iH,'H||!|||!K ALAN COLLINS Contemporary SECURITY STUDIES FIFTH EDITION OXFORD fctical Security Studies: k Schismatic History David Mutimcr Chapter Contents . Introduction; 'Follow the sign of the gourd1 92 • Toronto desire: Critical Security Studies 93 • Copenhagen distinctions ? Aberystwyth exclusions 97 • Constructing security J • Everyone's other: poststructuralism and security 102 • Beyond divisions? CASEing the joint or returning the gift? 106 • Conclusion 108 con- £ the, has Reader's Guide This chapter provides a part;al history of a label. It is partial both in that it is not, and cannot be, complete, and in that 1 am both the author of, and participant in, the history. It is therefore partial in H all other history is partial. The label is 'Critical Security Studies'. The chapter tells a story of origin of the label and the way it has developed and fragmented since the early 1990s. It sets out primary claims of the major divisions that have emerged within the literatures to which the label has been applied: constructivism, critical theory, and poststructuralism. Ultimately, the chaptersug-psts that Critical Security Studies needs to foster an 'ethos of critique' in either the study or refusal Of security, and that the chapter is an instance of that ethos directed at Critical Security Studies itself. David Mutimer Critical Security Studies: A Schismatic History Introduction: 'Follow the sign of the gourd' Very soon after being identified as the Messiah in Monty Python's Life of Brian, Brian is chased by a growing crowd of would-be followers. In his haste to get away Brian drops the gourd he has just bought and loses one of his sandals. Several of the followers remove one of their shoes and hop about on one foot, convinced this is what their newly found Messiah has told them to do. One follower picks up the shoe and shouts 'Follow the sign of the shoe/ Another picks up the gourd, shouting'Follow the sign of the gourd/ Perhaps predictably, within seconds, those hopping are fighting those who are following the shoe who are fighting those who arc following the gourd. Brians 'ministry' has splintered into sects before it has even had the chance to establish itself as a ministry. The Python gang were, of course, satirizing the tendency of religious movements to fragment, as they had at the outset of the film satirized the similar tendency of political movements: 'Are you the Judean People's Front?' 'Fuck off! We're the People's Front of Judea .. .JudeanPeople's Front. .. SPLITTERS!' Sadly, perhaps, this all too human tendency to fragment into ever-smaller and more exclusive and exclusionary clubs affects academic movements every bit as much as it does religious and political. Any society of ideas is, in addition, a potential source and expression of power, It provides the intellectual resources around which to mobilize people and resources of other kinds: whether these are tithes/alms, ballots/ arms, or even tenure/articles. None of this should be in any way surprising to those who work within the area covered by this chapter. While the chapter will show the divisions into which Critical Security Studies rapidly fell, one of the shared commitments of the wrork it will discuss is to the political potency of ideas. The social world is produced in and through the ideas that make it meaningful, which are themselves necessarily social. A consequence of this observation is that study of the social world is inextricably bound up with the world it studies; it is part of the productive set of ideas that make the world. This chapter provides a partial history of a label. It is partial both in that it is not, and cannot be, complete, and in that I am both the author of and a participant in the history. It is therefore partial in the way all other history is partial.The label is 'Critical Security Studies'.1 It is a label that has (one of) its origins in a conference held at York University in Canada in« As a label it has been fought over rather more i has been applied. It does not denote a coherent! views, an 'approach' to security; rather it ind desire. It is a desire to move beyond the strictur curity as it was studied and practised in the Col and in particular a desire to make that move ir, of some form of critique. It is a desire artioj the first line of the first book bearing the title ' Security Studies': 'This book emerged out of I to contribute to the development of a self-consdc critical perspective within security studies' (WjJ| andKrause 1997: vii). The form of security studies against which ( Security Studies was directed has been neatly i by one of the proponents of the traditional appro^H Security studies may be defined as the study of th^^H use, and control of military force. It explores thec^H tions that make the use of force more likely, the way^H the use of force affects individuals, states, and social and the specific policies that states adopt in orderto^B pare for, prevent, or engage in war. Walt (1991: 212) military The focus on the threat, use, and control of force imposed a series of important strictures oi^| study of security in this period. Military forces^H generally the preserve of states, and, what is mfl there is a normative, assumption that they should bit the preserve of states, even when they are not. Indeed our common definition of the stare is that institution which has a monopoly on the legitimate means of w lence. Therefore, by studying the threat, use, andefl of military force, security studies privilegfi^B position of the state. Furthermore, such an apprflM implies that the state is the primary object thata^ be secured—that is, the state is the referent obj(H security. Finally, and most obviously, thinking ofl curity as the threat, use, and control of military reduces security to military security, and rendersodli forms of security as something else. The various scholars who followed the desire J wards a critical security study were troubled bjj three of these major assumptions underlying 1 When I refer to the label or to the 'field' of enq' is increasingly gathered under that label, I will c Critical Security Studies. Otherwise, I leave the term* lowercase. litjlixe the I . a] gtucjy of security They wondered, first «*r*nn her ou: concern needed to be only on the | iis security- What of the security of people lrll states' The standard assumption of se-Bttstudies is that the people are secure if the state l"U^I", ' but those drawn towards Critical Security ^wondered about those times when this was U the case: when states ignored the security of some "f their people- when they actively oppressed some of ° pgople, or when the state lacked the capacity to 1 "vide security for its people. They were therefore wonder whether we should be thinking about objects other than the suite. Questioning the referent object of security leads texorably to questioning the exclusive focus on the. threat, use, and control of military force. Large, powerful, stable states such as those in which 'security studies" tended to be practised—the USA, the UK, or Canada- may be seriously threatened only by war. On the other hand, other potential referent objects, particularly people and their collectives, can be threatened in all soils of ways. Therefore, once you question the referent object of security, you must also question the nature ami scope, of security, and thus of security studies. Not everyone who questioned the referent object and the nature and .scope o! security would be drawn to a desire for a critical security study, however. That desire was driven ty z recognition of the power of ideas, and thus a discomfort with the way traditional security studies focused on the state. The concern was not that there were other objects to be secured toother ways, but rather that the effect of studying security as the threat, use, and control of military force tended in and of itself to support and legitimate the power of the state. While other scholars sought to broaden and deepen security studies to consider other referents and other threats, those whose desire ran to a selfconsciously critical perspective' were centrally Concerned with the politics of knowledge. Security studies, as it had been practised, provided intellectual and, ultimately, moral support to the most powerful oistitution in contemporary politics: the state. Those **wn 10 a critical security study sought a different security politics as well *s a different security scholarship. The remainder of the chapter traces what happened "scholars acted on this desire for a self-consciously ?JCal secur'ty study. In doing so, it sets out the major ^U1 'nes that have emerged among those initially ani-tCd b>'this shared desire. The signs that have driven these fault lines are not simply Monty Python s signs of the shoe and the gourd, but rather represent disagreements about the nature of critique and thus of different forms of critical security study. Thus, while the chapter outlines the sects into which critical desire has fractured, it also sets out a range of answers to the question of what Critical Security Studies might be. My history of these splits begins in 1994. Toronto desire: Critical Security Studies In May 1994, a small conference was held at York University in Toronto entitled Strategies in Conflict: Critical Approaches to Security Studies. It brought together from around the world a variety of scholars, both junior and senior, with interests in security and with a concern about the direction of security studies in the early post-Cold War era. It was in the course of the discussions at and around that conference that the label 'Critical Security Studies' started to be applied to the intellectual project that drew the participants to the conference, and it was used as the title of the book, edited by Keith Krause and Michael C. Williams, that the conference produced: Critical Security Studies: Concepts and Cases (1997b). The conference and book were an expression of the desire for self-consciously critical perspectives on security, but they both worked extremely hard to avoid articulating a single perspective in response to that desire: 'Our appending of the term critical to security studies is meant to imply more an orientation toward the. discipline than a precise theoretical label (Williams and Krause 1997: x-xi). The book therefore served to launch the label Critical Security Studies, but not to fill it with precise content (see Key Quotes 7,1 for some of the ways in which Critical Security Studies has come to be defined). Metaphorically, it threw open the doors of the church of critical security and tried to welcome the followers of the shoe and the gourd, and even those hopping around on one foot. In their contribution to that volume, Krause and Williams aimed to set out the scope of a critical security study, and it has served as a touchstone in the further development of Critical Security Studies. They began their case for Critical Security Studies from the concerns with the traditional conception of security I have recounted. In particular, Krause and Williams began by questioning the referent object of security: 94 David Motimer KEY QUOTES 7.1 Definitions: Critical Security Studies Critical Security Studies has proven reasonably resistant to clear definition. This has been largely intentional, as the predion of a definition is limiting n a way that those behind the Gritfaof Security Sttxiics text wshed to avoid. Nevertheless, there are some definitions m the literature 'Our appending of the term critkai to WCUffy studies is meant to imply more an orientation toward the discipline than a precise theoretical label, and we adopt a small-c definition of cnvcal. Perhaps the most straightforward way to convey our sense of how cr