Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States

Anthropological Theory 1 (17):60-87 (2017)
  Copy   BIBTEX

Abstract

In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves away from studying security formations, and how much violence or insecurity they yield, to identifying security forms of action, whether or not they are part of the nation-state. As a framework for anthropological inquiry, it is oriented toward capturing how these forms of action work and what types of security they produce. We then illustrate this approach through our fieldwork on counterterrorism in the domains of law enforcement, biomedical research and federal-state counter extremism. In each of our cases, we use security analytics to arrive at a diagnosis of the form of action. The set of conceptual distinctions that we propose as an aid to approaching empirical situations and the study of security is, on another level, a proposal for an approach to anthropology today. We do not expect that the distinctions that aid us will suffice for every situation. Rather, we submit that this work presents a set of specific insights about contemporary U.S. security, and an example of a new approach to anthropological problems.

Links

PhilArchive

External links

  • This entry has no external links. Add one.
Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

Where computer security meets national security.Helen Nissenbaum - 2005 - Ethics and Information Technology 7 (2):61-73.
Security: Against What? For What? With What?André Gorz - 1983 - Telos: Critical Theory of the Contemporary 1983 (58):158-168.
Reve{a,i}ling the Risks.Wolter Pieters - 2010 - Techné: Research in Philosophy and Technology 14 (3):194-206.
Security, Knowledge and Well-being.Stephen John - 2011 - Journal of Moral Philosophy 8 (1):68-91.
The Fascist Moment: Security, Exclusion, Extermination.Mark Neocleous - 2009 - Studies in Social Justice 3 (1):23-37.
Rethinking East Asian Regional Order and China's Rise.Sun Xuefeng - 2013 - Japanese Journal of Political Science 14 (1):9-30.

Analytics

Added to PP
2016-10-18

Downloads
1,038 (#12,245)

6 months
78 (#55,082)

Historical graph of downloads
How can I increase my downloads?

Author's Profile

Meg Stalcup
University of Ottawa

Citations of this work

No citations found.

Add more citations

References found in this work

A thousand plateaus: capitalism and schizophrenia.Gilles Deleuze - 1987 - London: Athlone Press. Edited by Félix Guattari.
Observations on Modernity.Niklas Luhmann - 1998 - Stanford University Press.

View all 10 references / Add more references