Secrecy and Methods in Security Research

This book analyses the challenges of secrecy in security research, and develops a set of methods to navigate, encircle and work with secrecy. How can researchers navigate secrecy in their fieldwork, when they encounter confidential material, closed-off quarters or bureaucratic rebuffs? This is a particular challenge for researchers in the security field, which is by nature secretive and difficult to access. This book creatively assesses and analyses the ways in which secrecies operate in security research. The collection sets out new understandings of secrecy, and shows how secrecy itself can be made productive to research analysis. It offers students, PhD researchers and senior scholars a rich toolkit of methods and best-practice examples for ethically appropriate ways of navigating secrecy. It pays attention to the balance between confidentiality, and academic freedom and integrity. The chapters draw on the rich qualitative fieldwork experiences of the contributors, who did research at a diversity of sites, for example at a former atomic weapons research facility, inside deportation units, in conflict zones, in everyday security landscapes, in virtual spaces and at borders, bureaucracies and banks. The book will be of interest to students of research methods, critical security studies and International Relations in general.

[1]  Maozhen Li,et al.  Preface , 2016, Int. J. Pattern Recognit. Artif. Intell..

[2]  Jonna Nyman Pragmatism, Practice and the Value of Security 1 , 2016 .

[3]  F. Robinson The Ethics of Care: A Feminist Approach to Human Security , 2011 .

[4]  Oliver Kearns State secrecy, public assent, and representational practices of U.S. covert action , 2016 .

[5]  Louise Amoore,et al.  Securing with algorithms: Knowledge, decision, sovereignty , 2017 .

[6]  M. Bourne,et al.  Laboratizing the border: The production, translation and anticipation of security technologies , 2015 .

[7]  A. Mol The Body Multiple: Ontology in Medical Practice , 2003 .

[8]  W. Walters,et al.  Bringing Publics into Critical Security Studies: Notes for a Research Strategy , 2015 .

[9]  J. Fisher,et al.  Strategies for Obtaining Access to Secretive or Guarded Organizations , 2015, Journal of contemporary ethnography.

[10]  R. Bellanova,et al.  Doing and mediating critique: An invitation to practice companionship , 2019, Security Dialogue.

[11]  F. Ragazzi,et al.  Low-tech security: Files, notes, and memos as technologies of anticipation , 2014 .

[12]  Susan Maret,et al.  The Charm of Secrecy: Secrecy and Society as Secrecy Studies , 2016 .

[13]  Wanda Vrasti The Strange Case of Ethnography and International Relations , 2008 .

[14]  M. Littman,et al.  What can we do? , 2001, Urologic nursing.

[15]  Christian Bueger Security as practice , 2016 .

[16]  Randy K. Lippert,et al.  Spins, Stalls, and Shutdowns: Pitfalls of Qualitative Policing and Security Research , 2015 .

[17]  Deirdre Curtin,et al.  Overseeing Secrets in the EU: A Democratic Perspective , 2014 .

[18]  I. V. Weitershausen Roland Bleiker (ed), Visual Global Politics , 2021 .

[19]  David Campbell,et al.  Cultural governance and pictorial resistance: reflections on the imaging of war , 2003, Review of International Studies.

[20]  P. Pallister-Wilkins Médecins Avec Frontières and the making of a humanitarian borderscape , 2018 .

[21]  O. Thomas The Iraq inquiries: publicity, secrecy and liberal war , 2015 .

[22]  Srirupa Roy Politics of Insecurity , 2004 .

[23]  Brian Balmer,et al.  Secrecy and Science: A Historical Sociology of Biological and Chemical Warfare , 2012 .

[24]  A. Calcara Critical Methods in Political and Cultural Economy , 2018 .

[25]  Sophia Dingli We need to talk about silence: Re-examining silence in International Relations theory , 2015 .

[26]  B. Rappert Revealing and concealing secrets in research: the potential for the absent , 2010 .

[27]  J. Riese What is ‘access’ in the context of qualitative research? , 2018, Qualitative Research.

[28]  Madeleine Akrich,et al.  A Summary of a Convenient Vocabulary for the Semiotics of Human and Nonhuman Assemblies , 1992 .

[29]  W. Schinkel,et al.  Surveillance at sea: The transactional politics of border control in the Aegean , 2017, Security dialogue.

[30]  Eva Horn,et al.  Logics of Political Secrecy , 2011 .

[31]  Katja Lindskov Jacobsen,et al.  Experimentation in humanitarian locations: UNHCR and biometric registration of Afghan refugees , 2015 .

[32]  Bertrand Taithe,et al.  Data hubris? Humanitarian information systems and the mirage of technology , 2016 .

[33]  Celia Lury,et al.  Inventive methods : the happening of the social , 2012 .

[34]  Berthold. Rittberger,et al.  Secrecy in Europe , 2018 .

[35]  Andrew W Neal,et al.  Critical Security Methods : New Frameworks for Analysis , 2015 .

[36]  W. Walters,et al.  Hannah Arendt and the Art of Secrecy; Or, the Fog of Cobra Mist , 2016 .

[37]  Sissela Bok,et al.  Secrets: On the Ethics of Concealment and Revelation , 1982 .

[38]  M. Taussig Defacement: Public Secrecy and the Labor of the Negative , 1999 .

[39]  E. Cloatre Pills for the Poorest: An Exploration of TRIPS and Access to Medication in Sub-Saharan Africa , 2013 .

[40]  M. Baaz,et al.  What Can We/Do We Want to Know? Reflections from Researching SGBV in Military Settings , 2018 .

[41]  M. de Goede,et al.  Secrecy and security in transatlantic terrorism finance tracking , 2017 .

[42]  C. null,et al.  Reflections … , 1991 .

[43]  Louise Amoore and Marieke de Goede What counts as violence , 2013 .

[44]  M. Michaelsen,et al.  Research, Ethics and Risk in the Authoritarian Field , 2017 .

[45]  Andrew W Neal,et al.  Introducing critical security methods , 2014 .

[46]  Russell Olwell,et al.  Nuclear Rites: A Weapons Laboratory at the End of the Cold War by Hugh Gusterson (review) , 1997, Technology and Culture.

[47]  Mark Mullen,et al.  Strategies of Containment , 2011 .

[48]  Clare Birchall Six Answers to the Question "What is Secrecy Studies?" , 2016 .

[49]  Annelise Riles The Network Inside Out , 2000 .

[50]  Elisa Pascucci,et al.  The humanitarian infrastructure and the question of over-research: reflections on fieldwork in the refugee crises in the Middle East and North Africa , 2017 .

[51]  D. Yanow,et al.  A Hitchhiker’s Guide to the Public Administration Research Universe: Surviving Conversations on Methodologies and Methods , 2012 .

[52]  Susana Durão Enforcing order: an ethnography of urban policing , 2014 .

[53]  Didier Bigo,et al.  Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .

[54]  F. P. Secrecy , 1994, RES: Anthropology and Aesthetics.

[55]  Simon Holdaway ‘An Inside Job’: a case study of covert research on the police , 1980 .