbearing state but an insufficiently developed notion of the
political. In other words, these broadening accounts of security present political
manifestos under the banner of security, thereby often disguising the political
nature of their manifestos and actions by masking them with the assumed apolitical status of security.17 In challenging state-centric accounts, those who attempt
to broaden the agenda often fail to recognise the political constitution of security
and so mirror the moves of the state-centric approach by also treating security as
an apolitical fact. Therefore, to understand and redefine security we must return
to the political itself (cf. Walker 1997, 69).
495
496
GRAHAM M. SMITH
order realising its aims is the existence (even as a possibility) of other orders (i.e.
alternative sets or configurations of values). Thus, whether change, developments, impediments or threats are security issues is a political decision.20 It must
be a political decision as orders are (in their very nature) political entities, and the
threat is not to security per se, but to the potential realisation and maintenance of
any given order. No obstruction to the establishment of a particular order is a threat
in and of itself. An impediment which does not compromise the overall project of
the order might be tolerated or simply ignored. Some localised forms of impediment might even be encouraged and welcomed by an order, such as alliances,
covenants, treaties, promises, protocols, co-operative agreements, and even war, if
this helps to realise core values (cf. Clausewitz, 1968, 119, 122; Jervis 1983,
178).
This focus on the defence of values as being intrinsic to an order was implicit as
far back as Thucydides. Robert J. Art, summarising Thucydides point, writes that
What was thus at stake for Sparta, if Athenian power grew too great, was not
simply safety from military attack but also the protection of Spartas moral values,
its way of life, and the material prosperity of its citizens (Art 1993, 821). Whilst
Sparta might well have feared physical attack, it also feared the loss of its way of
life and values. Thucydides observations are echoed still. Indeed, we can also see
the threat to values reflected in the ideology and rhetoric of contemporary times.21
For example, it is interesting to consider Henry R. Luces comments in Life where
the American Century is an expression of the fate of the US to lead the world not
only as a military power, but also in the values of spirituality, politics, culture and
economics. Thus, the picture presented is not simply a secure state, but an established way of life (Luce 1941). This kind of thinking can also be identified in the
uncompromising position of the Bush administration in 1992 at the Earth Summit
in Rio de Janeiro. Aides insisted that the United States standard of living is not
up for negotiation (The Independent on Sunday, 5 July 1992; The Guardian, 1 June
1992). Finally, in our current climate the need to defend values can be detected in
the speeches of Tony Blair, who claims that:
The best defence of our security lies in the spread of our values ...
freedom, democracy, the rule of law, religious tolerance and justice for
the oppressed ... we wage war relentlessly on those who would exploit
racial and religious division to bring catastrophe to the world (Blair 2004;
cf. also Lake 1994).
Thus, we can consider security threats as the declared obstructions to the realisation of values for members of orders. Whilst the use of this term is usually
reserved for the state, it is important to note that in principle other entities could
use this term such as the groups and associations that form civil society (e.g. businesses, religious movements or environmental groups). Here, the members of an
order make an explicit decision, and that decision is based upon whether the particular restriction of the practices of the order is severe enough actually to inhibit
and to destabilise the order in terms of a destruction or significant erosion of the
core values and relations of such a group. Such an erosion would destroy the particular order in essence, if not existentially.
497
Three things follow from this claim concerning the location and participants in the
decision that identifies the threat. As has been noted, whether something is
deemed to be a threat is a matter for the members of the order. This is to say, it is
a matter of political judgement. What might appear to be a threat to one kind of order
might not appear so to another. Thus, security threats are intersubjective in the
sense that their identification is a matter of judgement and perspective and involves
a degree of consensus. Second, it should also be underscored that the identification
of the threat is not really an identification of a threat to security per se (despite how
it might be expressed), but an impediment to the attempts of members of a particular order to realise their core values and relations. In connection with this, it is
also worth recalling that security cannot be a core value of any order, as the term
security does not have content as such. It is a reflection of the status of other values
(and especially core values), and not a positive value in its own right. Third, and
crucially, the identification of a security threat being an intersubjective judgement
of a particular order on what it deems as its values under threat is, above all else, a
political act. This is the case whether or not the order recognises itself as being political, or whether or not the order terms the security threat as a political threat. It is
political precisely because orders are born out of political decisions, agreements or
norms; that is to say, decisions relating to the establishment and pursuit of values
and relations. Indeed, the security threat is political in two senses. First, it is connected to the realisation and preservation of previously acquired political values;
second, it is invoked as a political decision (or act) by members of an order.
From this perspective, whilst it is not nonsensical to differentiate in our use of the
terms non-political, the political and securitisation, the three terms are related.
The identification of both the non-political and the identification of a security
issue are, in fact, political moves. Both the non-political and any securitisation
retain their political character by virtue of the fact that these realms are demarcated by the political. It might appear that they are depoliticised (that is to say
outside of the political), or not a matter for the political. However, all that this
amounts to is that a political move has been made to place certain spheres outside
of the cut and thrust of politics as an activity. This does not mean that these groups
really have lost their political character. Moreover, the apparent depoliticisation of
some issues or spheres is an important political move. By embarking on these
moves, an association, regime or community can raise the importance of certain
issues and relations, and provide more pressing and powerful justifications for
certain political moves and division of resources. Of course, by depoliticising a
section of its membership (for example, religious communities, or the family, or
certain cultural communities), then an order can also eliminate the need to deal
with threats to that community as security threats. In contrast, an order might
present certain security threats as being both objective and non-political. From
an analytical point of view these threats should not be viewed as either objective
or non-political. On the contrary, the identification of a security threat is the
political move par excellence: it is a defining of the core values and relations of the order
itself, either explicitly or tacitly (cf. Schmitt 1996, 26).
Thus we have returned to the core of what security is about. Security is a relational term which acts as an indication of the relative success or failure of any given
498
GRAHAM M. SMITH
order to realise itself. Orders are a constellation of political values that are recognised and pursued intersubjectively by members of an order through their institutions. Thus, security itself is inherently political, and in its generic forms relates not
to specific referent objects (such as the individual or the state), but to the core
values of an order. It is here that our theoretical discussion rejoins and informs our
discussion of the rhetorical use of security, or how security bites. As we have seen,
it is important to undertake such an analysis as it provides a logical and theoretical framework for the term, which is separate (although related) to its de facto use.
This analysis provides the critic of contemporary political rhetoric with a more
powerful tool of analysis, and the framework for a clearer articulation for
alternatives.
499
Moreover, the members of the order seek to perpetuate their order in relation to
an identified alternative order. How far these invocations of security are seen as
being restrictive upon the members of an order depends entirely on how the
members of an order relate the measures to their understanding of the core values
of the order, and the possibilities of realising them. Members of orders can accept
all kinds of restrictions as long as they are understood to aim at a realisation of
the core values of the order. Indeed, many actions and moves that an order makes
will not be termed security measures, and will be seen by the membership as consistent with the core values of the order. As such they will not be viewed as alien,
dangerous or as interventions.23 Security measures arise precisely when the order
seeks to articulate its core values, or when these are brought into question. Whilst
an order might be relatively self-maintaining, it regulates its membership through
the pursuit of its core values. That is to say, the membership of an order is identified by their intersubjective subscription to core values, values which they seek to
realise through their institutions (broadly defined). However, when it is judged that
these core values are placed in jeopardy (which happens when they are brought
into conflict with, or subverted by, an alternative order), then the security measure
arises. The security measure can appear alien to some members of the order precisely because, for the measure to be invoked, the core values of the order (which
might otherwise remain merely vague and tacit) must be exposed and articulated.24
The first way, then, that security bites is in relation to the members of a given
order. Security bites the external challengers of a given order through conflict and
control (the termination point of which might manifest in physical violence, conflict or war); however, it also has the capacity to bite the members of a given order
through general restrictions and controls (such as detention, imprisonment and
even exclusion from core values).25
This first bite leads to the second. Indeed, the first and second ways in which security bites are conceptually related. For a security threat to emerge, and for measures or sanctions to be enacted in relation to it, it has to be declared. As Ole
Waever has argued, security is not simply a concept, but it is also a speech-act
(Waever 1995). This is also consequent from the subjective nature of the identification of the security threat. It is this declaration of the security threat, and the
power to enforce its general acceptance and compliance, that constitutes the second
bite.26 However, what is important about this logical claim is that the core values
of the order are viewed as being common to all, even if orders could exist where
core values overlap like the sets displayed on a Venn diagram. In practice, values
might remain tacit; that is to say, we all think that we agree until we attempt to
discuss exactly how we agree. This conceptual framework helps us to expose
further the relationship between security and order, and the basic relationships
between the members of an order and its core values. However, it is also recognised that other forces can be brought into play and that not all members or structures in that given order have the same ability to declare security threats and to
implement or impose security measures. For example, government or the state is
obviously one important and powerful site of such declarations in most actual
orders. In itself, this is not necessarily antithetical or corrosive to the core values
of an order. Indeed, that groups and structures such as government are recognised
within orders might be a reflection of the commonality of the members in sharing
500
GRAHAM M. SMITH
core values.27 What this reflects is that particular members, groups or structures
can become privileged and even dominant within a given order. It is these groups
that position themselves as the identifiers of security threats, and who become the
instigators/initiators of security measures. However, in doing so, there is also the
attendant move for the group to identify itself not only as the identifiers of security
threats and the implementers of security measures, but also, and necessarily, as the
defenders and definers of the core values of the order.28
Security, then, is seen to bite not only the members of a given order in terms of
restrictions, directives and controls, but also in terms of empowering selected groups
and structures within a given order with a privileged position over other members
of the order. The ability to define a security threat to the core values of an order,
and to implement or impose security measures to defend or perpetuate those core
values, is simultaneously to enable certain structures and groups to take hold of
the core values of an order, that is to define the order itself, and to attack or chase
away potential challengers of that order, or potential power rivals.
In themselves, these first two bites might appear relatively unproblematic. Indeed,
clearly they are (potentially) more troubling to pluralistic or liberal orders than
they are to orders which edge towards monism and especially particular kinds of
conservative, anti-liberal or authoritarian orders. There is nothing inconsistent or
contradictory in an order assigning a group or structure with a privileged position
in identifying security threats and proposing measures to combat these threats. If
the core values of a given order revolve around especially authoritarian themes
then this would necessarily follow. For pluralistic and liberal orders these bites are
more serious as they might run against the core values of those orders, especially
if they revolve around the themes of individualism, autonomy, equality, democracy and the rule of law. Clearly, whilst some groups (such as governments) might
be sanctioned by these core values, the practice of governmental power might be
extended too far.
Having seen the first two bites of security, let us now confront the third. It is the
third bite which is potentially lethal to any given order, and represents a mortal
danger to the core values of orders. It is with the third bite that we recognise the
tension implicit in the location of, and relation between, the first two bites. With
the third bite we must consider the relationship between the privileged groups
within an order as being able to declare both the security threat and the core values,
and the result of this declaration and implementation of measures for those core
values and therefore the order itself. The question now arises as to how far the
declaration and defence of core values transform the core values and therefore the
order itself.
This issue demands a keen focus. It has already been claimed that an order is a
relationship between persons and values which seeks to realise itself. Furthermore,
whilst orders can overlap, they are also frustrated in their attempts at selfrealisation through the presence and objectives of some other orders. What the first
two bites of security bring to light is the idea that orders are not simply corroded
from outside, but that orders can also be attacked from within. If it is true that an
order rests on the relationship between persons and values, then it is also clear
that in declaring the security threat, the privileged groups within an order are also
501
declaring what the core values of the order are. As such they have the potential
not only to define, but also to modify and reassign those core values. This can be
seen in the common move of declaring that liberties must be sacrificed in order to
achieve greater security.29 If this is the case, then we might be tempted to ask, what
exactly is being secured here? Surely not liberties, as these are exactly what are
being eroded or withdrawn in the name of security. From the perspective developed here, the declaration that liberty must be exchanged for security is misleading, and is actually masking a variety of political moves. First, it covers the
political move that the privileged group is actually declaring the security threat in
relation to its notion of the core values, and thus reinforcing its own status. Second,
it is masking the political value judgement that liberty is an inferior value when
compared to some others within the order. Third, it is masking the fact that in
making these moves, the order itself is being changed. That is to say, security is
often invoked in relation to core values, but core values which are then sacrificed
for the sake of security. As the framework developed here has exposed, talk of such
a trade-off is confused as security is a relational term which points to the success
of the realisation of core values; it is not an end in and of itself which can be invoked
as a value.
502
GRAHAM M. SMITH
aspects, security is not, and cannot be, a value or objective in and of itself. Security cannot be attained either in general or particular terms; the attainment of
security is always simply shorthand for the realisation or pursuit of another value.
Despite the rhetoric of politicians, and the arguments of some theorists, there can
be no trade-off between liberty and security, but only a repositioning of liberty
in our constellation of core values. What is more, security threats do not exist in
and of themselves, but have to be identified, and it is in this identification that
certain groups emerge as dominant actors within orders. Security is not an apolitical issue, but concerns the realisation of core values; as such it is the political
move par excellence. Finally, in misunderstanding the political foundations of security and its relationship to order, we stand in the presence of a danger. That danger
is the risk that we trade away our values for monstrous shadowsand that we lose
what is valuable about politics itself.
Notes
1. I am grateful to the members of POLSIS at the University of Queensland (April 2004), and participants at Lancaster Universitys Security Bytes conference (July 2004), who engaged with presentations
of an earlier draft of this piece. I would also like to acknowledge the comments and criticisms of
Alan Metcalfe, Gerd Nonneman, Eric Grahn, and especially those of Adam David Morton. Finally, I
would also like to acknowledge the assessments of the four anonymous reviewers of this piece who
have helped me to clarify my position in important ways.
2. Instances of such concerns can be found in Wolfers (1962); Morgenthau (1966); Bull (1977); Jervis
(1978); Buzan (1984); with Mearsheimers article of 1990 forming a Janus-faced endpoint to this
period.
3. Such as McSweeney on identity (1999); Mathews on environmental security (1989); Deese on
economic security (19791980); and Thomas and Wilkin on human security (1999); see also
Campbell and Dillon (1993); Krause and Williams (1997); Lipschutz (1995).
4. This line of concern has been an ongoing theme in the discussions of the liberal press. For example:
In terror of Blunketts security measures (The Guardian, 3 February 2004); An authoritarian state
is in the process of construction (The Guardian, 23 February 2004); One step forward, several steps
back in the fight to protect civil liberties (The Independent, 26 February 2004); Take no comfort in
this warm blanket of security (The Guardian, 15 March 2004); Aliens in their own country (The
Guardian, 1 April 2004); Mr Blunketts plans for ID cards are costly, illiberal and will not be effective (The Independent, 26 April 2004); Half of terror suspects are freed without any charges (The
Independent, 30 April 2004); David Blunkett has betrayed the trust of all those who care about civil
liberties (The Independent, 23 June 2004).
5. There are, however, some notable exceptions. For examples of those who have attempted to theorise the concept of security, consult: Ullman (1983); Rothschild (1995); Baldwin (1997); McSweeney
(1999). Additionally, Buzan, Waever and Wilde (1998) can also be considered to be such an attempt.
Smith (2005) gives an overview of the attempts to refocus security by the main players in the debates
to broaden and deepen the notion.
6. A point, we might add, which was not wasted on Hobbes or Schmitt. For example, consider the
rights of the sovereign outlined by Hobbes in Chapter 18 of Leviathan; and this is echoed by Schmitt
who opens his Political Theology with the infamous claim that Sovereign is he who decides the exception (Schmitt 1988, 5). Indeed, in these thinkers security is seen to intersect with the theory and
practices of power and sovereignty.
7. To see how others have treated these connections cf. der Derian (1993); McSweeney (1999, 1322);
Rothschild (1995).
503
8. As explored in section II, the subject of security (or the referent object) has been much debated
in security literature, and has ranged from the individual, to the state, to humanity and even the
environment.
9. It should not be assumed that these values are necessarily those which would be accessible to the
sober-minded theorist. Whilst liberty, equality and the rule of law could form the basis of the
core values of an order, it could equally be a less conceptually sharp constellation. Such a constellation could perhaps shine with the fuzzy but emotionally intense energy of traditions and feelings
such as nationalism, history, religion or language.
10. An example of this can be found in the discussion and development of the idea of human security
in the United Nations Human Development Report of 1994 (United Nations 1994, ch. 2). Whilst this
concern with human security might appear to be a new focus for security (especially after the dominance of the realist paradigm of the cold war) it is important to remember that this approach has
deeper historical roots. For example, Rothschild traces this approach back to the thought of Enlightenment liberalism (Rothschild 1995, 6567). However, in one sense human security is the implicit
theme of nearly all political theory in the western tradition which attempts to give an account of
the good life and how that life can be realised, or secured (cf. Wilkin 2001, 47). This is reflected in
the eudemonia of Aristotle, the Christian polities of Augustine and Aquinas and the rationalism of
Hobbes and Locke, both of whom explicitly name security as an end of government, and the desire
of the individual (Hobbes, Leviathan, ch. 18; Locke 1963, 39599).
11. This has also been reflected in the thinking of Boutros-Ghali in An Agenda for Peace (UN Document
A747/277), and the World Commission on Environment and Development in Our Common Future
(1987).
12. Ayoob maintains that, unlike most first world states, third world states face largely internal conflicts
which can become interstate conflicts. For Ayoob, the solution to this insecurity is for third world
states to engage in state building (Ayoob 1995, 78; Ayoob 1997, 128129). Thus, in Ayoobs account,
the state, which is not only the conceptual but also the historically de facto referent of security (Ayoob
1997, 131), becomes both the referent of security and the provider of security for all other levels
(Ayoob 1995, 89).
13. For example, despite highlighting the observation that there is no necessary harmony between individual and national security and that The unavoidability of this contradiction between individual
and national security must be emphasised, Buzan goes on to conclude that individual security is
essentially subordinate to higher-level political structures of state and international system (Buzan
1991, 50, 51, 54).
14. Here we can learn an important lesson concerning moving from an is to an ought from David Hume
(2000, 302).
15. This state-centric bias (which is expedient if they are to keep realists on board) prevents them from
explicitly admitting that security is a political issue; that is to say, an issue which rests on political
moves. As such it does not lead to an endorsement of emergency measures beyond rules that otherwise bind. In fact, the provision for certain groups to identify a security threat is a provision that
has already been determined by the political. The identification of the security threat is not a move
beyond the normal political moves that usually bind, but is a normal political move (cf. Hobbes
1968, 232; Clausewitz 1974, 109, 119; Schmitt 1996, 45ff.). What is important here is that the
account of Buzan et al. falters because it refuses to recognise that security is a political issue other
than in a restricted state-centric sense of that term.
16. A point that Levy (1995) uses as a pivot on which to swing his own attack on the concept of environmental security as divorced from the interests of the nation state.
17. Wilkin is notable in being more explicit about this. For example, consider the claims that he makes
in The Political Economy of Global Communication that an integral aspect of human security is the attainment of human autonomy and the possibility of meaningful participation in the institutions and procedures that shape political, economic and cultural life (Wilkin 2001, 6). Although Wilkin attacks
those who would limit security to a realist and state-centric agenda (Wilkin 2001, 7ff.), his own
definition of human security does not (logically) exclude security also being understood from this
perspectivealthough it is clearly a perspective from which Wilkin recoils. Thus, Wilkins conception of human security is simultaneously both a conceptual or analytical tool and a political ideal.
18. See Note 8.
19. I am especially grateful to members of POLSIS at the University of Queensland who encouraged me
to tease out this point when I delivered an earlier version of this article to them in April 2004.
20. To elaborate and illustrate this point: whilst liberalism and Christianity might be said to co-exist,
liberalism has identified certain forms of religious fundamentalism and socialism as its special threat.
However, Christianity could become a security threat to liberalism if it were to promote certain forms
of equality, spirituality and resistance to the power and moral authority of the state. Indeed, whilst
504
GRAHAM M. SMITH
it was by no means a liberal order, this is how Christianity was initially viewed by the Roman Empire,
and this was the basis for the disputes of the Middle Ages. Both of these periods reflect a struggle
between Christianity and sovereign orders; both of these periods illustrate the struggle between
two conceptions of order (Held 1997, 70106; McClelland 1998, 278279; W. Ullman 1961, 1926).
Additionally, these struggles might serve to unsettle the seemingly supportive relationship between
Christianity and the sovereign power of the modern state; moreover, they might also question the
dominance of the modern state itself.
21. It is important to note the thrust of the argument here. It is recognised that de facto political entities act as if security is an end in itself or a goal, and that (historically) this has important consequences. However, in acting in this way states (and their theorists) betray a degree of conceptual
confusionand it is this confusion which compounds the force of those effects. What is being
attempted here is a clarification of the idea of security in order to provide a tool for identifying and
understanding how security is used and abused in both thought and practice.
22. What is important to note here is that whilst these bites might not be fatal in and of themselves,
they are more serious for certain kinds of order, which is to say, certain configurations of value. A
monistic order, which is also especially illiberal or extremely repressive, might not be unduly troubled by the first two of these bites. However, for pluralistic orders, and especially those which are
liberal in nature, all three of these bites are serious, and especially the last. This is especially true
for orders which celebrate and promote the tropes of liberty, equality, the rule of law and
constitutionalism.
23. Lockes understanding of tacit consent to the law (which is a security issue) is a fair example of this.
24. One contemporary example of this is the debate in the UK over immigration and the effects of the
European Union. Both of these issues challenge the hazy core value of Britishness. What is noteworthy here is that whilst the former issue is often seen in terms of security, the latter is not. This
is telling because (at face value) both issues can be seen to compromise the integrity of the British
way of life, and in the case of the EU (from one perspective at least) the British state itself is having
its sovereignty challenged. However, whilst politicians often cite immigration as a potential security
issue with an emphasis on the need to maintain core values and the integrity of borders, security
rhetoric tends not to be used in debates about the influence of the EU, even though there are worries
from some quarters over both immigration and border controls.
25. Again, the instance of immigration and especially asylum seekers and terror suspects is a clear
example of this. Whilst proclaiming themselves to be the defenders of liberty, democracy and human
rights, some liberal democratic states (such as the UK, US and Australia) are demonstrating a willingness to exclude individuals from the realisation of these ideals.
26. The declaration of the security threat could (in principle) be made by any member of the order.
Indeed, in the theoretical Hobbesian state of nature we are asked to imagine an order exactly where
this is the case (i.e. a state where each individual decides on what is a threat to their life and wellbeing).
27. Again the models offered by Hobbes and Locke are good examples. Clearly the core value that the
members of the Hobbesian order share is that of the preservation of life and predictable use of power.
In order to achieve this they are prepared to forego their natural rights. The Lockean account of
order is more interesting to the argument in hand, as in that account Locke does not simply give an
account of government and the state, but he also bases this account on a developed understanding
of civil society, and the role of non-political actors such as the church, family and commercial
enterprise.
28. Whilst this analysis draws on Waevers notion of security as a speech-act, it also deviates in significant ways from Waevers account. It is not possible to develop a full account of those differences
here, but it is possible to raise the differences as two general points. First, whilst it is accepted here
that in contemporary times the state is an historically important and powerful performer of the
speech-act of security, our current perspective stresses that there are other actors capable of speaking security, both theoretically and de facto. Thus, contrary to Waever, it is not claimed here that
The concept of security refers to the state, or that Security ... has to be read through the lens of
national security (Waever 1995, 49, original emphasis). It is indeed true that, in order to understand
the historical way that security has been used and thought about since the consolidation of the state
system, then this kind of analysis is necessary. What is contested here is that a historical account of
security must be pursued exclusively from this perspective (cf. Rothschild 1995), or that this is the
only way to theorise security. The second point relates to Waevers understanding of the political,
which he shares with Buzan and de Wilde (Buzan et al. 1998). In particular, Waever employs the
notions of societal security and political security (Waever 1995, 6571). However, whilst Waever
makes a distinction between societal and political security, he also explicitly links the idea of the
political to the idea of the state (Waever 1995, 66). Additionally, Waever goes on to argue that State
security has sovereignty as its ultimate criterion, and societal security has identity (Waever 1995, 67,
original emphasis). The perspective developed here argues for a greater differentiation between the
505
state and the political than Waevers account seems willing to concede. Specifically, whilst the state
is an important political actor, the two terms are not synonymous. Moreover, the attempt to divide
the societal and the political, and to assign separate security concerns, both presupposes certain
political values, and is an important political move in itself.
29. This kind of thinking occurs at three loci. In the history of ideas it is instanced in the thought of
such figures as Hobbes (1968), Locke (1963) and Rousseau (1968). In contemporary scholarly literature it is echoed by Wolfers (1962, 158), Mearsheimer (1990, 44) and Ayoob (1997, 126). Finally,
at the level of political rhetoric, it is a common theme purported by Blunkett, Blair and George W.
Bush (cf. America way out of order on War on Terror, The Times, 20 November 2001; No, not quite
a dictatorship, The Economist, 8 December 2001; Dont give terrorists the gift of bad laws, The Independent on Sunday, 9 December 2001); and by Blunkett himself (Freedom and security are two essentials that citizens look to the government to provide. Whatever balance is struck, someone will be
unhappy. But negative attitudes to the state simply distort the debate, The Guardian, 14 September
2002; Heading in the wrong direction, The Economist, 8 March 2003; A question of freedom, The
Economist, 8 March 2003; Kennedy: Ministers using terror threat to erode civil liberties, The Independent, 26 October 2004; Blunkett warns of growing danger: UK government Chancellor to maintain security, The Guardian, 13 March 2004). This understanding of security as an end-in-itself
which can be balanced or traded off with other ends is also accepted by such figures as Louise
Arbour (United Nations, Human Rights Vision and Promise Under Considerable Strain, Says High
Commissioner
for
Human
Rights,
http://www.unhchr.ch/huricane/huricane.nsf/view01/
5761F3C22335D3EFC1256F65007782D2?opendocument, Internet; accessed 9.12.04).
Bibliography
Arendt, H. (1963) Origins of Totalitarianism (Cleveland and New York: Meridian Books).
Art, R. J. (1993) Security, in J. Krieger (ed), The Oxford Companion to Politics of the World (Oxford: Oxford
University Press), 820822.
Ayoob, M. (1995) The Third World Security Predicament: State Making, Regional Conflict, and the International
System (Boulder, CO: Lynne Rienner Publishers).
Ayoob, M. (1997) Defining security: A subaltern realist perspective, in K. Krause and M. C. Williams
(eds), Critical Security Studies: Concepts and Cases (London: UCL Press), 121146.
Baldwin, D. (1997) The concept of security, Review of International Studies, 23:1, 526.
Blair, T. (2004) Speech on the threat of global terrorism, 5 March 2004, http://www.number10.gov.uk/output/Page5461.asp, Internet; accessed 13 December 2004.
Booth, K. (ed) (1997) Critical Security Studies and World Politics (London: Lynne Rienner Publishers).
Bull, H. (1977) The Anarchical Society: A Study of Order in World Politics (London and Basingstoke:
MacMillan Press).
Burke, A. (2001) In Fear of Security: Australias Invasion Anxiety (Annandale: Pluto Press).
Buzan, B. (1984) Peace, power, and security: Contending concepts in the study of international relations, Journal of Peace Research, 21:2, 109125.
Buzan, B. (1991) People, States and Fear: An Agenda for International Security Studies in the Post-Cold War Era
(London: Harvester Wheatsheaf).
Buzan, B., Waever, O. and de Wilde, J. (1998) Security: A New Framework for Analysis (London: Lynne
Rienner).
Campbell, D. and Dillon, M. (eds) (1993) The Political Subject of Violence (Manchester: Manchester
University Press).
Clausewitz, C. von, trans. Maude, F. N. and Rapoport, A. (1968) On War (Harmondsworth: Penguin).
Dalby, S. (1997) Contesting an essential concept: Reading the dilemmas in contemporary security discourse, in K. Krause and M. C. Williams (eds), Critical Security Studies: Concepts and Cases (London: UCL
Press), 331.
Deese, D. A. (19791980) Energy: Economics, Politics, and Security, International Security, 4:3, 140153.
Derian, J. D. (1993) The value of security: Hobbes, Marx, Nietzsche, and Baudrillard, in D. Campbell
and M. Dillon (eds), The Political Subject of Violence (Manchester: Manchester University Press), 94
113.
Dillon, M. (1996) Politics of Security: Towards a Political Philosophy of Continental Thought (London:
Routledge).
506
GRAHAM M. SMITH
Duffield, M. (2001) Governing the borderlands: Decoding the power of aid, Disasters, 25:4, 308320.
Graeger, N. (1996) Environmental security?, Journal of Peace Research, 33:1, 109116.
Havel, V. C. (1992) Summer Meditations: On Politics, Morality and Civility in a Time of Transition, trans. P.
Wilson (London: Faber and Faber).
Held, D. (1997) Models of Democracy (Cambridge: Polity Press).
Hobbes, T. (1968) Leviathan, ed. C. B. Macpherson (London: Penguin Books).
Hume, D. (2000) A Treatise of Human Nature, ed. D. F. Norton and M. J. Norton (Oxford and New York:
Oxford University Press).
Jervis, R. (1978) Cooperation under the security dilemma, World Politics, 30:2, 167214.
Jervis, R. (1983) Security regimes, in S. D. Krasner (ed), International Regimes (Ithaca and London:
Cornell University Press), 173194.
Krasner, S. D. (1978) Defending the National Interest: Raw Materials Investments and US Foreign Policy
(Princeton: Princeton University Press).
Krause, K. and Williams, M. C. (1997) Critical Security Studies: Concepts and Cases (London: UCL Press).
Lake, A. (1994) Confronting backlash states, Foreign Affairs, 73:2, 4555.
Levy, M. A. (1995) Is the environment a national security issue?, International Security, 20:2, 3562.
Lipschutz, R. D. (1995) On Security (New York: Columbia University Press).
Locke, J. (1963) Two Treatises of Government: A Critical Edition with an Introduction and Apparatus Criticus, ed.
P. Laslett (Cambridge: Cambridge University Press).
Luce, H. R. (1941) The American century, Life, 17 February 1941, 6165.
Mastanduno, M. (1998) Economics and security in statecraft and scholarship, International Organization,
52:4, 825854.
Mathews, J. T. (1989) Redefining security, Foreign Affairs, 68:2, 167177.
McClelland, J. S. (1998) A History of Western Political Thought (London: Routledge).
McSweeney, B. (1999) Security, Identity & Interests: A Sociology of International Relations (New York:
Cambridge University Press).
Mearsheimer, J. J. (1990) Back to the future: Instability in Europe after the cold war, International
Security, 15:1, 556.
Morgenthau, H. J. (1966) Politics among Nations: The Struggle for Power and Peace (New York: Alfred A.
Knopf).
Nye, J. S. (1974) Collective economic security, International Affairs, 50:4, 584598.
Ovid (1916) Metamorphoses, trans. F. J. Miller (Cambridge, MA: Harvard University Press).
Paris, R. (2001) Human security: Paradigm shift or hot air?, International Security, 26:2, 87102.
Ronnfeldt, C. F. (1997) Three generations of environmental security research, Journal of Peace Research,
34:4, 473482.
Rothschild, E. (1995) What is security?, Daedalus, 124:3, 5598.
Rousseau, J.-J. (1968) The Social Contract, trans. M. Cranston (London: Penguin Books).
Schmitt, C. (1985) Political Theology: Four Chapters on the Concept of Sovereignty (Cambridge, MA: MIT Press).
Schmitt, C. (1988) Political Theology: Four Chapters on the Concept of Sovereignty (Cambridge, MA and London:
The MIT Press).
Schmitt, C. (1996) The Concept of the Political (Chicago and London: The University of Chicago Press).
Smith, S. (2005) The contested concept of security, in K. Booth (ed), Critical Security Studies and World
Politics (London: Lynne Rienner Publishers).
Thomas, C. and Wilkin, P. (1999) Globalization, Human Security, and the African Experience (London: Lynne
Rienner Publishers).
Ullman, R. H. (1983) Redefining security, International Security, 8:1, 129153.
Ullman, W. (1961) Principles of Government and Politics in the Middle Ages (London: Methuen).
United Nations (1994) Human Development Report 1994 (New York: Oxford University Press for the United
Nations Development Programme (UNDP)).
507
Waever, O. (1995) Securitization and desecuritization, in R. Lipschutz (ed), On Security (New York:
Columbia University Press).
Walker, R. (1997) The subject of security, in K. Krause and M. C. Williams (eds), Critical Security Studies:
Concepts and Cases (London: UCL Press), 6181.
Walt, S. M. (1991) The renaissance of security studies, International Studies Quarterly, 35:2, 211239.
Waltz, K. N. (1979) Theory of International Politics (New York: Random House).
Wheeler, N. (1996) Guardian angel or global gangster: The ethical claims of international society
revisited, Political Studies, 44:1, 123135.
Wilkin, P. (2001) The Political Economy of Global Communication: An Introduction (London: Pluto Press).
Wolfers, A. (1962) Discord and Collaboration: Essays on International Politics (Baltimore: The Johns Hopkins
Press).