LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

The Morality of Security: A Theory of Just Securitization. By Rita Floyd. Cambridge: Cambridge University Press, 2019. 258p. $99.00 cloth.

Photo by scottwebb from unsplash

The field of international security studies has long had an ethics problem: ethics is almost absent as a major tradition and concern within an otherwise diverse field that has long… Click to show full abstract

The field of international security studies has long had an ethics problem: ethics is almost absent as a major tradition and concern within an otherwise diverse field that has long been at the heart of international relations. Against this background, this book is an important and valuable contribution. It is even more so as a work that aims to bring a fully developed ethics to one of the field’s most influential theoretical paradigms: the Copenhagen school’s theory of “securitization.” This school attempted to systematize three key tendencies in national security policy: the broadening of international security concerns beyond armed conflict to take in the environment, drugs, refugees, terrorism, and more; the resort to emergency politics and moral and legal rule-breaking in policy; and the increasing use of security rhetoric in public political discourse. In answer, Copenhagen school theory ventured that there was no simple truth to security; rather, it was the product of performative “speech acts” that raise the status of some risk to an existential threat to the state such that it legitimizes the use of emergency language and measures. Yet the theory, even as it was extended and applied by hundreds of subsequent scholars, has skated around its ethical implications and dilemmas, relying merely on a preference for “desecuritization”—that is, a movement of an issue or risk back into a more routine, rule-bound structure of politics. Floyd rightly asserts that not only does this ignore the potential for “good” securitizations but it also fails to provide ethical guidance about the “circumstances when the move out of normal politics is morally permissible, and what considerations ought to inform the choices security measures used” (p. 2). By providing us with such a theory using the rigor associated with analytical moral philosophy, Floyd gives us a truly important contribution. Via a generally fair engagement with literature in traditional and critical security studies and drawing on the methodologies of the just war tradition (JWT), Floyd structures the book so as to elucidate her security ethics, which she calls “just securitization.” This, she argues, should provide guidance as to when an issue may be securitized, how such a securitization should be conducted, and how and when securitization must be reversed. Her criteria for these decisions are nested within two categories analogous to the just war tradition’s jus ad bellum and jus in bello. A third, “just termination of securitization,” has no strict analogs in the JWT but might echo aspects of the more recent concern for postwar justice, peacebuilding, and reconstruction; more accurately, however, one might think of this category as a form of sociopolitical “demilitarization.” The first criterion she calls “just initiation of securitization.” It has two key conditions: there must be “an objective existential threat to a referent object”—that is, a danger that threatens “the survival of the essential character of either a political or social order, an ecosystem, a nonhuman species, or individuals”— and the referent object (the thing to be made secure) must be “morally justifiable” These referent objects are morally justifiable if they “meet basic human needs...necessary components of human well-being.” They must meet three additional conditions: a “right intention for securitization...securitizing actors must be sincere in their attention to protect the referent object” (analogous to “just cause”); the expected good gained from securitization must be greater than the expected harm” (the double effect); and securitization must have a “reasonable chance of success” (pp. 19–20). The second criterion, “just conduct in securitization,” holds that security measures should aim only to address the objective existential threat, they must be effective and cause the least overall harm possible, and they should “respect a limited number of relevant human rights” (pp. 20, 151–77). At this point, objections occur. Its first aim would limit mischievous forms of security politics and policy overreach, but why would securitization not respect the entire suite of human rights? They have been designed to be comprehensive and to dramatically limit exceptions, especially in the sphere of torture. International humanitarian law (IHL) already compromises the human rights of civilians caught in armed conflict and has been widely criticized. The resort to the double effect demonstrates that Floyd is not aiming to create a systemic form of structural security that might mitigate the armed conflict system, but one that might merely provide basic protections. This merely repeats the lacunae of the just war tradition and IHL, which create wide space for impunity. My concerns here are compounded by the reluctance of the book to provide clear policy examples and guidance about what securitization would involve in terms of policy and security action, especially in cases outside armed conflict or the use of force. Nor is it ever clear whether it is only the state that would take such action or whether it would involve communities, and to what extent it might include democratic forms of deliberation and feedback. Although the book offers many interesting cases, they are often vague when it comes to what a securitized policy response is and where moral thresholds lie. The third criterion, “just termination of securitization,” argues that de-securitization must occur when threats have been neutralized or, in the case of an unjust securitization, immediately. Floyd argues that these securitizations should be publicly declared, and security language and measures

Keywords: policy; theory; security; cambridge; securitization; floyd

Journal Title: Perspectives on Politics
Year Published: 2020

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.