Questioning security devices: Performativity, resistance, politics

Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds, ranging from what is commonly referred to as ‘hi-tech’ to ‘low-tech’ items such as walls or paper files, have garnered increased attention in critical approaches to (in)security. This article introduces a special issue whose contributions aim to further these approaches by questioning the role and political effects of security devices. It proposes an analytics of devices to examine the configuration and reconfiguration of security practices by attending to the equipment or instrumentation that make these practices possible and temporally stabilize them. The aim here is not to advance devices as a new unit of analysis, but to open new forays in ongoing debates about security politics and practices, by asking different research questions and developing new research angles. We start by outlining what is at stake when thinking of and analysing security practices through devices, or shifting from the language of technology and ‘technologies of security’ to security devices. The remainder of the article then specifies how an analytics of devices involves a more varied vocabulary of performativity, on the one hand, and agency, on the other.

[1]  Alison J. Williams,et al.  Performing security: The imaginative geographies of current US strategy , 2007 .

[2]  A. Barry Political Machines: Governing a Technological Society , 2001 .

[3]  P. Bourdieu La distinctíon: Critique sociale du jugement , 1980 .

[4]  M. Callon Elaborating the notion of performativity , 2009 .

[5]  Heidi Mork Lomell,et al.  Technologies of InSecurity: The Surveillance of Everyday Life , 2008 .

[6]  J. Hillis Miller,et al.  Performativity as Performance / Performativity as Speech Act: Derrida's Special Theory of Performativity , 2007 .

[7]  Katja Lindskov Jacobsen,et al.  The Politics of Humanitarian Technology: Good Intentions, Unintended Consequences and Insecurity , 2015 .

[8]  A. Feenberg Transforming Technology: A Critical Theory Revisited , 2002 .

[9]  B. Hibou,et al.  The Bureaucratization of the world in the neoliberal era. An international and comparative perspective , 2015 .

[10]  G. Simondon Du mode d'existence des objets techniques , 1989 .

[11]  Elias L. Khalil,et al.  Donald MacKenzie ’ s An engine , not a camera : how financial models shape markets , 2009 .

[12]  Athena Athanasiou,et al.  Dispossession: The Performative in the Political , 2013 .

[13]  R. Ericson,et al.  Policing the Risk Society , 1997 .

[14]  M. Callon PERFORMATIVITY, MISFIRES AND POLITICS , 2010 .

[15]  A. Pickering The Mangle of Practice: Agency and Emergence in the Sociology of Science , 1993, American Journal of Sociology.

[16]  W. Walters Governmentality: Critical Encounters , 2012 .

[17]  Peter K. Manning,et al.  Information Technology in the Police Context: The "Sailor" Phone , 1996, Inf. Syst. Res..

[18]  M. Bourne,et al.  Laboratizing the border: The production, translation and anticipation of security technologies , 2015 .

[19]  Juliane Jung,et al.  The Practice Of Everyday Life , 2016 .

[20]  Nikolas Rose,et al.  Foucault and Political Reason: Liberalism, Neo-Liberalism, and Rationalities of Government , 1997 .

[21]  Mark Laffey Locating identity: performativity, foreign policy and state action , 2000, Review of International Studies.

[22]  H. Gusterson The virtual nuclear weapons laboratory in the New World Order. , 2001 .

[23]  Nicole Sunday Grove,et al.  The cartographic ambiguities of HarassMap: Crowdmapping security and sexual violence in Egypt , 2015 .

[24]  P. Schouten Security as controversy: Reassembling security at Amsterdam Airport , 2014 .

[25]  M. Acuto,et al.  Assemblage Thinking and International Relations , 2014 .

[26]  Tomas A. Lipinski,et al.  The Privacy Advocates: Resisting the Spread of Surveillance , 2011 .

[27]  G. J. Smith,et al.  Behind the Screens: Examining Constructions of Deviance and Informal Practices among CCTV Control Room Operators in the UK , 2002 .

[28]  J. L. Heilbron,et al.  Leviathan and the air-pump. Hobbes, Boyle, and the experimental life , 1989, Medical History.

[29]  A. Purenne,et al.  Piloter la police par les indicateurs , 2010 .

[30]  J. Huysmans Defining Social Constructivism in Security Studies: The Normative Dilemma of Writing Security , 2002 .

[31]  B. Latour,et al.  Laboratory Life: The Construction of Scientific Facts , 1979 .

[32]  Leticia Sabsay Dispossession: the performative in the political , 2016 .

[33]  Cynthia Weber Performative States , 1998 .

[34]  M. Heidegger The Question Concerning Technology and Other Essays , 1977 .

[35]  Antoine Bousquet,et al.  Welcome to the Machine: Rethinking Technology and Society through Assemblage Theory , 2014 .

[36]  Gilles Chantraine,et al.  Ethnography of Writings in Prison: Professional Power Struggles Surrounding a Digital Notebook in a Prison for Minors , 2015 .

[37]  B. Latour On Technical Mediation , 1994 .

[38]  Rocco Bellanova,et al.  A Different View on the 'Making' of European Security: The EU Passenger Name Record System as a Socio-Technical Assemblage , 2012 .

[39]  Anthony Amicelle,et al.  Towards a ‘new’ political anatomy of financial surveillance , 2011 .

[40]  P. Lascoumes,et al.  Régulation de la carrière d’un instrument de santé. Les parcours de l’usage du test du VIH dans l’emploi en France et aux États-Unis , 2000 .

[41]  D. Bigo The (in)securitization practices of the three universes of EU border control: Military/Navy – border guards/police – database analysts , 2014 .

[42]  W. Walters The Power of Inscription: Beyond Social Construction and Deconstruction in European Integration Studies , 2002 .

[43]  Anna Leander Technological Agency in the Co-Constitution of Legal Expertise and the US Drone Program , 2013, Leiden Journal of International Law.

[44]  A. Hirschman,et al.  Exit, Voice, and Loyalty: Responses to Decline in Firms, Organizations, and States , 1971 .

[45]  N. Marres,et al.  Materials and devices of the public: an introduction , 2011 .

[46]  P. Lascoumes,et al.  Les résistances aux instruments de gouvernement. Essai d'inventaire et de typologie des pratiques , 2011 .

[47]  K. Knorr-Cetina,et al.  Epistemic cultures : how the sciences make knowledge , 1999 .

[48]  Sachil Singh Social sorting as ‘social transformation’: Credit scoring and the reproduction of populations as risks in South Africa , 2015 .

[49]  Andrew W Neal,et al.  Critical Security Methods : New Frameworks for Analysis , 2015 .

[50]  Samuel Tanner,et al.  Police work and new ‘security devices’: A tale from the beat , 2015 .

[51]  A. Ceyhan Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics , 2002 .

[52]  Govert Valkenburg,et al.  Materialities between security and privacy: A constructivist account of airport security scanners , 2015 .

[53]  Nick Vaughan-Williams,et al.  Security and the performative politics of resilience: Critical infrastructure protection and humanitarian emergency preparedness , 2015 .

[54]  R. Abrahamsen,et al.  Security Beyond the State: Global Security Assemblages in International Politics , 2009 .

[55]  B. Buzan,et al.  Security: A New Framework for Analysis , 1997 .

[56]  P. Robert,et al.  Déviance et société , 2017 .

[57]  C. Shalizi The Domestication of the Savage Mind , 2009 .

[58]  G. Armstrong,et al.  The Maximum Surveillance Society: The Rise of CCTV , 1999 .

[59]  A. Barry The Translation Zone: Between Actor-Network Theory and International Relations , 2013 .

[60]  B. Latour Visualization and cognition: thinking with eyes and hands , 1986 .

[61]  David Campbell,et al.  Writing security: United States foreign policy and the politics of identity , 1992 .

[62]  Dominique Linhardt La « question informationnelle » éléments pour une sociologie politique des fichiers de police et de population en Allemagne et en France (années 1970 et 1980) , 2005 .

[63]  Nikolas Rose,et al.  Lines of communication and spaces of rule , 2013 .

[64]  Claudia Aradau Security That Matters: Critical Infrastructure and Objects of Protection , 2010 .

[65]  M. McDonald Securitization and the Construction of Security , 2008 .

[66]  Thierry Balzacq A theory of securitization: Origins, core assumptions, and variants , 2010 .

[67]  Karen Barad Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter , 2003, Signs: Journal of Women in Culture and Society.

[68]  Michael C. Behrent Foucault and Technology , 2013 .

[69]  B. Anderson,et al.  Anticipating emergencies: Technologies of preparedness and the matter of security , 2012 .

[70]  P. Bourdieu,et al.  Language and Symbolic Power , 1991 .

[71]  P. Lascoumes La Gouvernementalité : de la critique de l’État aux technologies du pouvoir , 2004 .

[72]  F. Ragazzi,et al.  Low-tech security: Files, notes, and memos as technologies of anticipation , 2014 .

[73]  J. Butler PERFORMATIVE AGENCY , 2010 .

[74]  Anne Mévellec Gouverner par les instruments. , 2006, Canadian Journal of Political Science.

[75]  Wanda J. Orlikowski,et al.  Improvising Organizational Transformation Over Time: A Situated Change Perspective , 1996, Inf. Syst. Res..

[76]  F. Allan Hanson,et al.  The Technological Society , 1965 .

[77]  M. Callon What Does It Mean to Say That Economics Is Performative? , 2006, Do Economists Make Markets?.

[78]  Patrick Olivier,et al.  Everyday Surveillance , 2016, CHI Extended Abstracts.

[79]  K. Ball,et al.  Routledge Handbook of Surveillance Studies , 2014 .